SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Advanced Encryption Standard
Naimur Rahman
naimur978@gmail.com
Department of Computer Science Engineering
University of Chittagong
November 21, 2020
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 1 / 20
What is AES?
AES is an encryption standard chosen by the National Institute of
Standards and Technology(NIST), USA to protect classified
information. It has been accepted world wide as a desirable
algorithm to encrypt sensitive data.
It is a block cipher which operates on block size of 128 bits for both
encrypting as well as decrypting.
Each Round performs same operations.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 2 / 20
Why AES?
In 1990’s the cracking of DES algorithm became possible.
Around 50hrs of bruteforcing allowed to crack the message.
NIST started searching for new feasible algorithm and proposed its
requirement in 1997.
In 2001 Rijndael algorithm designed by Rijment and Daemon of
Belgium was declared as the winner of the competition.
It met all Security, Cost and Implementation criteria.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 3 / 20
How Does it works?
AES basically repeats 4 major functions to encrypt data.It takes 128
bit block of data and a key[laymans term password] and gives a
ciphertext as output.The functions are:
1. Sub Bytes
2. Shift Rows
3. Mix Columns
4. Add Key
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 4 / 20
How Does it works?
The number of rounds performed by the algorithm strictly depends
on the size of key.
The following table gives overview of no. Of rounds performed with
the input of varying key lengths:
Key Size (in bits) Rounds
128 10
192 12
256 14
The larger the number of keys the more secure will be the data. The
time taken by s/w to encrypt will increase with no. of rounds.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 5 / 20
How Does it works?
Figure 2: Example Figure
Here,
E=encryption function for a symmetric block cipher
m=plaintext message of size 128bits
n=ciphertext]
k=key of size 128bits which is same for both encryption and
decryption
D= Decryption function for symmetric block cipher
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 6 / 20
Steps for encryption and decryption
Figure 3: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 7 / 20
Analysis of Steps
KeyExpansions- In the key Expansion process the given 128 bits
cipher key is stored in [4]x[4] bytes matrix (16*8=128 bits) and then
the four column words of the key matrix is expanded into a schedule
of 44 words (44*4=176) resulting in 11 round keys (176/11=16
bytes or 128 bits).
Number of round keys = Nr + 1. Where Nr is the number of rounds
(which is 10 in case of 128 bits key size) So here the round keys =
11.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 8 / 20
Analysis of Steps
Figure 4: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 9 / 20
Analysis of Steps
SubBytes- Each element of the matrix is replaced by the an element
of s-box matrix.
Figure 5: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 10 / 20
Analysis of Steps
SubBytes
For an element d1 corresponding value is 3e
Figure 6: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 11 / 20
Analysis of Steps
SubBytes
The S-box is a special lookup table which is constructed by Galois
fields.
The Generating function used in this algorithm is GF(28
)
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 12 / 20
Analysis of Steps
Shift Rows
In this step rows of the block are cylindrically shifted in left direction.
The first row is untouched , the second by one shift, third by two
and fourth by 3.
Figure 7: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 13 / 20
Analysis of Steps
Shift Rows
Figure 8: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 14 / 20
Analysis of Steps
Mix columns
This is the most important part of the algorithm causes the flip of
bits to spread all over the block
In this step the block is multiplied with a fixed matrix.
The multiplication is field multiplication in galois field.
For each row there are 16 multiplication, 12 XORs and a 4 byte
output.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 15 / 20
Analysis of Steps
Mix columns
Figure 9: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 16 / 20
Analysis of Steps
Add round key
Figure 10: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 17 / 20
Analysis of Steps
Add round key
In this step each byte is XOR-ed with corresponding element of key’s
matrix.
Once this step is done the keys are no longer available for this step.
Using the same key will weaken the algorithm.
To overcome this problem keys are expanded.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 18 / 20
Analysis of Steps
In the last round the mix column step is skipped.
It is not documented anywhere why this is done but recently a paper
was published against this method highlighting the weakening of
cipher text.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 19 / 20
Attacks
It is similar to the exhaustive key search attack(brute force attack -
trying all the possible set of keys) but it is adaptive. It is 4 times
better than the exhaustive key search. But it is infeasible using
current technology on block cipher having a keyspace of 128 bits
and above.
There are more advanced attack on AES-256 bits like the Related
Key Attack, which involves several distinct keys linked together by a
common relation which reduces the keyspace to 99.5 bits which is
also infeasible.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 20 / 20

Más contenido relacionado

La actualidad más candente

8 queens problem using back tracking
8 queens problem using back tracking8 queens problem using back tracking
8 queens problem using back tracking
Tech_MX
 

La actualidad más candente (20)

RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Distributed deep learning
Distributed deep learningDistributed deep learning
Distributed deep learning
 
Hash table
Hash tableHash table
Hash table
 
Decision tree and instance-based learning for label ranking
Decision tree and instance-based learning for label rankingDecision tree and instance-based learning for label ranking
Decision tree and instance-based learning for label ranking
 
PyTorch Python Tutorial | Deep Learning Using PyTorch | Image Classifier Usin...
PyTorch Python Tutorial | Deep Learning Using PyTorch | Image Classifier Usin...PyTorch Python Tutorial | Deep Learning Using PyTorch | Image Classifier Usin...
PyTorch Python Tutorial | Deep Learning Using PyTorch | Image Classifier Usin...
 
Xgboost
XgboostXgboost
Xgboost
 
Merkle Trees and Fusion Trees
Merkle Trees and Fusion TreesMerkle Trees and Fusion Trees
Merkle Trees and Fusion Trees
 
Latex Introduction for Beginners
Latex Introduction for BeginnersLatex Introduction for Beginners
Latex Introduction for Beginners
 
Activity playfair cipher.pptx
Activity playfair cipher.pptxActivity playfair cipher.pptx
Activity playfair cipher.pptx
 
Backtracking
BacktrackingBacktracking
Backtracking
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
 
N queen problem
N queen problemN queen problem
N queen problem
 
8 queens problem using back tracking
8 queens problem using back tracking8 queens problem using back tracking
8 queens problem using back tracking
 
K Nearest Neighbor Algorithm
K Nearest Neighbor AlgorithmK Nearest Neighbor Algorithm
K Nearest Neighbor Algorithm
 
The n Queen Problem
The n Queen ProblemThe n Queen Problem
The n Queen Problem
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Aes
AesAes
Aes
 
Shors'algorithm simplified.pptx
Shors'algorithm simplified.pptxShors'algorithm simplified.pptx
Shors'algorithm simplified.pptx
 
Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 

Similar a Advanced Encryption Standard Latex Beamer Class Presentation

Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 

Similar a Advanced Encryption Standard Latex Beamer Class Presentation (20)

Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
D44091720
D44091720D44091720
D44091720
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Enhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving EncryptionEnhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving Encryption
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfComparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
Final report
Final reportFinal report
Final report
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptx
 

Último

➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 

Último (20)

➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men  🔝Bangalore🔝   Esc...
➥🔝 7737669865 🔝▻ Bangalore Call-girls in Women Seeking Men 🔝Bangalore🔝 Esc...
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 

Advanced Encryption Standard Latex Beamer Class Presentation

  • 1. Advanced Encryption Standard Naimur Rahman naimur978@gmail.com Department of Computer Science Engineering University of Chittagong November 21, 2020 Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 1 / 20
  • 2. What is AES? AES is an encryption standard chosen by the National Institute of Standards and Technology(NIST), USA to protect classified information. It has been accepted world wide as a desirable algorithm to encrypt sensitive data. It is a block cipher which operates on block size of 128 bits for both encrypting as well as decrypting. Each Round performs same operations. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 2 / 20
  • 3. Why AES? In 1990’s the cracking of DES algorithm became possible. Around 50hrs of bruteforcing allowed to crack the message. NIST started searching for new feasible algorithm and proposed its requirement in 1997. In 2001 Rijndael algorithm designed by Rijment and Daemon of Belgium was declared as the winner of the competition. It met all Security, Cost and Implementation criteria. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 3 / 20
  • 4. How Does it works? AES basically repeats 4 major functions to encrypt data.It takes 128 bit block of data and a key[laymans term password] and gives a ciphertext as output.The functions are: 1. Sub Bytes 2. Shift Rows 3. Mix Columns 4. Add Key Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 4 / 20
  • 5. How Does it works? The number of rounds performed by the algorithm strictly depends on the size of key. The following table gives overview of no. Of rounds performed with the input of varying key lengths: Key Size (in bits) Rounds 128 10 192 12 256 14 The larger the number of keys the more secure will be the data. The time taken by s/w to encrypt will increase with no. of rounds. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 5 / 20
  • 6. How Does it works? Figure 2: Example Figure Here, E=encryption function for a symmetric block cipher m=plaintext message of size 128bits n=ciphertext] k=key of size 128bits which is same for both encryption and decryption D= Decryption function for symmetric block cipher Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 6 / 20
  • 7. Steps for encryption and decryption Figure 3: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 7 / 20
  • 8. Analysis of Steps KeyExpansions- In the key Expansion process the given 128 bits cipher key is stored in [4]x[4] bytes matrix (16*8=128 bits) and then the four column words of the key matrix is expanded into a schedule of 44 words (44*4=176) resulting in 11 round keys (176/11=16 bytes or 128 bits). Number of round keys = Nr + 1. Where Nr is the number of rounds (which is 10 in case of 128 bits key size) So here the round keys = 11. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 8 / 20
  • 9. Analysis of Steps Figure 4: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 9 / 20
  • 10. Analysis of Steps SubBytes- Each element of the matrix is replaced by the an element of s-box matrix. Figure 5: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 10 / 20
  • 11. Analysis of Steps SubBytes For an element d1 corresponding value is 3e Figure 6: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 11 / 20
  • 12. Analysis of Steps SubBytes The S-box is a special lookup table which is constructed by Galois fields. The Generating function used in this algorithm is GF(28 ) Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 12 / 20
  • 13. Analysis of Steps Shift Rows In this step rows of the block are cylindrically shifted in left direction. The first row is untouched , the second by one shift, third by two and fourth by 3. Figure 7: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 13 / 20
  • 14. Analysis of Steps Shift Rows Figure 8: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 14 / 20
  • 15. Analysis of Steps Mix columns This is the most important part of the algorithm causes the flip of bits to spread all over the block In this step the block is multiplied with a fixed matrix. The multiplication is field multiplication in galois field. For each row there are 16 multiplication, 12 XORs and a 4 byte output. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 15 / 20
  • 16. Analysis of Steps Mix columns Figure 9: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 16 / 20
  • 17. Analysis of Steps Add round key Figure 10: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 17 / 20
  • 18. Analysis of Steps Add round key In this step each byte is XOR-ed with corresponding element of key’s matrix. Once this step is done the keys are no longer available for this step. Using the same key will weaken the algorithm. To overcome this problem keys are expanded. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 18 / 20
  • 19. Analysis of Steps In the last round the mix column step is skipped. It is not documented anywhere why this is done but recently a paper was published against this method highlighting the weakening of cipher text. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 19 / 20
  • 20. Attacks It is similar to the exhaustive key search attack(brute force attack - trying all the possible set of keys) but it is adaptive. It is 4 times better than the exhaustive key search. But it is infeasible using current technology on block cipher having a keyspace of 128 bits and above. There are more advanced attack on AES-256 bits like the Related Key Attack, which involves several distinct keys linked together by a common relation which reduces the keyspace to 99.5 bits which is also infeasible. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 20 / 20