From f5d2986eec7dba025b6e81a5a83b5a91555fac72 Mon Sep 17 00:00:00 2001 From: Marvin Borner Date: Mon, 17 Jun 2019 18:18:23 +0200 Subject: Added execution guides and information --- README.md | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 README.md diff --git a/README.md b/README.md new file mode 100644 index 0000000..d930771 --- /dev/null +++ b/README.md @@ -0,0 +1,10 @@ +# AES encryption visualizer +This tool lets you understand the process of AES encryption. +For germans it may also be interesting to view my presentation with which I explained AES at school. + +## Executing +To follow the (by the way fantastic) explanations of [this site](http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html), +you could use something like this where the first parameter is your plaintext and the second is the passphrase: +`python visualizer.py "ATTACK AT DAWN!" "SOME 128 BIT KEY"` +If you only want to test the encryption of this tool or you already know how AES works you might want to use this instead: +`python encrypt.py "ATTACK AT DAWN!" "SOME 128 BIT KEY"` \ No newline at end of file -- cgit v1.2.3