CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - s_box
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - s_box - List
[
Crack Hack
]
s_box实现
DL : 0
这是一个用VC.net实现的AES的S-box的实现代码,包括求逆和s盒的实现代码-This is a realization of the use VC.net AES S-box realization of the code, including inversion and the realization s box code
Update
: 2008-10-13
Size
: 7.66kb
Publisher
:
刘力
[
Crack Hack
]
DesLA
DL : 0
功能:对称算法DES的安全性分析--线性分析 (即8个S_Box的线性分析)-function : symmetric DES algorithm Safety Analysis -- linear analysis (ie eight S_Box linear analysis)
Update
: 2008-10-13
Size
: 2.83kb
Publisher
:
小布丁
[
Crack Hack
]
s_box实现
DL : 0
这是一个用VC.net实现的AES的S-box的实现代码,包括求逆和s盒的实现代码-This is a realization of the use VC.net AES S-box realization of the code, including inversion and the realization s box code
Update
: 2025-02-19
Size
: 7kb
Publisher
:
刘力
[
Crack Hack
]
DesLA
DL : 0
功能:对称算法DES的安全性分析--线性分析 (即8个S_Box的线性分析)-function : symmetric DES algorithm Safety Analysis-- linear analysis (ie eight S_Box linear analysis)
Update
: 2025-02-19
Size
: 3kb
Publisher
:
小布丁
[
Crack Hack
]
aes_sbox
DL : 0
The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key schedule function key_expansion and the en- and decrypting functions cipher and inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the same finite field. In any speed optimized real-world application the substitution tables would definitely be hard coded a priori in a constant but in the scope of this educational paper it seems to be interesting, how the S-boxes can be generated.-The substitution tables (S-boxes) s_box and inv_s_box are used by the expanded key schedule function key_expansion and the en- and decrypting functions cipher and inv_cipher to directly substitute a byte (element of GF(28)) by another byte of the same finite field. In any speed optimized real-world application the substitution tables would definitely be hard coded a priori in a constant but in the scope of this educational paper it seems to be interesting, how the S-boxes can be generated.
Update
: 2025-02-19
Size
: 2kb
Publisher
:
darshan
[
Crack Hack
]
aes_inv_sbox
DL : 0
The inverse S-box is used in the decrypting function inv_cipher to revert the substitution carried out via the S-box. The corresponding AES-Matlab function declared in Line 1 of Listing 7 takes the Sbox (s_box) as its input and generates the inverse S-box inv_s_box in a single loop . The loop runs through all elements of the S-box, interprets the current S-box element value as an index into the inverse S-box and inserts the values 0 . . . 255 at the appropriate places in the inverse S-box-The inverse S-box is used in the decrypting function inv_cipher to revert the substitution carried out via the S-box. The corresponding AES-Matlab function declared in Line 1 of Listing 7 takes the Sbox (s_box) as its input and generates the inverse S-box inv_s_box in a single loop . The loop runs through all elements of the S-box, interprets the current S-box element value as an index into the inverse S-box and inserts the values 0 . . . 255 at the appropriate places in the inverse S-box
Update
: 2025-02-19
Size
: 2kb
Publisher
:
darshan
[
Crack Hack
]
aes_key_expand_128
DL : 0
The key expansion function takes the user supplied 16 bytes long key and utilizes the previously created round constant matrix rcon and the substitution table s_box to generate a 176 byte long key schedule w, which will be used during the en- and decryption processes. The blue arrowed closed loop indicates that the functions rot_word and sub_bytes are called iteratively by the key expansion function.-The key expansion function takes the user supplied 16 bytes long key and utilizes the previously created round constant matrix rcon and the substitution table s_box to generate a 176 byte long key schedule w, which will be used during the en- and decryption processes. The blue arrowed closed loop indicates that the functions rot_word and sub_bytes are called iteratively by the key expansion function.
Update
: 2025-02-19
Size
: 1kb
Publisher
:
darshan
[
Crack Hack
]
aes_cipher_top
DL : 0
the first task of the ”main” program aes_demo is a call to aes_init in Line 1. This initialization routine supplies 1 the actual en- and decryption functions (cipher and inv_cipher) with the expanded key schedule w, the substitution tables s_box and inv_s_box, and the polynomial matrices poly_mat and inv_poly_mat. These quantities have to be generated only once and can be used by any subsequent en- or decipher call.
Update
: 2025-02-19
Size
: 2kb
Publisher
:
darshan
[
Other
]
AES-test
DL : 0
AES对128bit数据的加密算法实现。s_box.txt中保存的是s盒和密钥-AES 128bit data encryption algorithm. s_box.txt saved s box and key
Update
: 2025-02-19
Size
: 4kb
Publisher
:
YY
[
Successful incentive
]
AES---part-1-5
DL : 0
In the initialization step the S-boxes (S_BOX and INV_S_BOX) and the polynomial matrices (POLY_MAT and INV_POLY_MAT) are created and an example cipher key is expanded into the round key schedule (W).aes part1-5-In the initialization step the S-boxes (S_BOX and INV_S_BOX) and the polynomial matrices (POLY_MAT and INV_POLY_MAT) are created and an example cipher key is expanded into the round key schedule (W).aes part1-5
Update
: 2025-02-19
Size
: 2kb
Publisher
:
Mahmoudi
[
Successful incentive
]
AES---part-4-5
DL : 0
In the initialization step the S-boxes (S_BOX and INV_S_BOX) and the polynomial matrices (POLY_MAT and INV_POLY_MAT) are created and an example cipher key is expanded into the round key schedule (W).aes part4-5-In the initialization step the S-boxes (S_BOX and INV_S_BOX) and the polynomial matrices (POLY_MAT and INV_POLY_MAT) are created and an example cipher key is expanded into the round key schedule (W).aes part4-5
Update
: 2025-02-19
Size
: 3kb
Publisher
:
Mahmoudi
[
Wavelet
]
s_box
DL : 0
s_box table for AES algorithm
Update
: 2025-02-19
Size
: 1kb
Publisher
:
hojin
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.