SlideShare a Scribd company logo
1 of 23
AES KEY EXPANSION
AES ENCRYPTION AND DECRYPTION DIAGRAM
AES KEY EXPANSION
The AES algorithm which
takes 128 bits (16 bytes)
key as input, four-word
key as input and produce a
linear array of 44 words.
(In AES 4 Bytes = 1 Word).
Figure describe the steps
of key expansion.
Figure : 1. Four word round 2. AES Encryption Process
AES KEY EXPANSION
A four-word round key is
acceptable for the initial stage.
The initial stage is Add Round
Key and each of the 10 rounds
of cipher. So, total 11 rounds =
44 words. The key is added
into the first four words of the
expanded key.
Figure : 1. Four word round 2. AES Encryption Process
AES KEY EXPANSION
• The function g defines the complex
and that function consist of some sub
function as follow:
• Step-1: This function performs the
one-byte circular left shift.
• Step-2: Using S-box each sub word
performs a byte substitution.
• Step-3: Finally result of Rot word and
step 2 is XORed with the round
constant called as Rcon[Round].
Figure : Function g
AES KEY EXPANSION
• The function g defines the complex
and that function consist of some sub
function as follow:
• Step-1: This function performs the
one-byte circular left shift.
• Step-2: Using S-box each sub word
performs a byte substitution.
• Step-3: Finally result of Rot word and
step 2 is XORed with the round
constant called as Rconst[j].
Figure : STEP-1
W3 Left
Shift
AF 7F
7F 67
67 98
98 AF
W0 w1 w2 w3
0F 47 0C AF
15 D9 B7 7F
71 E8 AD 67
C9 59 D6 98
AES KEY EXPANSION
Figure : STEP-2
Left Shift
7F
67
98
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F
67
98
AF
ROW COLUMN
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F
67
98
AF
ROW COLUMN
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67
98
AF
ROW COLUMN
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67
98
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67 85
98
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67 85
98 46
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67 85
98 46
AF 79
AES KEY EXPANSION
• The function g defines the complex
and that function consist of some sub
function as follow:
• Step-1: This function performs the
one-byte circular left shift.
• Step-2: Using S-box each sub word
performs a byte substitution.
• Step-3: Finally result of Rot word and
step 2 is XORed with the round
constant called as Rcon[Round].
AES KEY EXPANSION
w0 w1 w2 w3
0F 47 0C AF
15 D9 B7 7F
71 E8 AD 67
C9 59 D6 98
Left Shift
(Step-1)
S-box
(Step-2)
7F D2
67 85
98 46
AF 79
S-box
(Step-2)
D2
85
46
79
Rcon(Round)
01
00
00
00
w0
0F
15
71
C9
W4
DC
90
37
B0
Step-3: Finally result of Rot word
and step 2 is XORed with the
round constant called as
Rcon[Round].
AES KEY EXPANSION
w0 w1 w2 w3 w4 w5 w6 w7
0F 47 0C AF DC 9B
15 D9 B7 7F 90 49
71 E8 AD 67 37 DF
C9 59 D6 98 B0 E9
AES KEY EXPANSION
w0 w1 w2 w3 w4 w5 w6 w7
0F 47 0C AF DC 9B 97
15 D9 B7 7F 90 49 FE
71 E8 AD 67 37 DF 72
C9 59 D6 98 B0 E9 3F
AES KEY EXPANSION
w0 w1 w2 w3 w4 w5 w6 w7
0F 47 0C AF DC 9B 97 38
15 D9 B7 7F 90 49 FE 81
71 E8 AD 67 37 DF 72 15
C9 59 D6 98 B0 E9 3F A7
AES EXAMPLE
AES EXAMPLE
Initial
Round
Round 1
Round 2
Round 3
Round 4
Round 5
Round 6
Round 7
Round 8
AES EXAMPLE
AES EXAMPLE

More Related Content

What's hot

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash functionMijanur Rahman Milon
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithmRuchi Maurya
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)DUET
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsFaisal Shahzad Khan
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functionsMazin Alwaaly
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSAMohamed Loey
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 

What's hot (20)

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Unit 3
Unit 3Unit 3
Unit 3
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Cryptography
CryptographyCryptography
Cryptography
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Information and data security cryptographic hash functions
Information and data security cryptographic hash functionsInformation and data security cryptographic hash functions
Information and data security cryptographic hash functions
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 

Similar to AES KEY EXPANSION .pptx

Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...Karthik Rathinavel
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAkashRanjandas1
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” Nirav Desai
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_reportNikhil Gupta
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyJorgeVillamarin5
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
DES Simplified
DES SimplifiedDES Simplified
DES SimplifiedShiraz316
 
07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptx07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptxElisée Ndjabu
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAIOSRJECE
 
Windows debugging sisimon
Windows debugging   sisimonWindows debugging   sisimon
Windows debugging sisimonSisimon Soman
 
ArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea RipleyArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea RipleyRudraBhai3
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
 
Counting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort AlgorithmsCounting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort AlgorithmsSarvesh Rawat
 

Similar to AES KEY EXPANSION .pptx (20)

Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrh
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
2 DES.pdf
2 DES.pdf2 DES.pdf
2 DES.pdf
 
2-bit comparator
2-bit comparator2-bit comparator
2-bit comparator
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
DES Simplified
DES SimplifiedDES Simplified
DES Simplified
 
07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptx07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptx
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
 
Windows debugging sisimon
Windows debugging   sisimonWindows debugging   sisimon
Windows debugging sisimon
 
Lec20
Lec20Lec20
Lec20
 
ArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea RipleyArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea Ripley
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
 
Counting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort AlgorithmsCounting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort Algorithms
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

AES KEY EXPANSION .pptx

  • 2. AES ENCRYPTION AND DECRYPTION DIAGRAM
  • 3. AES KEY EXPANSION The AES algorithm which takes 128 bits (16 bytes) key as input, four-word key as input and produce a linear array of 44 words. (In AES 4 Bytes = 1 Word). Figure describe the steps of key expansion. Figure : 1. Four word round 2. AES Encryption Process
  • 4. AES KEY EXPANSION A four-word round key is acceptable for the initial stage. The initial stage is Add Round Key and each of the 10 rounds of cipher. So, total 11 rounds = 44 words. The key is added into the first four words of the expanded key. Figure : 1. Four word round 2. AES Encryption Process
  • 5. AES KEY EXPANSION • The function g defines the complex and that function consist of some sub function as follow: • Step-1: This function performs the one-byte circular left shift. • Step-2: Using S-box each sub word performs a byte substitution. • Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rcon[Round]. Figure : Function g
  • 6. AES KEY EXPANSION • The function g defines the complex and that function consist of some sub function as follow: • Step-1: This function performs the one-byte circular left shift. • Step-2: Using S-box each sub word performs a byte substitution. • Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rconst[j]. Figure : STEP-1 W3 Left Shift AF 7F 7F 67 67 98 98 AF W0 w1 w2 w3 0F 47 0C AF 15 D9 B7 7F 71 E8 AD 67 C9 59 D6 98
  • 7. AES KEY EXPANSION Figure : STEP-2 Left Shift 7F 67 98 AF
  • 8. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F 67 98 AF ROW COLUMN
  • 9. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F 67 98 AF ROW COLUMN
  • 10. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 98 AF ROW COLUMN
  • 11. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 98 AF
  • 12. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 85 98 AF
  • 13. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 85 98 46 AF
  • 14. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 85 98 46 AF 79
  • 15. AES KEY EXPANSION • The function g defines the complex and that function consist of some sub function as follow: • Step-1: This function performs the one-byte circular left shift. • Step-2: Using S-box each sub word performs a byte substitution. • Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rcon[Round].
  • 16. AES KEY EXPANSION w0 w1 w2 w3 0F 47 0C AF 15 D9 B7 7F 71 E8 AD 67 C9 59 D6 98 Left Shift (Step-1) S-box (Step-2) 7F D2 67 85 98 46 AF 79 S-box (Step-2) D2 85 46 79 Rcon(Round) 01 00 00 00 w0 0F 15 71 C9 W4 DC 90 37 B0 Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rcon[Round].
  • 17. AES KEY EXPANSION w0 w1 w2 w3 w4 w5 w6 w7 0F 47 0C AF DC 9B 15 D9 B7 7F 90 49 71 E8 AD 67 37 DF C9 59 D6 98 B0 E9
  • 18. AES KEY EXPANSION w0 w1 w2 w3 w4 w5 w6 w7 0F 47 0C AF DC 9B 97 15 D9 B7 7F 90 49 FE 71 E8 AD 67 37 DF 72 C9 59 D6 98 B0 E9 3F
  • 19. AES KEY EXPANSION w0 w1 w2 w3 w4 w5 w6 w7 0F 47 0C AF DC 9B 97 38 15 D9 B7 7F 90 49 FE 81 71 E8 AD 67 37 DF 72 15 C9 59 D6 98 B0 E9 3F A7
  • 21. AES EXAMPLE Initial Round Round 1 Round 2 Round 3 Round 4 Round 5 Round 6 Round 7 Round 8