... (final 106b dbfd f323 0876 ← Ciphertext Ytransformation) (Y1)(Y2)(Y3)(Y4)108 INTERNET SECURITY •The AES algorithm’s operations are internally performed on a two-dimensional arrayof bytes ... expansion generates a total of Nb(Nr+ 1) words: aninitial set of Nb words for Nr = 0,and2Nb for Nr = 1,3Nb for Nr = 2, ,11Nb for Nr = 10. Thus, the resulting key schedule consists of a linear array ... Z49,Z50,Z51and Z52, compared to six subkeys for eachof the first eight rounds. Note also that no swap is required for the two inner blocks atthe output transformation stage.Example 3.9Assume that...