正在加载图片...
Table of Figures Figure 1.Hexadecimal representation of bit patterns. 8 Figure 2.Indices for Bytes and Bits................ 9 Figure 3.State array input and output............ 9 Figure 4.Key-Block-Round Combinations........................... 14 Figure 5.Pseudo Code for the Cipher...................... 15 Figure 6.SubBytes()applies the S-box to each byte of the State. 16 Figure 7.S-box:substitution values for the byte xy (in hexadecimal format).. 16 Figure 8.ShiftRows (cyclically shifts the last three rows in the State........................... 17 Figure 9.MixColumns (operates on the State column-by-column................. .18 Figure 10.AddRoundKey (XORs each column of the State with a word from the key 19 schedube.19 Figure 11.Pseudo Code for Key Expansion. 20 Figure 12.Pseudo Code for the Inverse Cipher.21 Figure 13.InvshiftRows()cyclically shifts the last three rows in the State....22 Figure 14.Inverse S-box:substitution values for the byte xy(in hexadecimal format) 22 Figure 15.Pseudo Code for the Equivalent Inverse Cipher.............. 25 33 Table of Figures Figure 1. Hexadecimal representation of bit patterns.................................................................. 8 Figure 2. Indices for Bytes and Bits. ........................................................................................... 9 Figure 3. State array input and output. ........................................................................................ 9 Figure 4. Key-Block-Round Combinations............................................................................... 14 Figure 5. Pseudo Code for the Cipher. ...................................................................................... 15 Figure 6. SubBytes() applies the S-box to each byte of the State. ...................................... 16 Figure 7. S-box: substitution values for the byte xy (in hexadecimal format). ....................... 16 Figure 8. ShiftRows() cyclically shifts the last three rows in the State.............................. 17 Figure 9. MixColumns() operates on the State column-by-column..................................... 18 Figure 10. AddRoundKey() XORs each column of the State with a word from the key schedule....................................................................................................................... 19 Figure 11. Pseudo Code for Key Expansion................................................................................ 20 Figure 12. Pseudo Code for the Inverse Cipher........................................................................... 21 Figure 13. InvShiftRows()cyclically shifts the last three rows in the State. ....................... 22 Figure 14. Inverse S-box: substitution values for the byte xy (in hexadecimal format)............. 22 Figure 15. Pseudo Code for the Equivalent Inverse Cipher......................................................... 25
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有