aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
context:
space:
mode:
-rw-r--r--README.md2
-rw-r--r--test/README.md6
-rw-r--r--utils/README.md10
3 files changed, 10 insertions, 8 deletions
diff --git a/README.md b/README.md
index 277eb91..09361a8 100644
--- a/README.md
+++ b/README.md
@@ -28,7 +28,7 @@ the support for these instructions, one can use
[Intel Software Development Emulator](https://software.intel.com/en-us/articles/intel-software-development-emulator).
You can then run an executable like this:
- > sde -- aes_encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
+ > sde -- encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
69c4e0d86a7b0430d8cdb78070b4c55a
## Documentation
diff --git a/test/README.md b/test/README.md
index b36db98..cf12953 100644
--- a/test/README.md
+++ b/test/README.md
@@ -7,17 +7,17 @@ you can verify the implementation either [manually](#manually) or
## Manually
You can test the AES implementation using the block encryption/decryption
-utilities `aes_encrypt_block.exe` and `aes_decrypt_block.exe`.
+utilities `encrypt_block.exe` and `decrypt_block.exe`.
Use the `--help` option to examine the usage info of a utility.
For example, for AES-128 in ECB mode:
- > aes_encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
+ > encrypt_block.exe -a aes128 -m ecb -- 000102030405060708090a0b0c0d0e0f 00112233445566778899aabbccddeeff
69c4e0d86a7b0430d8cdb78070b4c55a
and for AES-192 in CBC mode:
- > aes_decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd
+ > decrypt_block.exe -a aes192 -m cbc -- 8e73b0f7da0e6452c810f32b809079e562f8ead2522c6b7b 000102030405060708090a0b0c0d0e0f 4f021db243bc633d7178183a9fa071e8 b4d9ada9ad7dedf4e5e738763f69145a 571b242012fb7ae07fa9baac3df102e0 08b0e27988598881d920a9e64f5615cd
6bc1bee22e409f96e93d7e117393172a
ae2d8a571e03ac9c9eb76fac45af8e51
30c81c46a35ce411e5fbc1191a0a52ef
diff --git a/utils/README.md b/utils/README.md
index 988a04a..d07d559 100644
--- a/utils/README.md
+++ b/utils/README.md
@@ -24,7 +24,7 @@ Please note that verbose output can only be produced when *not* using "boxes"
### encrypt_block.exe
-Encrypts 16-byte blocks using AES-128/192/256 in the specified mode of
+Encrypts blocks using the selected algorithm in the specified mode of
operation.
#### Usage examples
@@ -52,7 +52,7 @@ run:
### decrypt_block.exe
-Decrypts 16-byte blocks using AES-128/192/256 in the specified mode of
+Decrypts blocks using the selected algorithm in the specified mode of
operation.
#### Usage examples
@@ -82,7 +82,8 @@ run:
### encrypt_file.exe
-Encrypts a file using AES-128/192/256 in the specified mode of operation.
+Encrypts a file using the selected algorithm in the specified mode of
+operation.
#### Usage examples
@@ -109,7 +110,8 @@ run
### decrypt_file.exe
-Decrypts a file using AES-128/192/256 in the specified mode of operation.
+Decrypts a file using the selected algorithm in the specified mode of
+operation.
#### Usage examples