Research Article
[Retracted] Blockchain-Based Information Supervision Model for Rice Supply Chains
Algorithm 1
Process of AES encryption.
| Input: plaintext, key | | Output: ciphertext | | /∗ First, the algorithm expands the input key and stores it in W ∗/ | | AddRoundKey(state,w) // Bitwise XOR between the extended key in W and the matrix column | | state = plaintext | | for(r = 1; r <= Nr; r++) { | | SubBytes(state) // Find the S-box and output four new bytes to form word | | ShiftRows(state) // Each row of the matrix is shifted left circularly in bytes | | if(r ! = Nr) { | | MixColumns(state) // Column-by-column transformation of matrix | | } | | AddRoundKey(state, w) // In this round of encryption, XOR each column with the extended key | | } | | ciphertext = state |
|