SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Advanced Encryption Standard
Reference: Stallings, Data and
Computer Communications, 7th
Edition,Pearson/P-H, 2004
AES Background
• 1997 --National Institute of Standards and
Technology (NIST) issues a call for proposals.
• 2001--AES issues as a federal information
processing standards (FIPS 197)
AES Requirements
• Security Strength Equal to or Better than
3DES
• Significantly More Efficient than 3DES
• Symmetric Block Cipher
• Block Length = 128 bits
• Support for Key Lengths of 128, 192, and
256 bits
Evaluation Criteria for AES
Proposals
• Security
• Computational Efficiency
• Memory Requirements
• Hardware and Software Suitability
• Flexibility
The State and Key Schedule
• Fig. 21.2 shows the AES algorithm structure.
• Input is a 128 bit block (16 bytes) that is placed
in the state array (Fig. 21.3)
• The key is entered in a block and divided into
key schedule words of 4 bytes/word.
• The key schedule is an expansion of the key—
eg, a 128 bit key is expanded into 44 key
schedule words.
• A square matrix of bytes is used by the standard
to describe the state.
Rounds and Transformation Stages
• The encryption process executes a round
function, Nr times, with the number of
rounds (Nr) being dependent on key size.
• The round function consists of four
transformation stages.
– SubBytes()
– ShiftRows()
– MixColumns()
– AddRoundKey()
Rounds and Transformation Stages (p.2)
• The cipher begins with an AddRoundKey().
• All rounds then execute each of the
transformations except the last round.
• The MixColumns( ) transformation is not
executed in the final round.
• For a 128 bit key, there are 10 rounds.
• 12 and 14 rounds are used with keys of 192
and 256.
SubBytes ( ) Transformation
• The substitute transformation is an S-Box
process, that is independent of the key.
• Each of the bytes of the State is replaced by
a different byte, according to a table.
• The table is fixed and derived from two
transformations defined in the standard.
• The table is an 8 x 8 array, indexed with the
State byte.
ShiftRows( ) Transformation
• The ShiftRows() transformation is a
permutation that is performed row by row
on the State array, independently of the key.
• The first row is not shifted.
• The 2nd
row is circularly shifted left 1 byte.
• The 3rd
row is circularly shifted left 2 bytes.
• The 4th
row is circularly shifted left 3 bytes.
MixColumns() Transformation
• The MixColumns( ) transformation
manipulates each column of the state array.
• The process can be described as a matrix
multiplication of a polynomial and the state
array.
• This process does not depend on the key.
AddRoundKey( ) Transformation
• The AddRoundKey( ) transformation uses
the key schedule word.
• The process is a bitwise XOR of the
columns of the state array, with the key
schedule word.
AES Decryption
• AES decryption is accomplished using
inverses of the transformations, in the
appropriate order.
• The AddRoundKey( ) is its own inverse
when (since A ⊕ B ⊕ B = A).

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Was ist angesagt? (20)

Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
 
Elliptic Curve Cryptography Message Exchange
Elliptic Curve Cryptography Message ExchangeElliptic Curve Cryptography Message Exchange
Elliptic Curve Cryptography Message Exchange
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
S-DES.ppt
S-DES.pptS-DES.ppt
S-DES.ppt
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 

Andere mochten auch

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Prasad Prabhu
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
Mecheko Sha
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 

Andere mochten auch (20)

Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Aes
AesAes
Aes
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 

Ähnlich wie Aes

“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 

Ähnlich wie Aes (20)

AES.ppt
AES.pptAES.ppt
AES.ppt
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
 
Unit -2.ppt
Unit -2.pptUnit -2.ppt
Unit -2.ppt
 
Aes
AesAes
Aes
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
Ch05
Ch05Ch05
Ch05
 
Cryptography
CryptographyCryptography
Cryptography
 
1-aes.pptx
1-aes.pptx1-aes.pptx
1-aes.pptx
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxes
 
modified aes algorithm using multiple s-boxes
modified aes algorithm using multiple s-boxesmodified aes algorithm using multiple s-boxes
modified aes algorithm using multiple s-boxes
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Aes
AesAes
Aes
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrh
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Aes

  • 1. Advanced Encryption Standard Reference: Stallings, Data and Computer Communications, 7th Edition,Pearson/P-H, 2004
  • 2. AES Background • 1997 --National Institute of Standards and Technology (NIST) issues a call for proposals. • 2001--AES issues as a federal information processing standards (FIPS 197)
  • 3. AES Requirements • Security Strength Equal to or Better than 3DES • Significantly More Efficient than 3DES • Symmetric Block Cipher • Block Length = 128 bits • Support for Key Lengths of 128, 192, and 256 bits
  • 4. Evaluation Criteria for AES Proposals • Security • Computational Efficiency • Memory Requirements • Hardware and Software Suitability • Flexibility
  • 5. The State and Key Schedule • Fig. 21.2 shows the AES algorithm structure. • Input is a 128 bit block (16 bytes) that is placed in the state array (Fig. 21.3) • The key is entered in a block and divided into key schedule words of 4 bytes/word. • The key schedule is an expansion of the key— eg, a 128 bit key is expanded into 44 key schedule words. • A square matrix of bytes is used by the standard to describe the state.
  • 6. Rounds and Transformation Stages • The encryption process executes a round function, Nr times, with the number of rounds (Nr) being dependent on key size. • The round function consists of four transformation stages. – SubBytes() – ShiftRows() – MixColumns() – AddRoundKey()
  • 7. Rounds and Transformation Stages (p.2) • The cipher begins with an AddRoundKey(). • All rounds then execute each of the transformations except the last round. • The MixColumns( ) transformation is not executed in the final round. • For a 128 bit key, there are 10 rounds. • 12 and 14 rounds are used with keys of 192 and 256.
  • 8. SubBytes ( ) Transformation • The substitute transformation is an S-Box process, that is independent of the key. • Each of the bytes of the State is replaced by a different byte, according to a table. • The table is fixed and derived from two transformations defined in the standard. • The table is an 8 x 8 array, indexed with the State byte.
  • 9. ShiftRows( ) Transformation • The ShiftRows() transformation is a permutation that is performed row by row on the State array, independently of the key. • The first row is not shifted. • The 2nd row is circularly shifted left 1 byte. • The 3rd row is circularly shifted left 2 bytes. • The 4th row is circularly shifted left 3 bytes.
  • 10. MixColumns() Transformation • The MixColumns( ) transformation manipulates each column of the state array. • The process can be described as a matrix multiplication of a polynomial and the state array. • This process does not depend on the key.
  • 11. AddRoundKey( ) Transformation • The AddRoundKey( ) transformation uses the key schedule word. • The process is a bitwise XOR of the columns of the state array, with the key schedule word.
  • 12. AES Decryption • AES decryption is accomplished using inverses of the transformations, in the appropriate order. • The AddRoundKey( ) is its own inverse when (since A ⊕ B ⊕ B = A).