William Stallings , Cryptography and Network Security 5e:威廉网络,密码学与网络安全:.pptVIP

  • 21
  • 0
  • 约3.24万字
  • 约 32页
  • 2018-03-02 发布于江西
  • 举报

William Stallings , Cryptography and Network Security 5e:威廉网络,密码学与网络安全:.ppt

William Stallings , Cryptography and Network Security 5e:威廉网络,密码学与网络安全:

Implementation Aspects can efficiently implement on 32-bit CPU redefine steps to use 32-bit words can precompute 4 tables of 256-words then each column in each round can be computed using 4 table lookups + 4 XORs at a cost of 4Kb to store tables designers believe this very efficient implementation was a key factor in its selection as the AES cipher Summary have considered: the AES selection process the details of Rijndael – the AES cipher looked at the steps in each round the key expansion implementation aspects * Lecture slides by Lawrie Brown for “Cryptography and Network Security”, 5/e, b

文档评论(0)

1亿VIP精品文档

相关文档