Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
3Activity

Table Of Contents

1.1.1 WHAT IS CRYPTOGRAPHY
1.1.2 HOW DOES CRYPTOGRAPHY WORK
1.1.3 THE PURPOSE OF CRYPTOGRAPHY
1.2.1 SYMMETRIC CRYPTOGRAPHY
1.2.2 ASYMMETRIC CRYPTOGRAPHY
1.3 TYPES OF CRYPTOGRAPHIC ALGORITHMS
1.4 INTRODUCTION TO AES
1.5 APPLICATION
2.1 INTRODUCTION
2.2 TERMINOLOGIES
2.3 ALGORITHM PARAMETERS
2.4.1 SPECIFICATION
2.4.2 DESCRIPTION
2.5.1.1 SubBytes Transformation
2.5.1.2 ShiftRows Transformation
2.5.1.3 MixColumns Transformation
2.5.2 KEY EXPANSION
2.6.1.1 InvSubBytes Transformation
2.6.1.2 InvShiftRows Transformation
2.6.1.4 Inverse of the AddRoundKey Transformation
2.7 SUMMARY
3.3 NOTATION AND CONVENTIONS
3.4 MATHEMATICAL PRELIMINARIES
3.5 GENERAL IMPLEMENTATION FLOW
3.6 IMPLEMENTATION
3.7 SUMMARY
4.5 ENTITY FOR TESTING AES ENCRYPTION / DECRYPTION ROUND ***
5.1 INTRODUCTION
5.2 SIMULATION RESULTS
5.3 INTRODUCTION TO FPGA
5.4 SYNTHESIS RESULT
5.5 SUMMARY
6.1 CONCLUSION
6.2 FUTURE SCOPE
7.BIBILOGRAPHY
0 of .
Results for:
No results containing your search query
P. 1
Advance Encryption Standard

Advance Encryption Standard

Ratings: (0)|Views: 598|Likes:
Published by uttamsudhir

More info:

Published by: uttamsudhir on Sep 20, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/08/2012

pdf

text

original

You're Reading a Free Preview
Pages 5 to 36 are not shown in this preview.
You're Reading a Free Preview
Pages 41 to 85 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->