aboutsummaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorMarvin Borner2019-06-17 18:18:23 +0200
committerMarvin Borner2019-06-17 18:18:23 +0200
commitf5d2986eec7dba025b6e81a5a83b5a91555fac72 (patch)
treef2f7ea90ce6a62ca11cff7425ffd500673bdf16e
parent6d6c5c322572dafa783070060df7f7a9b9ba16cd (diff)
Added execution guides and information
-rw-r--r--README.md10
1 files changed, 10 insertions, 0 deletions
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..d930771
--- /dev/null
+++ b/README.md
@@ -0,0 +1,10 @@
+# AES encryption visualizer
+This tool lets you understand the process of AES encryption.
+For germans it may also be interesting to view my presentation with which I explained AES at school.
+
+## Executing
+To follow the (by the way fantastic) explanations of [this site](http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html),
+you could use something like this where the first parameter is your plaintext and the second is the passphrase:
+`python visualizer.py "ATTACK AT DAWN!" "SOME 128 BIT KEY"`
+If you only want to test the encryption of this tool or you already know how AES works you might want to use this instead:
+`python encrypt.py "ATTACK AT DAWN!" "SOME 128 BIT KEY"` \ No newline at end of file