Cryptography Questions & Answers for campus interviews on “Whirlpool Algorithm”.
1. Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by
a) each successive even row having left shifts
b) each successive row having a left shifts
c) each successive odd row having right shifts
d) each successive row having a right shifts
Answer: d
Clarification: The matrix C is formed by each successive row having right shifts.
2. Which of the following hexadecimal values are not present in the matrix C of the Mix Rows function?
a) 01
b) 09
c) 05
d) 03
Answer: d
Clarification: 03 is not a valid value in matrix C.
3. There’s no known successful attacks made against Whirlpool.
a) True
b) False
Answer: a
Clarification: The reason for this is because the Whirlpool algorithm is a new algorithm and hasn’t been used very much.
4. Which hash algorithm is the most hardware intensive among the following?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool
Answer: d
Clarification: None.
5. Which algorithm has the most execution latency?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool
Answer: b
Clarification: Whirlpool has the lowest latency. Latency is defined by the number of iteration rounds. SHA-2 has 80 rounds, whereas Whirlpool has 10.
6. Which among the following has not been broken yet( still collision free)?
a) MD-5
b) SHA-1
c) DES
d) SHA-2
Answer: d
Clarification: SHA-2 has not yet been broken, but since SHA-1 has been found to be not collision free (and SHA-2 has the same logic as SHA-1), SHA-3 algorithm was developed and officialised in 2012.
7. Before the first round of the Whirlpool algorithm, which is the operation that takes place?
a) Addition of Key
b) Substitution of Bytes
c) Mixing of Rows
d) Shifting of Columns
Answer: a
Clarification: Before the first round of the Whirlpool algorithm, addition of key round takes place.
8. How many rounds does the Whirlpool algorithm undergo?
a) 12
b) 14
c) 10
d) 16
Answer: c
Clarification: There are 10 rounds in the algorithm.
9. Each round uses a different key in the algorithm.
a) True
b) False
Answer: a
Clarification: Whirlpool produces keys for each round using the same algorithm itself. Keys are updated per round.
10. What is the size of the key in the algorithm?
a) 256 bits
b) 512 bits
c) 128 bits
d) 1024 bits
Answer: b
Clarification: The size of the key is 512 bits.
11. How many add round key functions are present in the Whirlpool algorithm?
a) 16
b) 18
c) 11
d) 10
Answer: c
Clarification: There are 11 round key addition functions in the Whirlpool algorithm. One key addition per round. One key addition before the 1st round.