The AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning or end, is reversible without knowledge of the key and would add no security.
A. Substitute bytes
B. AddRoundKey
C. MixColumns
D. ShiftRows
B. AddRoundKey
Computer Science & Information Technology
You might also like to view...
In the file name, Resume.docx, docx is the ________, indicating the file type
Fill in the blank(s) with correct word
Computer Science & Information Technology
Requested resources are granted to processes whenever possible with _________ .
A) ?preemption ? B) ?deadlock detection C) ?mutual exclusion ? D) ?deadlock avoidance
Computer Science & Information Technology