39.7k views
1 vote
The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:

a. in multiple sessions of communications one after the other. For example, if someone has 12 keys, they can use it for twelve video calls one after the other.
b. such that one of them is picked up at random at a time.
c. some as private keys, some as public keys.
d. for different rounds of encryption for the same plaintext to strengthen the cipher.

User Lacton
by
5.5k points

1 Answer

2 votes

Answer:

Option(d) is the correct answer to the given question .

Step-by-step explanation:

There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.

  • The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.
  • The Option (b) is wrong because In the key scheduling we do not used the the random key for the encryption process .
  • The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.

User Heady
by
5.2k points