2017-06-06 03:11:58 +03:00
### Tiny AES in C
2014-05-30 16:24:49 +04:00
2017-06-06 23:37:28 +03:00
This is a small and portable implementation of the AES ECB and CBC encryption algorithms written in C.
2015-11-10 02:32:29 +03:00
2017-07-10 12:46:25 +03:00
You can override the default block-size of 128 bit with 192 or 256 bit by defining the symbols AES192 or AES256 in `aes.h` .
2017-07-08 04:45:30 +03:00
2014-07-13 06:16:34 +04:00
The API is very simple and looks like this (I am using C99 `<stdint.h>` -style annotated types):
2014-07-12 04:24:10 +04:00
2014-07-12 04:26:22 +04:00
```C
2017-06-06 03:11:58 +03:00
void AES_ECB_encrypt(uint8_t* input, const uint8_t* key, uint8_t* output);
void AES_ECB_decrypt(uint8_t* input, const uint8_t* key, uint8_t* output);
void AES_CBC_encrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, const uint8_t* key, const uint8_t* iv);
void AES_CBC_decrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, const uint8_t* key, const uint8_t* iv);
2014-07-12 04:25:58 +04:00
```
2017-07-08 04:45:30 +03:00
2014-07-12 04:24:10 +04:00
2014-12-15 23:30:25 +03:00
You can choose to use one or both of the modes-of-operation, by defining the symbols CBC and ECB. See the header file for clarification.
2017-07-11 01:13:01 +03:00
There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length.
2014-05-31 02:45:54 +04:00
2017-07-13 11:42:27 +03:00
The module uses less than 200 bytes of RAM and 2.3K ROM when compiled for ARM (< 2K for Thumb but YMMV ) .
2014-05-29 04:29:06 +04:00
2015-11-11 01:27:08 +03:00
It is one of the smallest implementation in C I've seen yet, but do contact me if you know of something smaller (or have improvements to the code here).
2014-05-29 04:43:12 +04:00
2014-05-31 02:45:42 +04:00
I've successfully used the code on 64bit x86, 32bit ARM and 8 bit AVR platforms.
2014-05-29 04:43:12 +04:00
2017-07-10 22:54:27 +03:00
GCC size output when only ECB mode is compiled for ARM (using 128 bit block size):
2014-05-29 04:43:12 +04:00
2014-12-15 23:32:42 +03:00
$ arm-none-eabi-gcc -Os -c aes.c -DCBC=0
2014-06-03 00:35:03 +04:00
$ size aes.o
text data bss dec hex filename
2017-07-13 11:42:27 +03:00
2071 0 184 2255 8cf aes.o
2014-06-03 00:35:03 +04:00
2014-05-31 02:46:46 +04:00
2017-07-13 11:42:27 +03:00
.. and when compiling for the THUMB instruction set, we end up just above 1.7K in code size.
2014-07-12 22:52:42 +04:00
2017-07-13 11:42:27 +03:00
$ arm-none-eabi-gcc -mthumb -Os -c aes.c -DCBC=0 -DAES128=1
2014-07-12 22:52:42 +04:00
$ size aes.o
text data bss dec hex filename
2017-07-13 11:42:27 +03:00
1551 0 184 1735 6c7 aes.o
2014-12-11 01:33:59 +03:00
2014-07-12 22:52:42 +04:00
2017-07-08 03:09:20 +03:00
2017-07-08 03:06:17 +03:00
I am using the Free Software Foundation, ARM GCC compiler:
2014-05-31 02:46:46 +04:00
2014-05-30 16:31:32 +04:00
$ arm-none-eabi-gcc --version
2017-07-08 03:06:17 +03:00
arm-none-eabi-gcc (4.8.4-1+11-1) 4.8.4 20141219 (release)
2014-05-30 16:31:32 +04:00
Copyright (C) 2013 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
2014-05-29 05:58:14 +04:00
2014-05-29 06:04:06 +04:00
2014-05-31 02:46:46 +04:00
2014-07-13 06:18:42 +04:00
This implementation is verified against the data in:
2014-05-31 02:46:13 +04:00
2017-06-05 23:55:00 +03:00
[National Institute of Standards and Technology Special Publication 800-38A 2001 ED ](http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf ) Appendix F: Example Vectors for Modes of Operation of the AES.
2014-05-30 16:35:26 +04:00
2014-05-31 02:45:42 +04:00
2017-07-10 22:54:27 +03:00
A heartfelt thank-you to all the nice people out there who have contributed to this project.
2014-09-09 01:46:59 +04:00
All material in this repository is in the public domain.