SlideShare ist ein Scribd-Unternehmen logo
1 von 20
ADVANCE 
ENCRYPTION 
STANDARD(AES) 
11BCE111 
KUNAL PRAJAPATI
INTRODUCTION 
It is a symmetric algorithm. 
It is a block cipher. 
Size of data block::128 bits. 
We represent data block using 4*4 matrix . it can 
also called state matrix. 
size of each element in matrix is 1 byte. 
Size of key::128/192/256 bits. 
Key is expanded to array of words.
INTRODUCTION 
 Length of key Rounds 
128 bits 10 
192 bits 12 
256 bits 14 
 operates entire data block in every round.
AES 
For encryption, each round consists of the following 
four steps: 
1) Substitute bytes(Sub- byte)2) Shift rows, 3) Mix 
columns, and 4) Add 
round key. 
For decryption, each round consists of the following 
four steps: 1) Inverse substitute byte rows, 2) Inverse 
shift row 3) Inverse mix columns and 4) Add round 
key
Byte Substitution 
a simple substitution of each byte. 
S-box constructed using defined transformation of values in 
GF(28). 
each byte of state is replaced by byte indexed by row (left 4- 
bits) & column (right 4-bits) 
• eg. byte {EA} is replaced by byte in row E column A 
• which has value {87}
S-Box
Example
Shift Byte 
1st row is unchanged 
2nd row does 1 byte circular shift to left 
3rd row does 2 byte circular shift to left 
4th row does 3 byte circular shift to left
Example
Mix Column 
each byte is replaced by a value 
dependent on all 4 bytes in the column. 
If result of multiplication greater than FF 
than we will take XOR between result of 
multiplication and Irreducible polynomial. 
Irreducible polynomial(x8+x4+x3+x+1) must 
be of power of m.
`
Mix column
Example of Mix column
Add round key 
 key is also arranged in the form of a matrix of 4 × 4 bytes. 
As with the input block, the first word from the key fills the 
first column of the matrix, and so on. 
XOR between state matrix and 128-bits of the round key.
Add Round Key 
Each round has its own round key that is derived from the 
original 128-bit encryption key in the manner described in 
this section. 
 The logic of the key expansion algorithm is designed to 
ensure that if you change one bit of the encryption key, it 
should affect the round keys for several rounds.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
Let’s say that we have the four words of the round 
key for the ith round: 
wi wi+1 wi+2 wi+3 
For these to serve as the round key for the ith 
round, i must be a multiple of 4.For example, 
w4,w5,w6,w7 is the round key for round 1, the 
sequence of words w8,w9,w10,w11 the round key or 
round 2, and so on.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
wi+5 = wi+4 ⊗ wi+1 
wi+6 = wi+5 ⊗ wi+2 
wi+7 = wi+6 ⊗ wi+3 
So now we only need to figure out wi+4. This is the 
beginning word of each 4-word grouping in the key expansion. 
The beginning word of each round key is obtained by: 
wi+4 = wi ⊗ g(wi+3) 
That is, the first word of the new 4-word grouping is to be 
obtained by XOR’ing the first word of the last grouping with 
what is returned by applying a function g() to the last word of 
the previous 4-word grouping.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
The function g() consists of the following three steps: 
Perform a one-byte left circular rotation on the argument 4- 
byte . 
Perform a byte substitution for each byte of the word 
returned by the previous step by using the same 16 × 16 
lookup table as used in the SubBytes step of the encryption 
rounds. 
The round constant is a word whose three rightmost bytes 
are always zero. Therefore, XOR’ing with the round constant 
amounts to XOR’ing with just its leftmost byte.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
The round constant for the ith round is denoted Rcon[i]. 
Since, by specification, the three rightmost bytes of the 
round constant are zero, we can write it as shown below. The 
left hand side of the equation below stands for the round 
constant to be used in the ith round. The right hand side of 
the equation says that the rightmost three bytes of the round 
constant are zero. 
Rcon[i] = (RC[i], 0x00, 0x00, 0x00) 
The addition of the round constants is for the purpose of 
destroying any symmetries that may have been introduced by 
the other steps in the key expansion algorithm.
Thank 
You

Weitere ähnliche Inhalte

Was ist angesagt?

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)Sam Bowne
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptographysubhradeep mitra
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardVasuki Ramasamy
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniquesShubham Jain
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 

Was ist angesagt? (20)

Unit 1
Unit 1Unit 1
Unit 1
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Unit 2
Unit 2Unit 2
Unit 2
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Des lecture
Des lectureDes lecture
Des lecture
 
AES Encryption
AES EncryptionAES Encryption
AES Encryption
 

Andere mochten auch

Andere mochten auch (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Aes
AesAes
Aes
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
DES
DESDES
DES
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 

Ähnlich wie Aes

Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)MuskanSony
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptroueida mohammed
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptssuseraaf866
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesVaibhav Khanna
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxUsamaAliLone3
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_reportNikhil Gupta
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxmatmurdock0111
 

Ähnlich wie Aes (20)

Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 
Aes algorithm notes
Aes algorithm notesAes algorithm notes
Aes algorithm notes
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
1-aes.pptx
1-aes.pptx1-aes.pptx
1-aes.pptx
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Chapter 5 module 3
Chapter 5 module 3Chapter 5 module 3
Chapter 5 module 3
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Information security Seminar #3
Information security Seminar #3 Information security Seminar #3
Information security Seminar #3
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptx
 

Kürzlich hochgeladen

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 

Kürzlich hochgeladen (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 

Aes

  • 1. ADVANCE ENCRYPTION STANDARD(AES) 11BCE111 KUNAL PRAJAPATI
  • 2. INTRODUCTION It is a symmetric algorithm. It is a block cipher. Size of data block::128 bits. We represent data block using 4*4 matrix . it can also called state matrix. size of each element in matrix is 1 byte. Size of key::128/192/256 bits. Key is expanded to array of words.
  • 3. INTRODUCTION  Length of key Rounds 128 bits 10 192 bits 12 256 bits 14  operates entire data block in every round.
  • 4. AES For encryption, each round consists of the following four steps: 1) Substitute bytes(Sub- byte)2) Shift rows, 3) Mix columns, and 4) Add round key. For decryption, each round consists of the following four steps: 1) Inverse substitute byte rows, 2) Inverse shift row 3) Inverse mix columns and 4) Add round key
  • 5. Byte Substitution a simple substitution of each byte. S-box constructed using defined transformation of values in GF(28). each byte of state is replaced by byte indexed by row (left 4- bits) & column (right 4-bits) • eg. byte {EA} is replaced by byte in row E column A • which has value {87}
  • 8. Shift Byte 1st row is unchanged 2nd row does 1 byte circular shift to left 3rd row does 2 byte circular shift to left 4th row does 3 byte circular shift to left
  • 10. Mix Column each byte is replaced by a value dependent on all 4 bytes in the column. If result of multiplication greater than FF than we will take XOR between result of multiplication and Irreducible polynomial. Irreducible polynomial(x8+x4+x3+x+1) must be of power of m.
  • 11. `
  • 13. Example of Mix column
  • 14. Add round key  key is also arranged in the form of a matrix of 4 × 4 bytes. As with the input block, the first word from the key fills the first column of the matrix, and so on. XOR between state matrix and 128-bits of the round key.
  • 15. Add Round Key Each round has its own round key that is derived from the original 128-bit encryption key in the manner described in this section.  The logic of the key expansion algorithm is designed to ensure that if you change one bit of the encryption key, it should affect the round keys for several rounds.
  • 16. from a 4-Word Round Key to the Next 4-Word Round Key Let’s say that we have the four words of the round key for the ith round: wi wi+1 wi+2 wi+3 For these to serve as the round key for the ith round, i must be a multiple of 4.For example, w4,w5,w6,w7 is the round key for round 1, the sequence of words w8,w9,w10,w11 the round key or round 2, and so on.
  • 17. from a 4-Word Round Key to the Next 4-Word Round Key wi+5 = wi+4 ⊗ wi+1 wi+6 = wi+5 ⊗ wi+2 wi+7 = wi+6 ⊗ wi+3 So now we only need to figure out wi+4. This is the beginning word of each 4-word grouping in the key expansion. The beginning word of each round key is obtained by: wi+4 = wi ⊗ g(wi+3) That is, the first word of the new 4-word grouping is to be obtained by XOR’ing the first word of the last grouping with what is returned by applying a function g() to the last word of the previous 4-word grouping.
  • 18. from a 4-Word Round Key to the Next 4-Word Round Key The function g() consists of the following three steps: Perform a one-byte left circular rotation on the argument 4- byte . Perform a byte substitution for each byte of the word returned by the previous step by using the same 16 × 16 lookup table as used in the SubBytes step of the encryption rounds. The round constant is a word whose three rightmost bytes are always zero. Therefore, XOR’ing with the round constant amounts to XOR’ing with just its leftmost byte.
  • 19. from a 4-Word Round Key to the Next 4-Word Round Key The round constant for the ith round is denoted Rcon[i]. Since, by specification, the three rightmost bytes of the round constant are zero, we can write it as shown below. The left hand side of the equation below stands for the round constant to be used in the ith round. The right hand side of the equation says that the rightmost three bytes of the round constant are zero. Rcon[i] = (RC[i], 0x00, 0x00, 0x00) The addition of the round constants is for the purpose of destroying any symmetries that may have been introduced by the other steps in the key expansion algorithm.