adplus-dvertising
frame-decoration

Question

Which matrix is used in the Rho/ Pi steps?

a.

[(1 2 | 3 4)]^t

b.

[(0 2 | 1 4)]^t

c.

[(0 1 | 2 3)]^t

d.

[(1 3 | 2 4)]^t

Answer: (c).[(0 1 | 2 3)]^t

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which matrix is used in the Rho/ Pi steps?

Similar Questions

Discover Related MCQs

Q. The CHI step involves which of the following gate operations?

Q. The Pi step function can be written as-

Q. Which step function provides most amount of diffusion for the Keccak iteration step?

Q. In the Theta step function, which is a substitution step, each bit value changes. Each bit is dependent on _________ other bits for its new value.

Q. SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.

Q. Which step function works only W[0, 0]?

Q. How many iterations / rounds does the Keccak function have ?

Q. What are the co-ordinates of the bottom-right most lane?

Q. Within the Keccak function-f, the 1600 bits are arranged into a 5 x 5 x 64 array a. The 64-bit units are referred to as

Q. The sponge construction involves 2 phases, these are

Q. In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ?

Q. Which among the following is not a substitution operation?

Q. In SHA-3, which step function does not affect W [0, 0]?

Q. How many rounds are present in each iteration function of SHA-3?

Q. In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent?

Q. In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent?

Q. The default values for Keccak f are

Q. We can trade security for speed by

Q. The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction.

Q. In the sponge construction, the value ‘c’ is known as