Answer the following statements true (T) or false (F)

1. As with any block cipher, AES can be used to construct a message authentication code, and for this, only decryption is used.
2. The inverse add round key transformation is identical to the forward add round key transformation because the XOR operation is its own inverse.
3. The Rijndael developers designed the expansion key algorithm to be resistant to known cryptanalytic attacks.
4. The transformations AddRoundKey and InvMixColumn alter the sequence of bytes in State.
5. AES can be implemented very efficiently on an 8-bit processor.


1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

Draw the dependency tree for the following makefile. With this makefile, show the result of execution of the make utility.

What will be an ideal response?

Computer Science & Information Technology

Which of the following Snort modes writes packets' information to a text log file?

a. Sniffer b. Analyzer c. Packet logger d. Network intrusion-detection

Computer Science & Information Technology

Which application is not considered a specialty or niche application

- Post anesthesia recovery information system (PACIS) - Emergency Room information systems (EDIS) - maternity care information system (MCIS) - surgical information system (SIS)

Computer Science & Information Technology

____________________ is the process of analyzing a work environment, designing a new system or modifying the existing system to fit current needs, acquiring any needed hardware and software, training users, and getting the new or modified system to work.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology