Key Scheduling(cont’d)
Generate encryption round keys
round constants C[i](i=0,1,…,12) and MCi(i=0,1,2,3)
round keys
Decryption round keys are generated according to encryption round keys
Previous slide
Next slide
Back to first slide
View graphic version