Which matrix is used in the Rho/ Pi steps?
(a) [(1 2 | 3 4)]^t
(b) [(0 2 | 1 4)]^t
(c) [(0 1 | 2 3)]^t
(d) [(1 3 | 2 4)]^t
The question was posed to me in unit test.
My question is taken from Secure Hash Algorithms (SHA) topic in chapter Other Public Key Cryptosystems and Cryptographic Hash Functions of Cryptograph & Network Security