KeyExpansion Library Functions Manual KeyExpansion NAME KeyExpansion - Defines a key for the Extended EAES encryption algotithm. SYNOPSIS #include "eaes.h" void KeyExpansion(unsigned char *key, int keyLength); DESCRIPTION Set the encryption key to be used for the Extended AES algorithm. This function must be called before calling either the Cipher() or the InvCipher() functions. The key length must range from 128-bit (16 bytes) to 2048-bit (256 bytes). The input parameter "key" must point to the starting byte of the key, and "keyLength" must receive the length of the key, in bytes. All the subsequent calls to either the Cipher() or InvCipher() functions will use the key defined by this function. You can use any key size within the range, but the 128-bit, 192-bit and 256-bit key sizes are the only ones compliant with the FIPS-197 specification for the AES. NOTES To use the Extended EAES algorithm, you must include at your source code the following files: aestypes.cpp multresult.c eaes.cpp aestypes.h eaes.h REFERENCES Cipher - Encrypts a block of data using the Extended AES encryption algorithm. InvCipher - Decrypts a block of ciphertext using the Extended AES encryption algorithm. FIPS-197 - The specification of the Federal Information Processing Standard for AES. COPYRIGHT Copyright (c) 2013 Dalen Knowledge Systems under the terms of the GNU Lesser General Public License. This program is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this program. If not, see . The authors of EAESCrypt disclaim any liability for any way out of the use of this software, including but not limited to loss of data, use or profits, business interruption, leakage of sensitive information, use for any illicit or illegal purposes, or even the usage not in accordance with the law.