- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Homework 7.ppt
JLM 2006021914:16 Homework 7 Homework 7 – Problem 1 We saw that a typical round of AES consisted of the following operations: for each byte, b in state ByteSub(b) ShiftRow(state) if(iNr) MixCol(state) AddRoundKey(i, state) For the 128 bit key, 128 bit block size version of Rijndael, using lookup tables to reduce the computations required and assuming basic operations (32 bit lookup, 32 bit xor, etc) all take about .001 microseconds and your code/data budget is under 16 MB, design a implementation of the round operations that is faster than implementing each of the primitive operations (ByteSub, ShiftRow, MixCol). How long does each round take (about)? Counter mode use of AES is used by selecting a nonce (n) and constructing cipher blocks AESK(n||ctr), AESK(n||ctr+1), AESK(n||ctr+2),…. The resulting bits are xored into the plaintext (as with the stream cipher). What properties of AES make this safe? Can the keystream be generated in parallel and stored for later use? What performance properties does this mode have over ECB? Homework 7 – Answer 1 Let the input to round and the round key be and let S[a] be the table which contains the values of ByteSub then after the Shiftrow operation, the “state” is Homework 7 – Answer 1 MixCol transforms a column as specified: [t0, t1, t2, t3]T ? t0 [2,1,1,3]T ? t1 [3,2,1,1]T ? t2 [1,3,2,1]T ? t3 [1,1,3,2]T So after MixCol the column j of the state matrix (for 128 bit key, 128 bit block) is: S[a0,j] [2,1,1,3]T ? S[a0,j-1] [3,2,1,1]T ? S[a0,j-2] [1,3,2,1]T ? S[a0,j-3] [1,1,3,2]T Setting T0(a)= S[a] [2,1,1,3]T , T1(a)= S[a] [3,2,1,1]T, T2(a)= S[a] [1,3,2,1]T, T3(a)= S[a] [1,1,3,2]T The output state, expressed as four columns, bj, resulting from an input state , aij, and the key expressed as columns kj, is: bj= kj? T0(a0,j) ? T1(a1,j-1)? T2(a2,j-2)? T3(a3,j-3) ……… RoundTransform The Ti tables are 1KB each for a total of 4 KB. With these RoundTransform requires about 16 lookups on Ti plus about 15
您可能关注的文档
- Chapter 9 Teams and Teamwork.ppt
- Chapter 9 Using programming languages on zOS.ppt
- Chapter 9 Virtual Memory.ppt
- Chapter 9Acids and Bases.ppt
- Chapter 9Baroque Instrumental Music.ppt
- Chapter 9Corporate Strategy and Diversification.PPT
- Chapter 9Cost Planning and Performance.ppt
- Chapter 9Dealing with the Competitionby.ppt
- Chapter 9Dynamic Decision Processes.ppt
- CHAPTER 9Financial statement analysis I.ppt
- Homology vs. Homoplasy.ppt
- Hoofdstuk 7.ppt
- Hoofdstuk 9Marktsegmentatie en positionering.ppt
- HOW AMERICA RESPONDED Public Opinion after 91101.ppt
- How Cells Harvest EnergyChapt. 7.ppt
- How far should JIT vendor-buyer relationships go.ppt
- How to Improve Your English Pronunciation.ppt
- How to prepare for TOEFL Speaking Section(task 1&2).ppt
- How to recite English words.ppt
- How to Write a Paper for the International Journals.ppt
最近下载
- 400字作文稿纸A4打印模板-400字作文稿纸[参考].doc VIP
- 物业三标体系培训.pptx VIP
- 7838G_Ren Jiansheng LD-Parex芳烃联合装置工程变化_04_20.pdf VIP
- 教育法律法规-教育法律法规.ppt VIP
- 《电子商务实务》课程标准.doc VIP
- PCS-9621_120189站用接地变保护装置说明书.doc VIP
- 2024甘肃武威凉州区发放镇招聘专业化管理的大学生村文书历年考试试题及答案.docx
- (2025秋新版)苏教版科学三年级上册全册教案.docx
- 党员转正申请书范文3篇.doc VIP
- 如何与学生进行有效沟通培训.pptx VIP
文档评论(0)