我正在尝试使用英特尔 SI 让 EAX 工作。使用https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf上的论文,我有一个输入键:
Cipher Key = 2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c
我正在尝试匹配看起来应该是的第二个扩展键:
rk[1] = A0 FA FE 17 88 54 2C B1 23 A3 39 39 2A 6C 76 05
我从网上使用英特尔内在函数获取了各种片段,例如:https ://www.thesalmons.org/john/random123/releases/1.09/docs/aes_8h_source.html 。它们都收敛于不同的值:
rk[1] = C0 7F 9F 93 E8 D1 4D 35 43 26 58 BD 4A E9 17 81
这是我正在使用的示例片段:
#include <wmmintrin.h>
#include <emmintrin.h>
#include <smmintrin.h>
void dump(const char *banner, __m128i v) {
printf("%s: ", banner);
uint16_t *v64val = (uint16_t*) &v;
for (int i =0; i < 4; ++i) {
printf("%02X\n", *(v64val+i*2+1));
printf("%02X\n", *(v64val+i*2));
}
}
__m128i AES_128_ASSIST (__m128i temp1, __m128i temp2) {
__m128i temp3;
temp2 = _mm_shuffle_epi32 (temp2 ,0xff);
temp3 = _mm_slli_si128 (temp1, 0x4);
temp1 = _mm_xor_si128 (temp1, temp3);
temp3 = _mm_slli_si128 (temp3, 0x4);
temp1 = _mm_xor_si128 (temp1, temp3);
temp3 = _mm_slli_si128 (temp3, 0x4);
temp1 = _mm_xor_si128 (temp1, temp3);
temp1 = _mm_xor_si128 (temp1, temp2);
return temp1;
}
void AES_key_expansion_raw(uint32_t key[], __m128i *ret) {
__m128i rkey, tmp2;
ret[0] = rkey = _mm_loadu_si128((__m128i*)key);
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x1);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[1] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x2);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[2] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x4);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[3] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x8);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[4] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x10);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[5] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x20);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[6] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x40);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[7] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x80);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[8] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x1b);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[9] = rkey;
tmp2 = _mm_aeskeygenassist_si128(rkey, 0x36);
rkey = AES_128_ASSIST(rkey, tmp2);
ret[10] = rkey;
}
int main() {
printf("INTEL:\n");
__m128i rdkeys[11];
uint32_t key[] = {0x2b7e1516, 0x28aed2a6, 0xabf71588, 0x09cf4f3c};
AES_key_expansion_raw(key, rdkeys);
for (int i = 0; i < 11; ++i) {
dump("RK", rdkeys[i]);
}
return 0;
}
我并没有完全从阅读 _mm_aeskeygenassist_si128 的文档中得到我应该如何使用它来生成轮密钥,而且我对我看到的似乎生成不匹配的轮密钥的各种实现更加困惑AES 规范。
关于如何调和的任何想法?谢谢!