The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.
(a) 4096
(b) 4608
(c) 4168
(d) 4864
I have been asked this question during an interview for a job.
Question is taken from Overview topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security