1.1.2 AES EAX
Description
EAX mode was submitted on October 3, 2003, to NIST by Mihir Bellare, Phillip Rogaway, and David Wagner. It utilizes AES-CTR mode for encryption and AES-OMAC for authentication. In EAX mode, authentication is provided over additional associated data (AAD), while both confidentiality and authentication are ensured over the plaintext data. This demo application demonstrates the functionality of Crypto v4 AES-EAX functions.
Downloading and Building the Application
To clone or download this application from Github, go to the main page of this repository and then click Clone button to clone this repository or download as zip file. This content can also be downloaded using MPLAB® Code Configurator Content Manager.
Path of the application within the repository is apps/examples/aead/aes_eax.
To build the application, refer to the following table and open and build the project using its IDE.
Project Name | Description |
---|---|
pic32cz_ca90_curiosity_ultra.X | MPLABX project for PIC32CZ CA90 Curiosity Ultra Development Board |
Setting Up the Hardware
PIC32CZ CA90 Curiosity Ultra Development Board
- Connect 9v power to DC barrel jack
- Connect the ICD5 to the debugger port on the board and connect to computer
- Connect the Debug USB port on the board to the computer using a micro USB cable.
- Open a serial monitor with baud rate set to 115200, 8-bit data, no parity, 1 stop bit.
Running the Application
- Build and program the application using its IDE and observe the serial COM output.
- The program displays which functions are being demonstrated, and prints if they are completed successfully.