Introduction - If you have any usage issues, please Google them yourself
The key expansion function takes the user supplied 16 bytes long key and
utilizes the previously created round constant matrix rcon and the substitution table
s_box to generate a 176 byte long key schedule w, which will be used during the en- and
decryption processes.
The blue arrowed closed loop indicates that the functions rot_word and
sub_bytes are called iteratively by the key expansion function.