If you are looking for software to use, go to Huajun Software Park! software release AI product list

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card and a photo of yourself holding the ID card), and send it to email http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Location: Home pagePC softwaresecurity softwareEncryption and decryption AES encryption tool
AES encryption tool

AES encryption tool 1.0 official version

QR code
  • Software licensing: free software
  • Software size: 0.08MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-12-30
  • Application platform: winall
  • Software language: Simplified Chinese
  • Edition: 1.0 official version

Encryption and decryption reputation rankings

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Recommended for you:- AES encryption tool

Basic introduction
AES encryption tool section first LOGO
The official version of AES encryption tool is an aes file encryption software written in java. The latest version of the AES encryption tool is simple and easy to use, supports cross-platform operation, and can help users easily perform AES encryption on files. The AES encryption tool has advanced encryption standards, is compact in size, and has an intuitive interface. Users can directly drag and drop the files that need to be encrypted into the program.

Screenshot of AES encryption tool

Features of AES encryption tool software

​​ 1. Thread optimization for multi-file encryption. But there is no optimization for single files. (Visual inspection of 90 files, 140M, takes 20S, a single file of 880M takes 2M)

​​ 2. There is no verification mechanism for passwords. Because it uses a buffered stream operation (encrypting and decrypting 512kb at a time, so even if the password is incorrectly decrypted, it will not waste much time, an exception will be thrown and a prompt box will pop up), and the operation is more convenient.

​ ​ 3. Since the main purpose is not to learn encryption algorithms, I did not delve into it. There is only one algorithm, AES.

4. The label "(encrypted)" in the file name cannot be changed. Otherwise it will be excluded.

AES encryption tool usage instructions

​ ​ 1. Drag and drop files directly into the program’s list control

2. You can check the box in the settings list to delete the original file.

3. No file shredding function

AES encryption tool software instructions

With the development of symmetric cryptography, the DES data encryption standard algorithm has been unable to adapt to the data encryption security requirements of today's distributed open networks due to its small key length (56 bits). Therefore, in 1997, NIST publicly solicited a new data encryption standard, namely AES [1]. After three rounds of screening, the Belgian Joan Daeman and Vincent The Rijndael algorithm submitted by Rijmen was proposed as the final algorithm for AES. This algorithm will become the new data encryption standard in the United States and be widely used in various fields. Although people still have different views on AES, in general, AES, as a new generation of data encryption standard, brings together the advantages of strong security, high performance, high efficiency, ease of use and flexibility. AES is designed with three key lengths: 128, 192, and 256 bits. Relatively speaking, the 128 key of AES is 1021 times stronger than the 56 key of DES [2]. The AES algorithm mainly includes three aspects: round change, number of turns and key expansion. This article takes 128 as an example to introduce the basic principles of the algorithm; combined with AVR assembly language, the advanced data encryption algorithm AES is implemented.

AES is a group key, the algorithm inputs 128 bits of data, and the key length is also 128 bits. Use Nr to represent the number of rounds of encryption for a data packet (the relationship between the number of encryption rounds and the key length is listed in Table 1). Each round requires the participation of an expanded key (i) with the same length as the input packet. Since the length of the externally input encryption key K is limited, a key expansion program (Keyexpansion) is used in the algorithm to expand the external key K into a longer bit string to generate encryption and decryption keys for each round.

1.1 circle change

       Each circle transformation in AES consists of the following three layers:

Non-linear layer - perform Subbyte transformation;

         Line mixed layer – perform ShiftRow and MixColumn operations;

                                                                                                                                                                                Perform AddRoundKey operation.

​ ​ ① Subbyte transformation is a non-linear byte transformation that acts on each byte in the state, and can be mapped through the calculated S box.

② ShiftRow is a byte transposition. It cyclically shifts the rows in the state according to different offsets, and this offset is also selected based on Nb[3]

​ ​ ③ In the MixColumn transformation, each column in the state is regarded as the result of multiplying the polynomial a(x) on GF(28) and the fixed polynomial c(x). The coefficient of b(x)=c(x)*a(x) is calculated as follows:

*The operation is not an ordinary multiplication operation, but a special operation, that is, b(x)=c(x)·a(x)(mod x4+1) For this operation b0=02. a0+03. a1+a2+a3 Let xtime(a0)=02. a0

      其中,符号“。”表示模一个八次不可约多项式的同余乘法[3]。

For the inverse change, the matrix C needs to be changed to the corresponding D, that is, b(x)=d(x)*a(x).

​ ​ ④ The key addition operation (addround) is to “XOR” the corresponding bytes in the circle key state bit by bit.

⑤ According to the properties of linear change [1], the decryption operation is the inverse change of the encryption change. This will not be described in detail here.

1.2 rounds of changes

For different packet lengths, the corresponding number of round changes is different, as listed in Table 1.

1.3 Key expansion

The AES algorithm uses the external input key K (the number of words in the key string is Nk), and obtains an extended key totaling 4 (Nr+1) words through the key expansion program. It involves the following three modules:

​ ​ ① Position transformation (rotword)-change a 4-byte sequence [A,B,C,D] into [B,C,D,A];

​ ​ ② S-box transformation (subword) - replace a 4-byte S box with an S-box;

​ ​ ③ Transform Rcon[i]——Rcon[i] represents a 32-bit word [xi-1,00,00,00].

         x here is (02), such as Rcon[1]=[01000000];Rcon[2]=[02000000];Rcon[3]=[04000000]……

Generation of extended key: The first Nk words of the extended key are the external key K; the following words W[[i]] are equal to the "exclusive OR" of the previous word W[[i-1]] and the previous Nk word W[[i-Nk]], that is, W[[i]]=W[[i-1]]W[[i- Nk]]. But if i is a multiple of Nk, then W[i]=W[i-Nk]Subword(Rotword(W[[i-1]]))Rcon[i/Nk].

AES encryption tool update log

Working day and night just so you can be happier

                                                                                                                              are all gone!

Huajun editor recommends:

The AES encryption tool is a high-performance software that meets everyone's requirements. The software is free and non-toxic. It has absolutely positive reviews. Our Huajun Software Park has the most authoritative software, which is green and free, officially authorized, and similar.Black Beetle File Encryption Lock,Yitong folder encryption software,Secret folder encryption tool,Universal Encryption Master,U disk super encryption 3000, I hope everyone will come to download it!

FAQ

AES encryption tool

AES encryption tool 1.0 official version

close