文件名称:aes_sbox
介绍说明--下载内容均来自于网络,请自行研究使用
The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key
schedule function key_expansion and the en- and decrypting functions cipher and
inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the
same finite field.
In any speed optimized real-world application the substitution tables would definitely be
hard coded a priori in a constant but in the scope of this educational
paper it seems to be interesting, how the S-boxes can be generated.-The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key
schedule function key_expansion and the en- and decrypting functions cipher and
inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the
same finite field.
In any speed optimized real-world application the substitution tables would definitely be
hard coded a priori in a constant but in the scope of this educational
paper it seems to be interesting, how the S-boxes can be generated.
schedule function key_expansion and the en- and decrypting functions cipher and
inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the
same finite field.
In any speed optimized real-world application the substitution tables would definitely be
hard coded a priori in a constant but in the scope of this educational
paper it seems to be interesting, how the S-boxes can be generated.-The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key
schedule function key_expansion and the en- and decrypting functions cipher and
inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the
same finite field.
In any speed optimized real-world application the substitution tables would definitely be
hard coded a priori in a constant but in the scope of this educational
paper it seems to be interesting, how the S-boxes can be generated.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
aes_sbox.v