The AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning or end, is reversible without knowledge of the key and would add no security.

A. Substitute bytes
B. AddRoundKey
C. MixColumns
D. ShiftRows

B. AddRoundKey

Computer Science & Information Technology

You might also like to view...

In the file name, Resume.docx, docx is the ________, indicating the file type

Fill in the blank(s) with correct word

Computer Science & Information Technology

Requested resources are granted to processes whenever possible with _________ .

A) ?preemption ? B) ?deadlock detection C) ?mutual exclusion ? D) ?deadlock avoidance

Computer Science & Information Technology