The first row of State is not altered; for the second row a 1-byte circular left shift is performed; for the third row a 2-byte circular left shift is performed; and for the fourth row a 3-byte circular left shift is performed. This transformation is called __________ .

A. AddRoundKey
B. ShiftRows
C. MixColumns
D. Substitute bytes


B. ShiftRows

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the classification levels for national security information?

A) Secret B) Protected C) Confidential D) Unclassified

Computer Science & Information Technology

Tracking monitoring involves assessing the status of the program as indicated by the database information and mapping it to standards established by the agency. __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you import data, where can you not store it?

A. New form B. New table C. Existing table D. Linked table

Computer Science & Information Technology

What type of employee is the most dangerous when it comes to internal IT attacks?

data entry clerks financial professionals IT professionals IT security professionals

Computer Science & Information Technology