aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
authorEgor Tensin <Egor.Tensin@gmail.com>2016-06-25 03:03:28 +0300
committerEgor Tensin <Egor.Tensin@gmail.com>2016-06-25 03:03:28 +0300
commit78f17d87269d757ff685305a141fd725f161165a (patch)
treebf26a301df9644e2a42d4df29405035c57a529fb
parentREADME updates (diff)
downloadaes-tools-78f17d87269d757ff685305a141fd725f161165a.tar.gz
aes-tools-78f17d87269d757ff685305a141fd725f161165a.zip
README updates
-rw-r--r--README.md12
-rw-r--r--test/README.md29
2 files changed, 24 insertions, 17 deletions
diff --git a/README.md b/README.md
index f303794..ba4bc16 100644
--- a/README.md
+++ b/README.md
@@ -3,20 +3,18 @@ AES tools
Simple AES implementation and utilities.
-Development
------------
-
-### Prerequisites
+Prerequisites
+-------------
-To build the whole solution, you first need to build a few of Boost's
-libraries.
+To build the solution, you first need to build a few of Boost's libraries.
The complete list of Boost dependencies is:
* Boost.Filesystem,
* Boost.Program_options,
* Boost.System.
-### Building
+Building
+--------
Create the build files using CMake and build using your native build tools
(Visual Studio/make/etc.).
diff --git a/test/README.md b/test/README.md
index 0cc74cd..db561f0 100644
--- a/test/README.md
+++ b/test/README.md
@@ -19,14 +19,18 @@ You can validate the implementation manually using the block
encryption/decryption utilities `encrypt_block.exe` and `decrypt_block.exe`.
Pass the `--help` flag to examine the utility's usage info.
- > encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
- 69c4e0d86a7b0430d8cdb78070b4c55a
-
- > decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd
- 6bc1bee22e409f96e93d7e117393172a
- ae2d8a571e03ac9c9eb76fac45af8e51
- 30c81c46a35ce411e5fbc1191a0a52ef
- f69f2445df4f9b17ad2b417be66c3710
+```
+> encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
+69c4e0d86a7b0430d8cdb78070b4c55a
+```
+
+```
+> decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd
+6bc1bee22e409f96e93d7e117393172a
+ae2d8a571e03ac9c9eb76fac45af8e51
+30c81c46a35ce411e5fbc1191a0a52ef
+f69f2445df4f9b17ad2b417be66c3710
+```
Validation programs
-------------------
@@ -56,13 +60,16 @@ Pass the `--help` flag to examine the script's usage info.
### Prerequisites
To run the test scripts, Python 3.4 or higher is required.
+The author is using Python 3.5.1.
### NIST Special Publication 800-38A
To validate the implementation using the inputs from [NIST SP 800-38A], use
`nist-sp-800-32a.py`:
- > nist-sp-800-38a.py -p C:\workspace\personal\build\aes-tools\utils\Debug
+```
+> nist-sp-800-38a.py -p C:\workspace\personal\build\aes-tools\utils\Debug
+```
[NIST SP 800-38A]: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
@@ -70,7 +77,9 @@ To validate the implementation using the inputs from [NIST SP 800-38A], use
To validate the implementation using the inputs from [CAVP], use `cavp.py`.
- > cavp.py -p C:\workspace\personal\build\aes-tools\utils\Debug
+```
+> cavp.py -p C:\workspace\personal\build\aes-tools\utils\Debug
+```
The AES Known Answer Test (KAT) Vectors are used and read from "KAT_AES.zip".