Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Rijndael Algorithm: Encryption and Decryption Process - Prof. Krzysztof Gaj, Study notes of Electrical and Electronics Engineering

An overview of the rijndael encryption algorithm, detailing the steps involved in both encryption and decryption processes. The algorithm consists of several rounds, each including subbytes, shiftrows, addroundkey, and mixcolumns transformations. The document also covers the properties of these component transformations and their inverse operations.

Typology: Study notes

Pre 2010

Uploaded on 02/12/2009

koofers-user-9cb
koofers-user-9cb 🇺🇸

10 documents

1 / 5

Toggle sidebar

Related documents


Partial preview of the text

Download Rijndael Algorithm: Encryption and Decryption Process - Prof. Krzysztof Gaj and more Study notes Electrical and Electronics Engineering in PDF only on Docsity! 1 Rijndael ECE 746: Lecture 2 (cont) AddRoundKey SubBytes ShiftRows MixColumns AddRoundKey Encryption SubBytes ShiftRows AddRoundKey Nr-1 timesRoundKey[i] i:=i+1 RoundKey[0] i:=1 i<Nr-1? RoundKey[Nr] 2 AddRoundKey AddRoundKey InvMixColumns InvShiftRows InvSubBytes Decryption (1) InvShiftRows InvSubBytes AddRoundKey Nr-1 times RoundKey[i] i:=i-1 RoundKey[Nr] i:=Nr-1 i>1? RoundKey[0] Properties of component transformations (1) SubBytes ShiftRows  ShiftRows SubBytes InvSubBytes InvShiftRows  InvShiftRows InvSubBytes
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved