正在加载图片...
Cipher Series of transformations that converts plaintext to ciphertext using the Cipher Key. Cipher Key Secret,cryptographic key that is used by the Key Expansion routine to generate a set of Round Keys;can be pictured as a rectangular array of bytes,having four rows and Nk columns. Ciphertext Data output from the Cipher or input to the Inverse Cipher Inverse Cipher Series of transformations that converts ciphertext to plaintext using the Cipher Key. Key Expansion Routine used to generate a series of Round Keys from the Cipher Key. Plaintext Data input to the Cipher or output from the Inverse Cipher. Rijndael Cryptographic algorithm specified in this Advanced Encryption Standard (AES). Round Key Round keys are values derived from the Cipher Key using the Key Expansion routine;they are applied to the State in the Cipher and Inverse Cipher. State Intermediate Cipher result that can be pictured as a rectangular array of bytes,having four rows and Nb columns. S-box Non-linear substitution table used in several byte substitution transformations and in the Key Expansion routine to perform a one- for-one substitution of a byte value. Word A group of 32 bits that is treated either as a single entity or as an array of 4 bytes. 2.2 Algorithm Parameters,Symbols,and Functions The following algorithm parameters,symbols,and functions are used throughout this standard: AddRoundKey ()Transformation in the Cipher and Inverse Cipher in which a Round Key is added to the State using an XOR operation.The length of a Round Key equals the size of the State(i.e.,for Nb =4,the Round Key length equals 128 bits/16 bytes). InvMixColumns ()Transformation in the Inverse Cipher that is the inverse of MixColumns () InvshiftRows ()Transformation in the Inverse Cipher that is the inverse of ShiftRows () InvSubBytes ( Transformation in the Inverse Cipher that is the inverse of SubBytes(). Cipher Key. 66 Cipher Series of transformations that converts plaintext to ciphertext using the Cipher Key. Cipher Key Secret, cryptographic key that is used by the Key Expansion routine to generate a set of Round Keys; can be pictured as a rectangular array of bytes, having four rows and Nk columns. Ciphertext Data output from the Cipher or input to the Inverse Cipher. Inverse Cipher Series of transformations that converts ciphertext to plaintext using the Cipher Key. Key Expansion Routine used to generate a series of Round Keys from the Cipher Key. Plaintext Data input to the Cipher or output from the Inverse Cipher. Rijndael Cryptographic algorithm specified in this Advanced Encryption Standard (AES). Round Key Round keys are values derived from the Cipher Key using the Key Expansion routine; they are applied to the State in the Cipher and Inverse Cipher. State Intermediate Cipher result that can be pictured as a rectangular array of bytes, having four rows and Nb columns. S-box Non-linear substitution table used in several byte substitution transformations and in the Key Expansion routine to perform a one￾for-one substitution of a byte value. Word A group of 32 bits that is treated either as a single entity or as an array of 4 bytes. 2.2 Algorithm Parameters, Symbols, and Functions The following algorithm parameters, symbols, and functions are used throughout this standard: AddRoundKey() Transformation in the Cipher and Inverse Cipher in which a Round Key is added to the State using an XOR operation. The length of a Round Key equals the size of the State (i.e., for Nb = 4, the Round Key length equals 128 bits/16 bytes). InvMixColumns()Transformation in the Inverse Cipher that is the inverse of MixColumns(). InvShiftRows() Transformation in the Inverse Cipher that is the inverse of ShiftRows(). InvSubBytes() Transformation in the Inverse Cipher that is the inverse of SubBytes(). K Cipher Key
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有