What is the correct order of operation within each round of the Whirlpool algorithm?
(a) Add round key, Substitute bytes, Mix rows, Shift columns
(b) Substitute bytes, Add round key, Shift columns, Mix rows
(c) Mix rows, Substitute bytes, Shift columns, Add round key
(d) Substitute bytes, Shift columns, Mix rows, Add round key
The question was asked during an interview.
Asked question is from Whirlpool Algorithm in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security