Research Article
[Retracted] Blockchain-Based Information Supervision Model for Rice Supply Chains
Algorithm 2
Process of AES decryption.
| Input: plaintext, key | | Output: ciphertext | | /∗ First, the algorithm expands the input key and stores it in W ∗/ | | state = ciphertext | | AddRoundKey(state,w) // Bitwise XOR between the extended key in W and the matrix column | | for(r = Nr; i >= 0; i--) { | | InvShiftRows(state) // Rotate each row of the matrix to the right | | InvSubBytes(state) // Find the inverse S-box and output four new bytes to form word | | AddRoundKey(state,w) // In this round of decryption, XOR each column with the extended key | | if(r ! = Nr) { | | InvMixColumns(state) //Inverse column transformation of matrix | | } | | } | | plaintext = state |
|