2017-06-05 17:11:58 -07:00
### Tiny AES in C
2014-05-30 14:24:49 +02:00
2017-12-01 18:32:28 +01:00
This is a small and portable implementation of the AES [ECB ](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_.28ECB.29 ), [CTR ](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_.28CTR.29 ) and [CBC ](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_Block_Chaining_.28CBC.29 ) encryption algorithms written in C.
2015-11-10 00:32:29 +01:00
2017-07-10 11:46:25 +02:00
You can override the default block-size of 128 bit with 192 or 256 bit by defining the symbols AES192 or AES256 in `aes.h` .
2017-07-08 03:45:30 +02:00
2014-07-13 04:16:34 +02:00
The API is very simple and looks like this (I am using C99 `<stdint.h>` -style annotated types):
2014-07-12 02:24:10 +02:00
2014-07-12 02:26:22 +02:00
```C
2017-06-05 17:11:58 -07:00
void AES_ECB_encrypt(uint8_t* input, const uint8_t* key, uint8_t* output);
void AES_ECB_decrypt(uint8_t* input, const uint8_t* key, uint8_t* output);
2017-12-01 01:03:47 +01:00
2017-06-05 17:11:58 -07:00
void AES_CBC_encrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, const uint8_t* key, const uint8_t* iv);
void AES_CBC_decrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, const uint8_t* key, const uint8_t* iv);
2017-12-01 01:03:21 +01:00
2017-12-01 12:04:54 +01:00
/* Same function for encrypting as for decrypting. Note no IV/nonce should ever be reused with the same key */
2017-12-01 01:40:05 +01:00
void AES_CTR_xcrypt_buffer(uint8_t* output, uint8_t* input, uint32_t length, const uint8_t* key, const uint8_t* nonce);
2014-07-12 02:25:58 +02:00
```
2017-07-08 03:45:30 +02:00
2014-07-12 02:24:10 +02:00
2017-12-01 01:55:21 +01:00
You can choose to use any or all of the modes-of-operations, by defining the symbols CBC, CTR or ECB. See the header file for clarification.
2014-12-15 21:30:25 +01:00
2017-07-11 00:13:01 +02:00
There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. The two functions AES_ECB_xxcrypt() do most of the work, and they expect inputs of 128 bit length.
2014-05-31 00:45:54 +02:00
2017-12-01 12:00:03 +01:00
The module uses less than 200 bytes of RAM and 1-2K ROM when compiled for ARM, but YMMV depending on which modes are enabled.
2014-05-29 02:29:06 +02:00
2015-11-10 23:27:08 +01:00
It is one of the smallest implementation in C I've seen yet, but do contact me if you know of something smaller (or have improvements to the code here).
2014-05-29 02:43:12 +02:00
2014-05-31 00:45:42 +02:00
I've successfully used the code on 64bit x86, 32bit ARM and 8 bit AVR platforms.
2014-05-29 02:43:12 +02:00
2017-12-01 12:01:08 +01:00
2017-12-01 12:00:49 +01:00
GCC size output when only CTR mode is compiled for ARM:
2014-05-29 02:43:12 +02:00
2017-12-01 12:00:03 +01:00
$ arm-none-eabi-gcc -Os -DCBC=0 -DECB=0 -DCTR=1 -c aes.c
2014-06-02 22:35:03 +02:00
$ size aes.o
text data bss dec hex filename
2017-12-01 12:00:03 +01:00
1155 0 184 1339 53b aes.o
2014-06-02 22:35:03 +02:00
2017-12-01 12:00:03 +01:00
.. and when compiling for the THUMB instruction set, we end up just above 1K in code size.
2014-05-31 00:46:46 +02:00
2017-12-01 12:00:03 +01:00
$ arm-none-eabi-gcc -Os -mthumb -DCBC=0 -DECB=0 -DCTR=1 -c aes.c
2014-07-12 20:52:42 +02:00
$ size aes.o
text data bss dec hex filename
2017-12-01 12:00:03 +01:00
855 0 184 1039 40f aes.o
2014-07-12 20:52:42 +02:00
2017-07-08 02:09:20 +02:00
2017-07-08 02:06:17 +02:00
I am using the Free Software Foundation, ARM GCC compiler:
2014-05-31 00:46:46 +02:00
2014-05-30 14:31:32 +02:00
$ arm-none-eabi-gcc --version
2017-07-08 02:06:17 +02:00
arm-none-eabi-gcc (4.8.4-1+11-1) 4.8.4 20141219 (release)
2014-05-30 14:31:32 +02:00
Copyright (C) 2013 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
2014-05-29 03:58:14 +02:00
2014-05-29 04:04:06 +02:00
2014-05-31 00:46:46 +02:00
2014-07-13 04:18:42 +02:00
This implementation is verified against the data in:
2014-05-31 00:46:13 +02:00
2017-06-05 13:55:00 -07:00
[National Institute of Standards and Technology Special Publication 800-38A 2001 ED ](http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf ) Appendix F: Example Vectors for Modes of Operation of the AES.
2014-05-30 14:35:26 +02:00
2017-12-01 13:16:26 +01:00
The other appendices in the document are valuable for implementation details on e.g. padding, generation of IVs and nonces in CTR-mode etc.
2014-05-31 00:45:42 +02:00
2017-07-10 21:54:27 +02:00
A heartfelt thank-you to all the nice people out there who have contributed to this project.
2014-09-08 23:46:59 +02:00
All material in this repository is in the public domain.