Answer the following statements true (T) or false (F)

1. As with any block cipher, AES can be used to construct a message authentication code, and for this, only decryption is used.
2. The inverse add round key transformation is identical to the forward add round key transformation because the XOR operation is its own inverse.
3. The Rijndael developers designed the expansion key algorithm to be resistant to known cryptanalytic attacks.
4. The transformations AddRoundKey and InvMixColumn alter the sequence of bytes in State.
5. AES can be implemented very efficiently on an 8-bit processor.

1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

The 66 block termination point is:

A. CAT3 compliant. B. coaxial compliant. C. CAT6 compliant. D. IEEE 1394 compliant

Computer Science & Information Technology

The Big Three consists of which three from this list?

a) Default constructor b) Copy constructor c) Constructor with two parameters d) destructor e) Operator=

Computer Science & Information Technology