diff --git a/Hardware_Acceleration/Design_Tutorials/05-bottom_up_rtl_kernel/doc/aes.md b/Hardware_Acceleration/Design_Tutorials/05-bottom_up_rtl_kernel/doc/aes.md index 5b6e460ca9..dc995fb162 100644 --- a/Hardware_Acceleration/Design_Tutorials/05-bottom_up_rtl_kernel/doc/aes.md +++ b/Hardware_Acceleration/Design_Tutorials/05-bottom_up_rtl_kernel/doc/aes.md @@ -2,7 +2,7 @@ ## About the AES Encryption Algorithm -The AES algorithm is a commonly used symmetric-key encryption algorithm, meaning that the same key is used for both encrypting and decrypting the data. The input and output data blocks for the AES algorithm are 16-bytes blocks (128-bits). AES has three key length types: 128-bit, 192-bit, and 256-bit. Before AES encryption and encryption operation, a operation called key-expansion must be run when a key is given. The AES algorithm includes lots of bit-wise and byte-wise operations, so it is very suitable to be implemented with the hardware accelerator. +The AES algorithm is a commonly used symmetric-key encryption algorithm, meaning that the same key is used for both encrypting and decrypting the data. The input and output data blocks for the AES algorithm are 16-bytes blocks (128-bits). AES has three key length types: 128-bit, 192-bit, and 256-bit. Before AES encryption and encryption operation, an operation called key-expansion must be run when a key is given. The AES algorithm includes lots of bit-wise and byte-wise operations, so it is very suitable to be implemented with the hardware accelerator.