diff options
author | Egor Tensin <Egor.Tensin@gmail.com> | 2016-06-25 03:03:28 +0300 |
---|---|---|
committer | Egor Tensin <Egor.Tensin@gmail.com> | 2016-06-25 03:03:28 +0300 |
commit | 78f17d87269d757ff685305a141fd725f161165a (patch) | |
tree | bf26a301df9644e2a42d4df29405035c57a529fb | |
parent | README updates (diff) | |
download | aes-tools-78f17d87269d757ff685305a141fd725f161165a.tar.gz aes-tools-78f17d87269d757ff685305a141fd725f161165a.zip |
README updates
-rw-r--r-- | README.md | 12 | ||||
-rw-r--r-- | test/README.md | 29 |
2 files changed, 24 insertions, 17 deletions
@@ -3,20 +3,18 @@ AES tools Simple AES implementation and utilities. -Development ------------ - -### Prerequisites +Prerequisites +------------- -To build the whole solution, you first need to build a few of Boost's -libraries. +To build the solution, you first need to build a few of Boost's libraries. The complete list of Boost dependencies is: * Boost.Filesystem, * Boost.Program_options, * Boost.System. -### Building +Building +-------- Create the build files using CMake and build using your native build tools (Visual Studio/make/etc.). diff --git a/test/README.md b/test/README.md index 0cc74cd..db561f0 100644 --- a/test/README.md +++ b/test/README.md @@ -19,14 +19,18 @@ You can validate the implementation manually using the block encryption/decryption utilities `encrypt_block.exe` and `decrypt_block.exe`. Pass the `--help` flag to examine the utility's usage info. - > encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff - 69c4e0d86a7b0430d8cdb78070b4c55a - - > decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd - 6bc1bee22e409f96e93d7e117393172a - ae2d8a571e03ac9c9eb76fac45af8e51 - 30c81c46a35ce411e5fbc1191a0a52ef - f69f2445df4f9b17ad2b417be66c3710 +``` +> encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff +69c4e0d86a7b0430d8cdb78070b4c55a +``` + +``` +> decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd +6bc1bee22e409f96e93d7e117393172a +ae2d8a571e03ac9c9eb76fac45af8e51 +30c81c46a35ce411e5fbc1191a0a52ef +f69f2445df4f9b17ad2b417be66c3710 +``` Validation programs ------------------- @@ -56,13 +60,16 @@ Pass the `--help` flag to examine the script's usage info. ### Prerequisites To run the test scripts, Python 3.4 or higher is required. +The author is using Python 3.5.1. ### NIST Special Publication 800-38A To validate the implementation using the inputs from [NIST SP 800-38A], use `nist-sp-800-32a.py`: - > nist-sp-800-38a.py -p C:\workspace\personal\build\aes-tools\utils\Debug +``` +> nist-sp-800-38a.py -p C:\workspace\personal\build\aes-tools\utils\Debug +``` [NIST SP 800-38A]: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf @@ -70,7 +77,9 @@ To validate the implementation using the inputs from [NIST SP 800-38A], use To validate the implementation using the inputs from [CAVP], use `cavp.py`. - > cavp.py -p C:\workspace\personal\build\aes-tools\utils\Debug +``` +> cavp.py -p C:\workspace\personal\build\aes-tools\utils\Debug +``` The AES Known Answer Test (KAT) Vectors are used and read from "KAT_AES.zip". |