1.1.2 AES EAX

Description

EAX mode was submitted on October 3, 2003, to NIST by Mihir Bellare, Phillip Rogaway, and David Wagner. It utilizes AES-CTR mode for encryption and AES-OMAC for authentication. In EAX mode, authentication is provided over additional associated data (AAD), while both confidentiality and authentication are ensured over the plaintext data. This demo application demonstrates the functionality of Crypto v4 AES-EAX functions.

Downloading and Building the Application

To clone or download this application from Github, go to the main page of this repository and then click Clone button to clone this repository or download as zip file. This content can also be downloaded using MPLAB® Code Configurator Content Manager.

Path of the application within the repository is apps/examples/aead/aes_eax.

To build the application, refer to the following table and open and build the project using its IDE.

Project NameDescription
pic32cz_ca90_curiosity_ultra.XMPLABX project for PIC32CZ CA90 Curiosity Ultra Development Board

Setting Up the Hardware

PIC32CZ CA90 Curiosity Ultra Development Board

  • Connect 9v power to DC barrel jack
  • Connect the ICD5 to the debugger port on the board and connect to computer
  • Connect the Debug USB port on the board to the computer using a micro USB cable.
  • Open a serial monitor with baud rate set to 115200, 8-bit data, no parity, 1 stop bit.

Running the Application

  1. Build and program the application using its IDE and observe the serial COM output.
  2. The program displays which functions are being demonstrated, and prints if they are completed successfully.