filmov
tv
AES Encryption 5: Expand Keys and Encryption Flow
Показать описание
In this vid we'll complete the encryption side of our implementation of AES. I've decided not to go though decryption, which is much the same type of logic in reverse, and with the opposite look-up tables.
If you actually have to include AES in your programs, use assembly or AES intrinsics. Our implementation is not secure, and it's very slow. Modern CPU's have an instruction set called the AES Instruction Set, which makes this whole task a lot easier, and a lot faster.
The babies you can hear at point are my sweet little nieces. I live with my bro and his gf. They've just had twins. They sound like they're being attacked by an elephant, but they are just hungry. They quieten down when their ma feeds them.
I hope this vid series was helpful for folks studying the algorithm. There's very few examples of exactly how to code this thing. Anywho, I really wanted to make a good go of it. Well here it is! Now we can look at something completely different!
Well probably not that different...?
Music Channel:
Patreon:
FaceBook:
Twitter:
If you actually have to include AES in your programs, use assembly or AES intrinsics. Our implementation is not secure, and it's very slow. Modern CPU's have an instruction set called the AES Instruction Set, which makes this whole task a lot easier, and a lot faster.
The babies you can hear at point are my sweet little nieces. I live with my bro and his gf. They've just had twins. They sound like they're being attacked by an elephant, but they are just hungry. They quieten down when their ma feeds them.
I hope this vid series was helpful for folks studying the algorithm. There's very few examples of exactly how to code this thing. Anywho, I really wanted to make a good go of it. Well here it is! Now we can look at something completely different!
Well probably not that different...?
Music Channel:
Patreon:
FaceBook:
Twitter:
Комментарии