SLAA547C
July 2013 – July 2021
MSP430FR5739
1
Software Benchmarks
1.1
AES Benchmarks
1.2
DES Benchmarks
1.3
SHA-2 Benchmarks
2
Using Library Functions
2.1
AES 128
2.1.1
Encrypting With AES 128
2.1.2
Decrypting With AES 128
2.2
DES
2.2.1
Setting the Key Schedule for DES
2.2.2
Encrypting and Decryption With DES
2.2.3
Encryption and Decryption With DES CBC Mode
2.3
3DES
2.3.1
Encrypting and Decrypting With Triple DES
2.4
SHA-2
2.4.1
Hashing With SHA-256
2.4.2
Hashing With SHA-224
3
Overview of Library Functions
3.1
AES 128
aes_enc_dec
aes_encrypt
3.2
DES and 3DES
Des_Key
Des_Enc
Des_Dec
DES_ENC_CBC
DES_DEC_CBC
TripleDES_ENC
TripleDES_DEC
TripleDES_ENC_CBC
TripleDES_DEC_CBC
3.3
SHA-256 and SHA-224
SHA_256
4
Cryptographic Standard Definitions
4.1
AES
4.1.1
Basic Concept of Algorithm
4.1.2
Structure of Key and Input Data
4.1.3
Substitute Bytes (Subbytes Operation)
4.1.4
Shift Rows (Shiftrows Operation)
4.1.5
Mix Columns (Mixcolumns Operation)
4.1.6
Add Round Key (Addroundkey Operation)
4.1.7
Key Expansion (Keyexpansion Operation)
4.2
DES and 3DES
4.2.1
DES Algorithm Structure
4.2.2
The Function Block
4.2.3
Key Schedule
4.2.4
Triple DES
4.2.5
Cipher Block Chaining (CBC) Mode
4.3
SHA-256 and SHA-224
4.3.1
Message Padding and Parsing
4.3.2
SHA-256 Algorithm
4.3.3
Equations Found in SHA-256 Algorithm
4.3.4
SHA-224
5
References
Revision History
2.4
SHA-2