diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2015-10-23 11:04:19 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2015-10-23 11:04:19 +0300 |
commit | 6eda6db49bb2f8ae248c7d4049aa06351affe0fa (patch) | |
tree | b4166fabd0c78e7efc13eafe21a18b0ba47acffb | |
parent | ignore Intel SDE's log files (diff) | |
download | aes-tools-6eda6db49bb2f8ae248c7d4049aa06351affe0fa.tar.gz aes-tools-6eda6db49bb2f8ae248c7d4049aa06351affe0fa.zip |
README updates
Diffstat (limited to '')
-rw-r--r-- | README.md | 2 | ||||
-rw-r--r-- | test/README.md | 6 | ||||
-rw-r--r-- | utils/README.md | 10 |
3 files changed, 10 insertions, 8 deletions
@@ -28,7 +28,7 @@ the support for these instructions, one can use [Intel Software Development Emulator](https://software.intel.com/en-us/articles/intel-software-development-emulator). You can then run an executable like this: - > sde -- aes_encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff + > sde -- encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff 69c4e0d86a7b0430d8cdb78070b4c55a ## Documentation diff --git a/test/README.md b/test/README.md index b36db98..cf12953 100644 --- a/test/README.md +++ b/test/README.md @@ -7,17 +7,17 @@ you can verify the implementation either [manually](#manually) or ## Manually You can test the AES implementation using the block encryption/decryption -utilities `aes_encrypt_block.exe` and `aes_decrypt_block.exe`. +utilities `encrypt_block.exe` and `decrypt_block.exe`. Use the `--help` option to examine the usage info of a utility. For example, for AES-128 in ECB mode: - > aes_encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff + > encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff 69c4e0d86a7b0430d8cdb78070b4c55a and for AES-192 in CBC mode: - > aes_decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd + > decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd 6bc1bee22e409f96e93d7e117393172a ae2d8a571e03ac9c9eb76fac45af8e51 30c81c46a35ce411e5fbc1191a0a52ef diff --git a/utils/README.md b/utils/README.md index 988a04a..d07d559 100644 --- a/utils/README.md +++ b/utils/README.md @@ -24,7 +24,7 @@ Please note that verbose output can only be produced when *not* using "boxes" ### encrypt_block.exe -Encrypts 16-byte blocks using AES-128/192/256 in the specified mode of +Encrypts blocks using the selected algorithm in the specified mode of operation. #### Usage examples @@ -52,7 +52,7 @@ run: ### decrypt_block.exe -Decrypts 16-byte blocks using AES-128/192/256 in the specified mode of +Decrypts blocks using the selected algorithm in the specified mode of operation. #### Usage examples @@ -82,7 +82,8 @@ run: ### encrypt_file.exe -Encrypts a file using AES-128/192/256 in the specified mode of operation. +Encrypts a file using the selected algorithm in the specified mode of +operation. #### Usage examples @@ -109,7 +110,8 @@ run ### decrypt_file.exe -Decrypts a file using AES-128/192/256 in the specified mode of operation. +Decrypts a file using the selected algorithm in the specified mode of +operation. #### Usage examples |