<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LTC AES key setting strangeness in Kinetis Microcontrollers</title>
    <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810025#M49239</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;No, I don't see it.&lt;/P&gt;&lt;P&gt;If the key is same as encryption, you should not set DK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ltc_aes_cbc_exam()&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; status = LTC_AES_DecryptCbc(base, cipher, output, g_length, ive, key128, AES128_KEY_SIZE, kLTC_EncryptKey);&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in &amp;nbsp;LTC_AES_DecryptCbc()&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; if (keyType == kLTC_DecryptKey)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; base-&amp;gt;MD |= (1U &amp;lt;&amp;lt; kLTC_ModeRegBitShiftDK);&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Nov 2018 05:53:31 GMT</pubDate>
    <dc:creator>jingpan</dc:creator>
    <dc:date>2018-11-08T05:53:31Z</dc:date>
    <item>
      <title>LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810022#M49236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using the LTC in a KL82 for AES encryption and decryption I found strange results when setting the AES for decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the test I encrypt and decrypt a single block of 32 bytes.&lt;/P&gt;&lt;P&gt;When entering the AES 256 key for encryption I set the mode to&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;LTC0_MD = (LTC_MD_ALG_AES | LTC_MD_AAI_CBC);&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; // AES key for encryption [0x00100100]&lt;/STRONG&gt;&lt;BR /&gt;(although 0 also works)&lt;/P&gt;&lt;P&gt;The encryption is then OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When entering the AES 256 key for decryption I set the mode to &lt;BR /&gt;&lt;STRONG&gt;LTC0_MD = (LTC_MD_ALG_AES | LTC_MD_AAI_CBC | LTC_MD_AAI_DK); // AES key for decryption [0x00101100]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is accepted - but the decryption fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I then remove the &lt;STRONG&gt;LTC_MD_ALG_AES&lt;/STRONG&gt; flag (0x00100000) and set the key the LTC sets its error interrupt (with error saying that there is an AES&amp;nbsp; mode error). &lt;EM&gt;The only way to clear this error is to reset the LTC.&lt;/EM&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;However now the AES256 decryption of the block works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In fact previously I was just setting the DK bit (which I think is what the SDK examples do) when setting the key for decryption and it had worked. Only when I &lt;EM&gt;realised&lt;/EM&gt; that it was causing the error interrupt to be set, and stopped this by presumably setting the algorithm correctly, did the decryption start failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone explain this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;P.S. I am posting a second question about AES CBC across multiple block so data in a second post, which is related to this too.&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 01:19:46 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810022#M49236</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2018-11-07T01:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810023#M49237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;I think the best way is to use SDK demo and driver directly. I guess there is some sequence issue. For example, the driver set DK at the beginning of LTC_AES_DecryptCbc(). But when it set all control bit in MD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;modeReg = (uint32_t)alg | (uint32_t)enc | (uint32_t)as | (uint32_t)mode;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I modified the code, do not set DK at the beginning, but&lt;/P&gt;&lt;P&gt;modeReg = (uint32_t)alg | (uint32_t)enc | (uint32_t)as | (uint32_t)mode | (uint32_t)(1U&amp;lt;&amp;lt; kLTC_ModeRegBitShiftDK);&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The result was error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jing&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 10:24:03 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810023#M49237</guid>
      <dc:creator>jingpan</dc:creator>
      <dc:date>2018-11-07T10:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810024#M49238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DK must be set "before" (or while) the key is entered otherwise the module will think it is an encrypt key and so it will fail when decrypting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment I can't get the SDK working because MCUXpresso fails to import the project. I'll be doing a complete MCUXpresso update / reinstall shortly to see whether I can resolve it and test the SDK code directly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that SDK does&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;base-&amp;gt;MD |= (1U &amp;lt;&amp;lt; kLTC_ModeRegBitShiftDK);&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;before entering the key but in my experience this causes the error interrupt flag to be set (when DK is set and the other algorithm bits are not appropriate). The fact that the interrupt error is set doesn't cause operational failure but seems strange to me....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;When it works do you also see the error interrupt flag set?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2018 11:13:18 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810024#M49238</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2018-11-07T11:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810025#M49239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;No, I don't see it.&lt;/P&gt;&lt;P&gt;If the key is same as encryption, you should not set DK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In ltc_aes_cbc_exam()&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; status = LTC_AES_DecryptCbc(base, cipher, output, g_length, ive, key128, AES128_KEY_SIZE, kLTC_EncryptKey);&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in &amp;nbsp;LTC_AES_DecryptCbc()&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; if (keyType == kLTC_DecryptKey)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; base-&amp;gt;MD |= (1U &amp;lt;&amp;lt; kLTC_ModeRegBitShiftDK);&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2018 05:53:31 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810025#M49239</guid>
      <dc:creator>jingpan</dc:creator>
      <dc:date>2018-11-08T05:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810026#M49240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I finally managed to run the SDK tests (I woudln't get MCUXpressor to work with the FRDM board so I had to first had to spend some time porting it to IAR). Only after stepping the code did I realise that the reference &lt;SPAN style="text-decoration: underline;"&gt;never actually sets the DK&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I re-read the description for about the 6th time and finally it starts to make sense:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="pastedImage_2.png"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/63444iDD8A031F722950F8/image-size/large?v=v2&amp;amp;px=999" role="button" title="pastedImage_2.png" alt="pastedImage_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Basically, if DK is set it means one is passing the decrypt key (and not the encrypt key). The LTC can work with the encrypt key by doing a decrypt conversion when needed (takes longer than if the decrypt key is supplied directly).&lt;/P&gt;&lt;P&gt;Interestingly in another post I was finding that the second decrypted block was successful when using the DK setting (setting encryption key and informing that it were the decrypt key) which suggest that after the first block decryption (failed) it was internally converting the key to a decrypt key (presumably as a part of the normal decrypt operation...).....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remaining problem is that decrypting a stream of data in a number of block call (rather than one large block) is failing after the first block. See &lt;A href="https://community.nxp.com/thread/488542"&gt;https://community.nxp.com/thread/488542&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The KDS reference only tests a single block so I am wondering whether it can handle a stream or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2018 15:37:40 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810026#M49240</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2018-11-08T15:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810027#M49241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;I think maybe there is some thinking set or mind-set when we read these lengthy and uncommon sense words. Let us describe the keynote when do a decrypting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Is the key encrypt key?(yes) --&amp;gt; We should derive a decrypt key！--&amp;gt;&lt;STRONG&gt; Keep DK zero --&amp;gt; AES&amp;nbsp;derive a decrypt key&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, set DK to 1 means skipping the derive step.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But there is no word say what decrypt key looks like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 02:54:26 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810027#M49241</guid>
      <dc:creator>jingpan</dc:creator>
      <dc:date>2018-11-09T02:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810028#M49242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The decryption key is derived from the encryption key and needs to be performed as a step before usage. For example in the embedTLS library it is performed by calling aes_setkey_dec().&lt;BR /&gt;The LTC does this step as an integral part of its decryption function (if DK is 0) and the derived decryption key can be seen in the module's key registers after the step.&lt;BR /&gt;When DK is set to 1 it essentially tells the module that it should skip this step because the decryption key (and not the encrypt key) is (already) in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think that the decrpt key is usually of general interest (that is, how it looks) but I suspect that in both cases it could be read back and saved. Then it could be directly loaded (in case of the LTC to its key registers and in the case of the SW implementation to its key buffer in its instance) and thus the conversion step be saved when it is used again &lt;EM&gt;-&amp;gt; speed improvement against need to backup the values&lt;/EM&gt;. Whether there is great interest in this (slight) optimisation is another question. I will measure the LTC decryption speed with a primed decrypt key against its speed when it needs to do the conversion at some point and let you know....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 12:49:57 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810028#M49242</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2018-11-09T12:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810029#M49243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some measurement results for the record. KL82 running at 72MHz core (24MHz bus and Flash):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Register encrypt key in LTC 3.6us &amp;nbsp;&amp;nbsp; [SW based 18.9us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Encrypt 64 bytes of plain text to ciphertext 19.5us [SW based 240us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Register decrypt key in LTC 3.6us (this is the encrypt key again for the LTC method) &amp;nbsp;&amp;nbsp; [SW based 90.9us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Decrypt the first 32 bytes (first block operation) from cipher buffer to plain text buffer &lt;STRONG&gt;15.95us&lt;/STRONG&gt; [SW based 120us]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Decrypt the second 32 bytes (second block operation) from cipher buffer to plain text buffer &lt;STRONG&gt;12.83us&lt;/STRONG&gt; [SW based 128us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As predicted, the second block decryption is faster than the first which suggests that the LTC requires about 3us to derive the decrypt key from the encrypt key as a part of the first block decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart from the speed advantage of the LTC the code size is up to 10k Bytes smaller than a SW implementation too!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 15:14:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810029#M49243</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2018-11-09T15:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810030#M49244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have comparisons with a 120MHz K64 using mmCAN or SW for the same operations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Register encrypt key in mmCAU 5.04us &amp;nbsp;&amp;nbsp; [SW based 11.1us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Encrypt 64 bytes of plain text to ciphertext 15.6us [SW based 182us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Register decrypt key in mmCAU 5.23us&amp;nbsp;&amp;nbsp;&amp;nbsp; [SW based 52us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Decrypt the first 32 bytes (first block operation) from cipher buffer to plain text buffer &lt;STRONG&gt;8.09us&lt;/STRONG&gt; [SW based 56us]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new, courier, monospace; font-size: 12px;"&gt;Decrypt the second 32 bytes (second block operation) from cipher buffer to plain text buffer &lt;STRONG&gt;8.28us&lt;/STRONG&gt; [SW based 56us]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 17:10:31 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810030#M49244</guid>
      <dc:creator>mjbcswitzerland</dc:creator>
      <dc:date>2018-11-09T17:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: LTC AES key setting strangeness</title>
      <link>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810031#M49245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;Thank you very much! Your data is great!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2018 02:59:51 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Kinetis-Microcontrollers/LTC-AES-key-setting-strangeness/m-p/810031#M49245</guid>
      <dc:creator>jingpan</dc:creator>
      <dc:date>2018-11-12T02:59:51Z</dc:date>
    </item>
  </channel>
</rss>

