Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Using AES Encryption and Decryption with Stellaris® Microcontrollers

Using AES Encryption and Decryption with Stellaris® Microcontrollers

Ratings: (0)|Views: 299|Likes:
Published by Ti Microcontrollers
For more information on the Stellaris family of microcontrollers, visit http://bit.ly/TI_Stellaris

The Advanced Encryption Standard (AES) is a publicly defined encryption1 standard used by the
U.S. government. It is a strong encryption method with reasonable performance and size, replacing
both the Data Encryption Standard (DES) and the Triple Data Encryption Standard (3DES), the latter
of which is a set of various incompatible forms of running DES three times to get more than 56 bits of
key2. AES is fast in both hardware and software, is fairly easy to implement, and requires little
memory.
Note: This application note assumes that you have at least a basic to moderate understanding of
data encryption and decryption3 and associated standards. Encryption-related terms are
defined in footnotes on the page in which the term first occurs. There are also many sources
of information on cryptography, and this application note is not intended to replace those.

Microcontroller http://www.ti.com/lsds/ti/microcontroller/home.page?DCMP=TI_MCUS&HQS=Other+OT+mcu
8 bit microcontroller http://www.ti.com/mcu/docs/mcuproductcontentnp.tsp?sectionId=95&tabId=2858&familyId=1937
16 bit microcontroller http://www.ti.com/lsds/ti/microcontroller/16-bit_msp430/overview.page
32 bit microcontroller http://www.ti.com/lsds/ti/microcontroller/32-bit_c2000/overview.page
ARM microcontroller http://www.ti.com/lsds/ti/microcontroller/arm_stellaris/overview.page?DCMP=Luminary&HQS=Other+OT+stellaris
For more information on the Stellaris family of microcontrollers, visit http://bit.ly/TI_Stellaris

The Advanced Encryption Standard (AES) is a publicly defined encryption1 standard used by the
U.S. government. It is a strong encryption method with reasonable performance and size, replacing
both the Data Encryption Standard (DES) and the Triple Data Encryption Standard (3DES), the latter
of which is a set of various incompatible forms of running DES three times to get more than 56 bits of
key2. AES is fast in both hardware and software, is fairly easy to implement, and requires little
memory.
Note: This application note assumes that you have at least a basic to moderate understanding of
data encryption and decryption3 and associated standards. Encryption-related terms are
defined in footnotes on the page in which the term first occurs. There are also many sources
of information on cryptography, and this application note is not intended to replace those.

Microcontroller http://www.ti.com/lsds/ti/microcontroller/home.page?DCMP=TI_MCUS&HQS=Other+OT+mcu
8 bit microcontroller http://www.ti.com/mcu/docs/mcuproductcontentnp.tsp?sectionId=95&tabId=2858&familyId=1937
16 bit microcontroller http://www.ti.com/lsds/ti/microcontroller/16-bit_msp430/overview.page
32 bit microcontroller http://www.ti.com/lsds/ti/microcontroller/32-bit_c2000/overview.page
ARM microcontroller http://www.ti.com/lsds/ti/microcontroller/arm_stellaris/overview.page?DCMP=Luminary&HQS=Other+OT+stellaris

More info:

Published by: Ti Microcontrollers on May 04, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/12/2014

pdf

text

original

 
AN01251-03
Copyright © 2009–2010 Texas Instruments
Application Note
Using AES Encryption and Decryption withStellaris® Microcontrollers
 
Application Note
Using AES Encryption and Decryption with Stellaris® Microcontrollers January 8, 2010
Copyright
Copyright © 2009–2010 Texas Instruments, Inc. All rights reserved. Stellaris and StellarisWare are registered trademarks of Texas Instruments.ARM and Thumb are registered trademarks, and Cortex is a trademark of ARM Limited. Other names and brands may be claimed as the propertyof others.Texas Instruments108 Wild Basin, Suite 350Austin, TX 78746http://www.ti.com/stellaris
 
Application Note
Using AES Encryption and Decryption with Stellaris® Microcontrollers January 8, 2010
Table of Contents
Introduction.........................................................................................................................................................5Encryption Method Summary.............................................................................................................................5Electronic Code Book (ECB)...........................................................................................................................6Cipher Block Chaining (CBC).........................................................................................................................6Cipher Feedback (CFB)..................................................................................................................................6Counter (CTR)................................................................................................................................................6Summary.........................................................................................................................................................7Source Code Summary and Configuration.........................................................................................................7Adding AES Encryption to Your Application.......................................................................................................9Selecting an Initialization Vector...................................................................................................................10Verification....................................................................................................................................................11General Considerations................................................................................................................................12Types of Attacks.......................................................................................................................................13Sizes.............................................................................................................................................................15Performance.................................................................................................................................................15References.......................................................................................................................................................16

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Sergey Fonaryov liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->