Question
a.
8
b.
12
c.
6
d.
7
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. How many bit positions are active and can affect L[0, 0] in the Iota step function?
Similar Questions
Discover Related MCQs
Q. Which is the only step function that provides non-linear mapping?
View solution
Q. In SHA-3, the Iota step function has a round constant which only works on the last lane.
View solution
Q. The Chi function is defined as
View solution
Q. The Rho function is defined as : a[x, y, z] ← a[x, y, z-g(t)], where g(t) is defined as
View solution
Q. What are the new co-ordinates for (x, y) in the Rho step for t =3?
View solution
Q. Which matrix is used in the Rho/ Pi steps?
View solution
Q. The CHI step involves which of the following gate operations?
View solution
Q. The Pi step function can be written as-
View solution
Q. Which step function provides most amount of diffusion for the Keccak iteration step?
View solution
Q. In the Theta step function, which is a substitution step, each bit value changes. Each bit is dependent on _________ other bits for its new value.
View solution
Q. SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.
View solution
Q. Which step function works only W[0, 0]?
View solution
Q. How many iterations / rounds does the Keccak function have ?
View solution
Q. What are the co-ordinates of the bottom-right most lane?
View solution
Q. Within the Keccak function-f, the 1600 bits are arranged into a 5 x 5 x 64 array a. The 64-bit units are referred to as
View solution
Q. The sponge construction involves 2 phases, these are
View solution
Q. In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ?
View solution
Q. Which among the following is not a substitution operation?
View solution
Q. In SHA-3, which step function does not affect W [0, 0]?
View solution
Q. How many rounds are present in each iteration function of SHA-3?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!