This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 10 to 14 rounds (depends on key length) Iterated block cipher (like DES) Not a Feistel cipher (unlike DES) Each round uses 4 functions (in 3 layers) ByteSub (nonlinear layer) ShiftRow (linear mixing layer) MixColumn (nonlinear layer) AddRoundKey (key addition layer)...
View Full Document
- Fall '10
- Information Security