A key schedule is:

A.
A set of subkeys derived from a secret key
B.
A method of generating keys by the use of random numbers
C.
Using distributed computing resources to conduct a brute force
attack on a symmetric algorithm
D.
A list of cryptographic keys to be used at specified dates and times
Explanation:
The subkeys are typically used in iterated block ciphers. In this
type of cipher, the plaintext is broken into fixed-length blocks and
enciphered in rounds. In a round, the same transformation is
applied using one of the subkeys of the key schedule.
subkey.
0
0