Score:1

What is Inverse equivalent (decrypt) in the AES specification examples?

al flag

Referring to the AES specification:

https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.197.pdf

Printed pages 35-37...

The first detailed walkthrough is encryption, the second is decryption.... I don't understand what is the third, "equivalent inverse cipher (decrypt)"?

How can there be two decryption techniques?

in flag
Read section 5.3.5 of the linked specification (pg. 23 ff.).
Score:3
US flag
Salim Aljayousi

You are correct that the third example in the AES specification (printed pages 35-37) is not a decryption technique, but rather an "equivalent inverse cipher" that demonstrates the inverse of the cipher's encryption algorithm.

there is only one decryption technique in AES, which is the inverse of the encryption algorithm. The third example in the specification is simply another way to express the inverse of the encryption algorithm, and it is not a separate decryption technique.

I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.