The first row of State is not altered; for the second row a 1-byte circular left shift is performed; for the third row a 2-byte circular left shift is performed; and for the fourth row a 3-byte circular left shift is performed. This transformation is called __________ .
A. AddRoundKey
B. ShiftRows
C. MixColumns
D. Substitute bytes
B. ShiftRows
Computer Science & Information Technology
You might also like to view...
Which of the following is not one of the classification levels for national security information?
A) Secret B) Protected C) Confidential D) Unclassified
Computer Science & Information Technology
Tracking monitoring involves assessing the status of the program as indicated by the database information and mapping it to standards established by the agency. __________
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When you import data, where can you not store it?
A. New form B. New table C. Existing table D. Linked table
Computer Science & Information Technology
What type of employee is the most dangerous when it comes to internal IT attacks?
data entry clerks financial professionals IT professionals IT security professionals
Computer Science & Information Technology