文件名称:aes_key_expand_128
介绍说明--下载内容均来自于网络,请自行研究使用
The key expansion function takes the user supplied 16 bytes long key and
utilizes the previously created round constant matrix rcon and the substitution table
s_box to generate a 176 byte long key schedule w, which will be used during the en- and
decryption processes.
The blue arrowed closed loop indicates that the functions rot_word and
sub_bytes are called iteratively by the key expansion function.-The key expansion function takes the user supplied 16 bytes long key and
utilizes the previously created round constant matrix rcon and the substitution table
s_box to generate a 176 byte long key schedule w, which will be used during the en- and
decryption processes.
The blue arrowed closed loop indicates that the functions rot_word and
sub_bytes are called iteratively by the key expansion function.
utilizes the previously created round constant matrix rcon and the substitution table
s_box to generate a 176 byte long key schedule w, which will be used during the en- and
decryption processes.
The blue arrowed closed loop indicates that the functions rot_word and
sub_bytes are called iteratively by the key expansion function.-The key expansion function takes the user supplied 16 bytes long key and
utilizes the previously created round constant matrix rcon and the substitution table
s_box to generate a 176 byte long key schedule w, which will be used during the en- and
decryption processes.
The blue arrowed closed loop indicates that the functions rot_word and
sub_bytes are called iteratively by the key expansion function.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
aes_key_expand_128.v