Which round provides linear diffusion in the Whirlpool Algorithm?
(a) Add Key
(b) Substitute Bytes
(c) Mix Rows
(d) Shift Rows
The question was posed to me in unit test.
This key question is from Whirlpool Algorithm in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security