SlideShare une entreprise Scribd logo
1  sur  39
AES-Advanced Encryption
Standard
Module-2 (Modern Symmetric Key Cryptosystems)
Symmetric key ciphers – Block vs Stream ciphers, Block cipher
components, Product ciphers, Feistel and Non-Feistel ciphers.
Data Encryption Standard (DES) – Structure, Key generation,
Design criteria,Weaknesses, Double DES,Triple DES.
Advanced Encryption Standard (AES) – Structure, Key
expansion.
Block cipher modes of operation – Electronic Codebook Mode
(ECB), Cipher Block Chaining Mode (CBC),Cipher Feedback
Mode (CFB), Output Feedback Mode (OFB), Counter Mode
(CTR).
Stream ciphers – Structure, RC4.
Origins
• A replacement for DES was needed.
• Solution =Triple-DES – but slow and small block size(64) with 168
bit key.
• US NIST(National institute of Standards &Technology) issued call
for ciphers in 1997.
• 15 algorithms were chosen.
• 5 were then shortlisted.
• Rijndael (RINE dahl)[named afterVincent Rijmen and Joan
Daemen) – Belgium- was selected as the AES in 2001
EVALUATION CRITERIA USED BY NIST FOR
SELECTING AES
Security
This refer to efforts required to Cryptanalyze an Algorithm
(Resistance to cryptanalysis), Soundness of Math,
Randomness of Output, etc.
Cost
Computational Efficiency (Speed)
Memory Requirements
Algorithm and Implementation Characteristics
Flexibility, Hardware and Software Suitability, Algorithm
Simplicity.
RIJNDAEL AS AES
• The RIJNDAEL PROPOSAL FOR AES DEFINED A CIPHER IN WHICHTHE
BLOCK LENGTH AND KEY LENGTH CAN BE INDEPENDENTLY
SPECIFIEDTO BE 128,192, OR 256 BITS
• THE AES SPECIFICATION USESTHE SAME 3 KEY SIZE ALTERNATIVES
BUT LIMITSTHE BLOCK LENGTHTO 128 –BITS.
• A NUMBER OF AES PARAMETERS DEPEND ONTHE KEY LENGTH
• RIJNDAEL WAS DESIGNED TO HAVETHE FOLLOWING
CHARECTERISTICS
• RESISTANCE AGAINST ALL KNOWN ATTACKS
• SPEED AND CODE COMPACTNESS ON A WIDE RANGE OF
PLATFORMS
• DESIGN SIMPLICITY.
AES Requirements
• Private key Symmetric Block Cipher
• Resistance against all known attacks.
• Block Size of 128-bit data(16 * 8).
• 128/192/256-bit keys can be used
• Stronger & faster thanTriple-DES
• AES is an S-P cipher involving N-rounds (N depends on Key-
Length).
AES has definedThreeVersions, with 10, 12, and 14 rounds.
Each version uses a different cipher key size (128, 192, or
256), but the round keys are always 128 bits.
A cycle ofAES involves One Substitution and 2 Permutation
Functions. And A Key Function.
General design of AES encryption cipher
The AES Cipher - Rijndael
• An Iterative rather than Feistel cipher
• Processes data as Block of 4 columns of 4 bytes
• Operates on entire data block in every round
• Input to Encryption and Decryption Algorithm is a
single 128 bit block.
• This block is copied into a State Array which is
modified at each stage of Encryption/Decryption.
Rijndael
• Data block of 4 columns of 4 bytes is called State.
• Initial 128 bit Key is expanded to Array ofWords
• (11*4bytes=44words)
• 4 different Stages are used
• Byte Substitution (S-box used on every byte)
• Shift Rows (permute bytes between groups/columns)
• Mix Columns (subs using matrix multiply of groups)
• Add Round Key (XOR state with key material)
Rijndael-AES
Overall AES Structure.
• Structure-Starts with Add Round Key followed by 9 rounds of
4 stages followed by a tenth round of 3 stages.
• Cipher begins and ends with Add round Key stage-Better
Security.
• Each Stage is easily revertible.
• Decryption Algorithm uses Keys in Reverse Order.
• AES uses Arithmetic in the Finite Field GF(2^8) with the
irreducible Polynomial m(x)=x^8+x^4+x^3+x+1.
AES SINGLE ROUND
General design of AES encryption cipher
Byte Substitution(S-Box)
• AES defines a 16*16 matrix of byte values called an S-Box.
• Uses one table of 16x16 bytes containing a permutation of all 256 8-
bit values.
• A simple substitution of each byte.
• Each byte of state is replaced by byte indexed by row (left 4-bits) &
column (right 4-bits).
• eg. byte {95} is replaced by byte in row 9 column 5
• which has value {2A}
• S-box constructed using defined transformation of values in GF(28).
• Designed to be resistant to all known attacks.
Byte Substitution
 Construction of S- Box

AES S-Box
For example, the output from S-box of 95 is 2A
Inverse S-box
 It is calculated by first calculating the inverse affine
transformation on the input value, followed by the multiplicative
inverse.
The inverse affine transformation is as follows

AES INVERSE S-Box
A circular Byte Shift
1st row is unchanged
2nd row does 1 byte circular shift to left
3rd row does 2 byte circular shift to left
4th row does 3 byte circular shift to left
Decrypt inverts using shifts to right
Since state is processed by columns, this step
permutes bytes between the columns
Shift Rows
Mix Columns
• Each column is processed separately
• Each byte is replaced by a value dependent on all 4 bytes in the
column
MixColumns
The MixColumns transformation operates at the column
level; it transforms each column of the state to a new column.
MixColumns transformation
Constant matrices used by
MixColumns and InvMixColumns
Mix Columns
• Can express each Column as 4 Equations
• Decryption requires use of Inverse Matrix
• We need an inter byte transformation that
changes the bits inside a byte, based on the bits
inside the neighboring bytes. We need to mix
bytes to provide diffusion at the bit level.
Add Round Key
• XOR state with 128-bits of the round key
• Processed by column
• Inverse for decryption identical
• since XOR own inverse, with reversed keys
• AddRoundKey proceeds one column at a time.
AddRoundKey adds a round key word with each
state column matrix; the operation in
AddRoundKey is matrix addition.
AddRoundKey transformation
AddRoundKey proceeds one column at a time. AddRoundKey
adds a round key word with each state column matrix; the
operation in AddRoundKey is matrix addition.
Add Round Key
AES Key Expansion
• Takes 128-bit (16-byte) key and expands into array of 44 32-bit words
• Start by copying key into first 4 words
• Then loop creating words that depend on values in previous & 4 places
back
• in 3 of 4 cases just XOR these together
• 1st word in 4 has rotate + S-box + XOR round constant on previous,
before XOR 4th back
To create round keys for each round, AES uses a key-expansion
process. If the number of rounds is Nr , the key-expansion
routine creates Nr + 1 128-bit round keys from one single 128-
bit cipher key.
AES Key Expansion
Key expansion in AES
Key Expansion(every 4th word)
• For a word whose posn inW array is a multiple of 4.
• The Function “g” consists of the following subfns
• Rotword-one byte left shift on a word.
• SubWord-byte substitution on each byte of its input word
using the S-Box
• Result of steps 1 and 2 are XORed using a round constatnt
Rcon[j].
• Round Constant is a word in which the 3 right most bytes
are always 0.
• Round const is diff for each round and is defined as
• Rcon[j]=(RC[j],0,0,0), with RC[1]=1;RC[j]=2*RC[j-1].
• Multiplication is defined over GF(2^8).
• [ie,01,02,04,08,10,20,40,80,1B,36]
AES Decryption
• AES decryption is not identical to encryption since steps
done in reverse
• But can define an equivalent inverse cipher with steps as
for encryption
• but using inverses of each step
• with a different key schedule
AES Decryption
Summary
• Have considered:
• The AES selection process
• The details of Rijndael – the AES cipher
• Looked at the steps in each round
• The key expansion

Contenu connexe

Tendances

Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 
AES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAhmudulHassan
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsFaisal Shahzad Khan
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardDr.Florence Dayana
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 

Tendances (20)

Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
AES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAES KEY EXPANSION .pptx
AES KEY EXPANSION .pptx
 
Web Security
Web SecurityWeb Security
Web Security
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Unit 2
Unit  2Unit  2
Unit 2
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
IP Security
IP SecurityIP Security
IP Security
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
AES Encryption
AES EncryptionAES Encryption
AES Encryption
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 

Similaire à AES.ppt

Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxeschuxuantinh
 
modified aes algorithm using multiple s-boxes
modified aes algorithm using multiple s-boxesmodified aes algorithm using multiple s-boxes
modified aes algorithm using multiple s-boxeschutinhha
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Mazin Alwaaly
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
Cryptography and network security AES ALG
Cryptography and network security AES ALGCryptography and network security AES ALG
Cryptography and network security AES ALGskcbcaa10uca068
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesVaibhav Khanna
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptroueida mohammed
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesVaibhav Khanna
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptssuseraaf866
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxhuachuhulk
 
Information and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issuesInformation and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issuesVaibhav Khanna
 

Similaire à AES.ppt (20)

Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxes
 
modified aes algorithm using multiple s-boxes
modified aes algorithm using multiple s-boxesmodified aes algorithm using multiple s-boxes
modified aes algorithm using multiple s-boxes
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit -2.ppt
Unit -2.pptUnit -2.ppt
Unit -2.ppt
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Aes
AesAes
Aes
 
Cryptography and network security AES ALG
Cryptography and network security AES ALGCryptography and network security AES ALG
Cryptography and network security AES ALG
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
 
Ch05
Ch05Ch05
Ch05
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
Network security cs5
Network security cs5Network security cs5
Network security cs5
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
 
Information and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issuesInformation and network security 26 aes decryption and implementational issues
Information and network security 26 aes decryption and implementational issues
 
Aes
AesAes
Aes
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

AES.ppt

  • 2. Module-2 (Modern Symmetric Key Cryptosystems) Symmetric key ciphers – Block vs Stream ciphers, Block cipher components, Product ciphers, Feistel and Non-Feistel ciphers. Data Encryption Standard (DES) – Structure, Key generation, Design criteria,Weaknesses, Double DES,Triple DES. Advanced Encryption Standard (AES) – Structure, Key expansion. Block cipher modes of operation – Electronic Codebook Mode (ECB), Cipher Block Chaining Mode (CBC),Cipher Feedback Mode (CFB), Output Feedback Mode (OFB), Counter Mode (CTR). Stream ciphers – Structure, RC4.
  • 3. Origins • A replacement for DES was needed. • Solution =Triple-DES – but slow and small block size(64) with 168 bit key. • US NIST(National institute of Standards &Technology) issued call for ciphers in 1997. • 15 algorithms were chosen. • 5 were then shortlisted. • Rijndael (RINE dahl)[named afterVincent Rijmen and Joan Daemen) – Belgium- was selected as the AES in 2001
  • 4. EVALUATION CRITERIA USED BY NIST FOR SELECTING AES Security This refer to efforts required to Cryptanalyze an Algorithm (Resistance to cryptanalysis), Soundness of Math, Randomness of Output, etc. Cost Computational Efficiency (Speed) Memory Requirements Algorithm and Implementation Characteristics Flexibility, Hardware and Software Suitability, Algorithm Simplicity.
  • 5. RIJNDAEL AS AES • The RIJNDAEL PROPOSAL FOR AES DEFINED A CIPHER IN WHICHTHE BLOCK LENGTH AND KEY LENGTH CAN BE INDEPENDENTLY SPECIFIEDTO BE 128,192, OR 256 BITS • THE AES SPECIFICATION USESTHE SAME 3 KEY SIZE ALTERNATIVES BUT LIMITSTHE BLOCK LENGTHTO 128 –BITS. • A NUMBER OF AES PARAMETERS DEPEND ONTHE KEY LENGTH • RIJNDAEL WAS DESIGNED TO HAVETHE FOLLOWING CHARECTERISTICS • RESISTANCE AGAINST ALL KNOWN ATTACKS • SPEED AND CODE COMPACTNESS ON A WIDE RANGE OF PLATFORMS • DESIGN SIMPLICITY.
  • 6. AES Requirements • Private key Symmetric Block Cipher • Resistance against all known attacks. • Block Size of 128-bit data(16 * 8). • 128/192/256-bit keys can be used • Stronger & faster thanTriple-DES
  • 7. • AES is an S-P cipher involving N-rounds (N depends on Key- Length). AES has definedThreeVersions, with 10, 12, and 14 rounds. Each version uses a different cipher key size (128, 192, or 256), but the round keys are always 128 bits. A cycle ofAES involves One Substitution and 2 Permutation Functions. And A Key Function.
  • 8. General design of AES encryption cipher
  • 9. The AES Cipher - Rijndael • An Iterative rather than Feistel cipher • Processes data as Block of 4 columns of 4 bytes • Operates on entire data block in every round • Input to Encryption and Decryption Algorithm is a single 128 bit block. • This block is copied into a State Array which is modified at each stage of Encryption/Decryption.
  • 10. Rijndael • Data block of 4 columns of 4 bytes is called State. • Initial 128 bit Key is expanded to Array ofWords • (11*4bytes=44words) • 4 different Stages are used • Byte Substitution (S-box used on every byte) • Shift Rows (permute bytes between groups/columns) • Mix Columns (subs using matrix multiply of groups) • Add Round Key (XOR state with key material)
  • 12. Overall AES Structure. • Structure-Starts with Add Round Key followed by 9 rounds of 4 stages followed by a tenth round of 3 stages. • Cipher begins and ends with Add round Key stage-Better Security. • Each Stage is easily revertible. • Decryption Algorithm uses Keys in Reverse Order. • AES uses Arithmetic in the Finite Field GF(2^8) with the irreducible Polynomial m(x)=x^8+x^4+x^3+x+1.
  • 14. General design of AES encryption cipher
  • 15. Byte Substitution(S-Box) • AES defines a 16*16 matrix of byte values called an S-Box. • Uses one table of 16x16 bytes containing a permutation of all 256 8- bit values. • A simple substitution of each byte. • Each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits). • eg. byte {95} is replaced by byte in row 9 column 5 • which has value {2A} • S-box constructed using defined transformation of values in GF(28). • Designed to be resistant to all known attacks.
  • 16.
  • 19.
  • 20. AES S-Box For example, the output from S-box of 95 is 2A
  • 21. Inverse S-box  It is calculated by first calculating the inverse affine transformation on the input value, followed by the multiplicative inverse. The inverse affine transformation is as follows 
  • 23. A circular Byte Shift 1st row is unchanged 2nd row does 1 byte circular shift to left 3rd row does 2 byte circular shift to left 4th row does 3 byte circular shift to left Decrypt inverts using shifts to right Since state is processed by columns, this step permutes bytes between the columns Shift Rows
  • 24.
  • 25. Mix Columns • Each column is processed separately • Each byte is replaced by a value dependent on all 4 bytes in the column
  • 26. MixColumns The MixColumns transformation operates at the column level; it transforms each column of the state to a new column. MixColumns transformation
  • 27. Constant matrices used by MixColumns and InvMixColumns
  • 28. Mix Columns • Can express each Column as 4 Equations • Decryption requires use of Inverse Matrix • We need an inter byte transformation that changes the bits inside a byte, based on the bits inside the neighboring bytes. We need to mix bytes to provide diffusion at the bit level.
  • 29. Add Round Key • XOR state with 128-bits of the round key • Processed by column • Inverse for decryption identical • since XOR own inverse, with reversed keys • AddRoundKey proceeds one column at a time. AddRoundKey adds a round key word with each state column matrix; the operation in AddRoundKey is matrix addition.
  • 30. AddRoundKey transformation AddRoundKey proceeds one column at a time. AddRoundKey adds a round key word with each state column matrix; the operation in AddRoundKey is matrix addition.
  • 32. AES Key Expansion • Takes 128-bit (16-byte) key and expands into array of 44 32-bit words • Start by copying key into first 4 words • Then loop creating words that depend on values in previous & 4 places back • in 3 of 4 cases just XOR these together • 1st word in 4 has rotate + S-box + XOR round constant on previous, before XOR 4th back To create round keys for each round, AES uses a key-expansion process. If the number of rounds is Nr , the key-expansion routine creates Nr + 1 128-bit round keys from one single 128- bit cipher key.
  • 33.
  • 36. Key Expansion(every 4th word) • For a word whose posn inW array is a multiple of 4. • The Function “g” consists of the following subfns • Rotword-one byte left shift on a word. • SubWord-byte substitution on each byte of its input word using the S-Box • Result of steps 1 and 2 are XORed using a round constatnt Rcon[j]. • Round Constant is a word in which the 3 right most bytes are always 0. • Round const is diff for each round and is defined as • Rcon[j]=(RC[j],0,0,0), with RC[1]=1;RC[j]=2*RC[j-1]. • Multiplication is defined over GF(2^8). • [ie,01,02,04,08,10,20,40,80,1B,36]
  • 37. AES Decryption • AES decryption is not identical to encryption since steps done in reverse • But can define an equivalent inverse cipher with steps as for encryption • but using inverses of each step • with a different key schedule
  • 39. Summary • Have considered: • The AES selection process • The details of Rijndael – the AES cipher • Looked at the steps in each round • The key expansion