Submit Search
Upload
Advanced Encryption Standard (AES)
•
Download as PPSX, PDF
•
3 likes
•
2,392 views
A
Amir Masinaei
Follow
Slides for Advanced Encryption Standard (AES) Encryption & Decryption.
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 44
Download now
Recommended
Advanced Encryption Standard Report
Advanced Encryption Standard Report
brakanjero
AES Cryptosystem
AES Cryptosystem
هيثم فرج
Fault Detection AES
Fault Detection AES
Sumathi Reddy
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
Aes128 bit project_report
Aes128 bit project_report
Nikhil Gupta
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
CSCJournals
Aes
Aes
Surya Kiran
Aes
Aes
Muhammad Asif
Recommended
Advanced Encryption Standard Report
Advanced Encryption Standard Report
brakanjero
AES Cryptosystem
AES Cryptosystem
هيثم فرج
Fault Detection AES
Fault Detection AES
Sumathi Reddy
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
Aes128 bit project_report
Aes128 bit project_report
Nikhil Gupta
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
CSCJournals
Aes
Aes
Surya Kiran
Aes
Aes
Muhammad Asif
Aes
Aes
Aravindharamanan S
AES by example
AES by example
Shiraz316
694 lecture1aes
694 lecture1aes
Ankur Human
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
Ch03-Computer Security
Ch03-Computer Security
Attaporn Ninsuwan
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Hardik Manocha
Project_Report1
Project_Report1
Ketki Kulkarni
Des
Des
Anshul Sharma
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
Sam Bowne
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
Rifat Tasnim
Ch05
Ch05
Joe Christensen
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
IOSR Journals
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
MdFazleRabbi18
Symmetric ciphers questions and answers
Symmetric ciphers questions and answers
prdpgpt
SHA 1 Algorithm
SHA 1 Algorithm
Shiva RamDam
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)
MdFazleRabbi18
Digital Signature
Digital Signature
nayakslideshare
Digital signature
Digital signature
Hossain Md Shakhawat
More Related Content
What's hot
Aes
Aes
Aravindharamanan S
AES by example
AES by example
Shiraz316
694 lecture1aes
694 lecture1aes
Ankur Human
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
Ch03-Computer Security
Ch03-Computer Security
Attaporn Ninsuwan
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Hardik Manocha
Project_Report1
Project_Report1
Ketki Kulkarni
Des
Des
Anshul Sharma
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
Sam Bowne
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
Rifat Tasnim
Ch05
Ch05
Joe Christensen
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
IOSR Journals
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
MdFazleRabbi18
Symmetric ciphers questions and answers
Symmetric ciphers questions and answers
prdpgpt
SHA 1 Algorithm
SHA 1 Algorithm
Shiva RamDam
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)
MdFazleRabbi18
What's hot
(20)
Aes
Aes
AES by example
AES by example
694 lecture1aes
694 lecture1aes
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Ch03-Computer Security
Ch03-Computer Security
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Project_Report1
Project_Report1
Des
Des
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
Ch05
Ch05
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
Symmetric ciphers questions and answers
Symmetric ciphers questions and answers
SHA 1 Algorithm
SHA 1 Algorithm
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)
Viewers also liked
Digital Signature
Digital Signature
nayakslideshare
Digital signature
Digital signature
Hossain Md Shakhawat
cns 2marks
cns 2marks
ilakiyadinesh
Digital signature
Digital signature
Yash Karanke
Cryptography
Cryptography
IGZ Software house
Data encryption standard
Data encryption standard
Prasad Prabhu
Data encryption standard (des)
Data encryption standard (des)
Mecheko Sha
Data Encryption Standard
Data Encryption Standard
Amirul Wiramuda
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
Aes
Aes
Kunal Prajapati
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
Hash Function
Hash Function
Siddharth Srivastava
Introduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
Digital signature
Digital signature
AJAL A J
Digital Signature
Digital Signature
saurav5884
Substitution Cipher
Substitution Cipher
Agung Julisman
DES
DES
Naga Srimanyu Timmaraju
Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
Cryptography
Cryptography
Sidharth Mohapatra
Viewers also liked
(20)
Digital Signature
Digital Signature
Digital signature
Digital signature
cns 2marks
cns 2marks
Digital signature
Digital signature
Cryptography
Cryptography
Data encryption standard
Data encryption standard
Data encryption standard (des)
Data encryption standard (des)
Data Encryption Standard
Data Encryption Standard
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Aes
Aes
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Hash Function
Hash Function
Introduction to Digital signatures
Introduction to Digital signatures
Digital signature
Digital signature
Digital Signature
Digital Signature
Substitution Cipher
Substitution Cipher
DES
DES
Aes (advance encryption standard)
Aes (advance encryption standard)
Cryptography
Cryptography
Similar to Advanced Encryption Standard (AES)
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
AES (2).ppt
AES (2).ppt
RobinRohit2
Report Cryptography
Report Cryptography
Ferro Demetrio
AES.pptx
AES.pptx
RizwanBasha12
Algorithim lec1.pptx
Algorithim lec1.pptx
rediet43
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrh
AkashRanjandas1
Serpent sboxes
Serpent sboxes
Abrar Ahmad
Data compession
Data compession
arvind carpenter
Coordinate Graph1
Coordinate Graph1
Ruth Pridgeon
Oct27
Oct27
Tak Lee
Cryptography unit2.pptx
Cryptography unit2.pptx
SayaliKawale2
Data Encryption standard in cryptography
Data Encryption standard in cryptography
NithyasriA2
Ch03 lexical analysis nfa_2_dfa_2019
Ch03 lexical analysis nfa_2_dfa_2019
Bushra Al-Anesi
Fear and loathing with APL (oredev)
Fear and loathing with APL (oredev)
Yan Cui
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
ratnapatil14
Cache Attacks On Secret Key Cryptosystems
Cache Attacks On Secret Key Cryptosystems
lawuah
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
HodaAhmedBekhitAhmed
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
UsamaAliLone3
Side Channel Attacks on AES
Side Channel Attacks on AES
Ravi Prakash Giri
01 analysis-of-algorithms
01 analysis-of-algorithms
Noushadur Shoukhin
Similar to Advanced Encryption Standard (AES)
(20)
Cryptographic algorithms
Cryptographic algorithms
AES (2).ppt
AES (2).ppt
Report Cryptography
Report Cryptography
AES.pptx
AES.pptx
Algorithim lec1.pptx
Algorithim lec1.pptx
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrh
Serpent sboxes
Serpent sboxes
Data compession
Data compession
Coordinate Graph1
Coordinate Graph1
Oct27
Oct27
Cryptography unit2.pptx
Cryptography unit2.pptx
Data Encryption standard in cryptography
Data Encryption standard in cryptography
Ch03 lexical analysis nfa_2_dfa_2019
Ch03 lexical analysis nfa_2_dfa_2019
Fear and loathing with APL (oredev)
Fear and loathing with APL (oredev)
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
Cache Attacks On Secret Key Cryptosystems
Cache Attacks On Secret Key Cryptosystems
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
Side Channel Attacks on AES
Side Channel Attacks on AES
01 analysis-of-algorithms
01 analysis-of-algorithms
Recently uploaded
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Recently uploaded
(20)
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Advanced Encryption Standard (AES)
1.
2.
3.
3 توجه:شد خواهید منتقل
مربوطه اسالید به ،عنوان روی بر کلیک با.
4.
4 رمز هایسیستم متقارن ایدنباله قالبی DES AES
5.
5
6.
6
7.
7
8.
8 رمزگذارAES 1 2 .
. . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . Nr
9.
9
10.
10 1 2 .
. . 128 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext 1 2 . . . 128 KeyExpansion
11.
11
12.
12 … 01 02 04
08 10 20 40 80 1b 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 cf 4f 3c 8a 84 eb 01 2b 7e 15 16 01 00 00 00 a0 fa fe 17 =
13.
13 … 28 ae d2 a6 88 54 2c b1 = a0 fa fe 17 a0 fa fe 17
14.
14 … 23 a3 39 39 = a0 fa fe 17 ab f7 15 88 88 54 2c b1 88 54 2c b1
15.
15 … 2a 6c 76 05 = a0 fa fe 17 88 54 2c b1 09 cf 4f 3c 23 a3 39 39 23 a3 39 39
16.
16 …
17.
17 1 2 .
. . 128 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext
18.
18 Add Round key
19.
19 1 2 .
. . 128 1. Sub byte 1. Sub byte Add Round key
20.
20 1 2 .
. . 128 1. Sub byte Add Round key 2. Shift Rows
21.
21 1 2 .
. . 128 1. Sub byte Add Round key 2. Shift Rows 3. Mix Columns
22.
22 1 2 .
. . 128 1. Sub byte Add Round key 2. Shift Rows 3. Mix Columns
23.
23 Add Round key 1
2 . . . 128 1. Sub byte Add Round key 2. Shift Rows 3. Mix Columns 4.Add Round key
24.
24
25.
25 1 2 .
. . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key
26.
26 1 2 .
. . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext
27.
27 1 2 .
. . 128 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext
28.
28 AES Structure
29.
29
30.
30 AES Inv
S-Box
31.
31
32.
32
33.
33 xy ?
34.
34
35.
35
36.
36 AES S-Box
37.
37 xy ?
38.
38
39.
39 AES Inv
S-Box
40.
40 𝑹𝑪 𝟏 ∶
𝒙 𝟏−𝟏 = 𝒙 𝟎 𝒎𝒐𝒅 𝒑(𝒙) = 𝟏 → 𝟎𝟎𝟎𝟎 𝟎𝟎𝟎𝟏 → 𝟎𝟏 𝑹𝑪 𝟐 ∶ 𝒙 𝟐−𝟏 = 𝒙 𝟏 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 → 𝟎𝟎𝟎𝟎 𝟎𝟎𝟏𝟎 → 𝟎𝟐 𝑹𝑪 𝟑 ∶ 𝒙 𝟑−𝟏 = 𝒙 𝟐 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟐 → 𝟎𝟎𝟎𝟎 𝟎𝟏𝟎𝟎 → 𝟎𝟒 𝑹𝑪 𝟒 ∶ 𝒙 𝟒−𝟏 = 𝒙 𝟑 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟑 → 𝟎𝟎𝟎𝟎 𝟏𝟎𝟎𝟎 → 𝟎𝟖 𝑹𝑪 𝟓 ∶ 𝒙 𝟓−𝟏 = 𝒙 𝟒 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟒 → 𝟎𝟎𝟎𝟏 𝟎𝟎𝟎𝟎 → 𝟏𝟎 𝑹𝑪 𝟔 ∶ 𝒙 𝟔−𝟏 = 𝒙 𝟓 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟓 → 𝟎𝟎𝟏𝟎 𝟎𝟎𝟎𝟎 → 𝟐𝟎 𝑹𝑪 𝟕 ∶ 𝒙 𝟕−𝟏 = 𝒙 𝟔 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟔 → 𝟎𝟏𝟎𝟎 𝟎𝟎𝟎𝟎 → 𝟒𝟎 𝑹𝑪 𝟖 ∶ 𝒙 𝟖−𝟏 = 𝒙 𝟕 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟕 → 𝟏𝟎𝟎𝟎 𝟎𝟎𝟎𝟎 → 𝟖𝟎 𝑹𝑪 𝟗 ∶ 𝒙 𝟗−𝟏 = 𝒙 𝟖 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟒 +𝒙 𝟑 + 𝒙 + 𝟏 → 𝟎𝟎𝟎𝟏 𝟏𝟎𝟏𝟏 → 𝟏𝑩 𝑹𝑪 𝟏𝟎 ∶ 𝒙 𝟏𝟎−𝟏 = 𝒙 𝟗 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟓 +𝒙 𝟒 +𝒙 𝟐 +𝒙 → 𝟎𝟎𝟏𝟏 𝟎𝟏𝟏𝟎 → 𝟑𝟔
41.
41 01 02 04
08 10 20 40 80 1b 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
42.
42
43.
43
Download now