Each round uses a different key in the algorithm.
(a) True
(b) False
I had been asked this question by my school principal while I was bunking the class.
My query is from Whirlpool Algorithm topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security