SlideShare una empresa de Scribd logo
1 de 66
Descargar para leer sin conexión
Simplified Advanced Encryption Standard
Simplified Advanced Encryption
Standard
Simplified Advanced Encryption Standard
Simplified Advanced Encryption Standard
S-AES Encryption and Decryption
S-AES Key Generation
S-AES Encryption
S-AES Decryption
Simplified Advanced Encryption Standard
Simplified Advanced Encryption Standard
S-AES Encryption and Decryption
S-AES Key Generation
S-AES Encryption
S-AES Decryption
Simplified Advanced Encryption Standard
 Simplified AES (S-AES) was developed by Professor Edward
Schaefer of Santa Clara University in 2003
 its purpose is educational, since its key and block size are very
small 16bits
 it is possible for students to encrypt or decrypt a block doing all
operations by hand
 it easier for students to understand the structure AES
Simplified Advanced Encryption Standard
Simplified Advanced Encryption Standard
S-AES Encryption and Decryption
S-AES Key Generation
S-AES Encryption
S-AES Decryption
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2 Round 1
Round 2
Simplified Advanced Encryption Standard
16-bit Plaintext, P= D7 28
=1101 0111 0010 1000
16-bit Key, K= 4A F5
=0100 1010 1111 0101
Simplified Advanced Encryption Standard
Simplified Advanced Encryption Standard
S-AES Encryption and Decryption
S-AES Key Generation
S-AES Encryption
S-AES Decryption
Simplified Advanced Encryption Standard
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Simplified Advanced Encryption Standard
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Simplified Advanced Encryption Standard
 K= 4A F5
= 0100 1010 1111 0101
 The input key, K, is split into 2 words, w0 and w1:
 w0 = 0100 1010
 w1 = 1111 0101
Simplified Advanced Encryption Standard
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Simplified Advanced Encryption Standard
 S-AES Key Expansion
Simplified Advanced Encryption Standard
 Function g
Simplified Advanced Encryption Standard
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Simplified Advanced Encryption Standard
 w0 = 0100 1010, w1 = 1111 0101
 w2 = w0 ⊕ Rcon(1) ⊕ SubNib( RotNib(w1))
 RotNib() is “rotate the nibbles”, which is equivalent to swapping the
nibbles , Rcon is a round constant
 SubNib() is “apply S-Box substitution on nibbles using encryption S-Box”
 RotNib(w1) = 0101 1111
 SubNib(0101 1111) = 0001 0111
 Rcon(1) = 10000000
S-Box
Simplified Advanced Encryption Standard
 w0 = 0100 1010, w1 = 1111 0101
 w2 = w0 ⊕ Rcon(1) ⊕ SubNib( RotNib(w1))
= 0100 1010 ⊕ 1000 0000 ⊕ 0001 0111
= 0100 1010 ⊕ 1001 0111=1101 1101
 w2 =1101 1101
 w3 = w2 ⊕ w1 = 1101 1101 ⊕ 1111 0101= 0010 1000
 w3 = 0010 1000
Simplified Advanced Encryption Standard
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Simplified Advanced Encryption Standard
 w2 = 1101 1101, w3 = 0010 1000
 w4 = w2 ⊕ Rcon(2) ⊕ SubNib( RotNib(w3) )
= 1101 1101 ⊕ 0011 0000 ⊕ SubNib( 1000 0010 )
= 1110 1101 ⊕ 0011 0000 ⊕ 0110 1010
= 1110 1101 ⊕ 0101 1010
= 1011 0111
 w5 = w4 ⊕ w3
=1011 0111 ⊕ 0010 1000
=1001 1111
S-Box
Simplified Advanced Encryption Standard
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Simplified Advanced Encryption Standard
 Key
 Key0 = w0w1
= 0100 1010 1111 0101
 Key1 = w2w3
= 1101 1101 0010 1000
 Key2 = w4w5
= 1011 0111 1001 1111
Simplified Advanced Encryption Standard
Simplified Advanced Encryption Standard
S-AES Encryption and Decryption
S-AES Key Generation
S-AES Encryption
S-AES Decryption
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Assume: P= 1101 0111 0010 1000
 Key0 = w0w1
= 0100 1010 1111 0101
 Key1 = w2w3
= 1101 1101 0010 1000
 Key2 = w4w5
= 1000 0111 1010 1111
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 0
 P= 1101 0111 0010 1000
 Key0 = 0100 1010 1111 0101
 R0= P ⊕ Key0
= 1101 0111 0010 1000 ⊕
0100 1010 1111 0101
= 1001 1101 1101 1101
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 S-AES Encryption Round
Simplified Advanced Encryption Standard
 S-AES Transformation (Substitution and Shift row)
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 1
1) Nibble Substitution :
 SubNib(1001 1101 1101 1101)= 0010 1110 1110 1110
2) Shift Row:
 Swap 2nd nibble and 4th nibble
 ShRow(0010 1110 1110 1110)
= 0010 1110 1110 1110
S-Box
Simplified Advanced Encryption Standard
 S-AES Encryption Round
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 S-AES Transformation (Mix Column)
Simplified Advanced Encryption Standard
 Mix Column Table
* 1 2 3 4 5 6 7 8 9 A B C D E F
2 2 4 6 8 A C E 3 1 7 5 B 9 F D
4 4 8 C 3 7 B F 6 2 E A 5 1 D 9
9 9 1 8 2 B 3 A 4 D 5 C 6 F 7 E
Simplified Advanced Encryption Standard
 Round 1
3) Mix Columns:
 MixCol (0010 1110 1110 1110) = 0010 1110
1110 1110
∗
1 4
4 1
=
 = 2 E
E E
∗
1 4
4 1
=
(2∗1⊕E∗4) (E∗1⊕E∗4)
(2∗4⊕E∗1) (E∗4⊕E∗1)
* 1 2 3 4 5 6 7 8 9 A B C D E F
2 2 4 6 8 A C E 3 1 7 5 B 9 F D
4 4 8 C 3 7 B F 6 2 E A 5 1 D 9
9 9 1 8 2 B 3 A 4 D 5 C 6 F 7 E
Simplified Advanced Encryption Standard
 =
(2⊕D) (E⊕D)
(8⊕E) (D⊕E)
=
(0010⊕1101) (1110⊕1101)
(1000⊕1110) (1101⊕1110)

(0010⊕1101) (1110⊕1101)
(1000⊕1110) (1101⊕1110)
= 1111 0011
0110 0011
= 1111 0110 0011 0011
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 1
4) Add round Key1
 Key1 = 1101 1101 0010 1000
 R1= Key1 ⊕ MixCol(ShRow(SubNib(R0)))
= 1101 1101 0010 1000 ⊕ 1111 0110 0011 0011
= 0010 1011 0001 1011
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 S-AES Transformation (Substitution and Shift row)
Simplified Advanced Encryption Standard
 Round 2
1) Nibble Substitution :
 SubNib(0010 1011 0001 1011)= 1010 0011 0100 0011
2) Shift Row:
 Swap 2nd nibble and 4th nibble
 ShRow(1010 0011 0100 0011)
= 1010 0011 0100 0011
S-Box
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 2
4) Add round Key2
 Key2 = 1000 0111 1010 1111
 R2= Key2 ⊕ ShRow(SubNib(R1))
= 1101 1101 0010 1000 ⊕ 1010 0011 0100 0011
= 0010 0100 1110 1100
Ciphertext = 0010 0100 1110 1100
Simplified Advanced Encryption Standard
Simplified Advanced Encryption Standard
S-AES Encryption and Decryption
S-AES Key Generation
S-AES Encryption
S-AES Decryption
Simplified Advanced Encryption Standard
Shift Row
Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Nibble Substitution
Shift Row
Add Round Key
Nibble Substitution
Add Round Key
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2 Round 1
Round 2
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Assume: C= 0010 0100 1110 1100
 Key0 = w0w1
= 0100 1010 1111 0101
 Key1 = w2w3
= 1101 1101 0010 1000
 Key2 = w4w5
= 1000 0111 1010 1111
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Key2 = w4w5
= 1000 0111 1010 1111
 C= 0010 0100 1110 1100
 R0= C ⊕ Key2 = 0010 0100 1110 1100 ⊕ 1000 0111 1010
1111
 =1010 0011 0100 0011
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 1
1) Inverse Shift Row
 IShRow(R0)=IShRow(1010 0011 0100 0011)=
= 1010 0011 0100 0011
2) Inverse Nibble Sub
 ISubNib( 1010 0011 0100 0011 )=
= 0010 1011 0001 1011
Inv S-Box
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
3) Add Round 1 Key
 0010 1011 0001 1011 ⊕ Key1
= 0010 1011 0001 1011 ⊕ 1101 1101 0010 1000
=1111 0110 0011 0011
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 1
4) Inverse Mix Columns :
 MixCol (1111 0110 0011 0011) = 1111 0011
0110 0011
∗
9 2
2 9
=
 = F 3
6 3
∗
𝟗 𝟐
𝟐 𝟗
=
(F∗9⊕6∗2) (3∗9⊕3∗2)
(F∗2⊕6∗9) (3∗2⊕3∗9)
 =
(E⊕C) (8⊕6)
(D⊕3) (6⊕8)
 =
(1110⊕1100) (1000⊕0110)
(1101⊕0011) (0110⊕1000)
* 1 2 3 4 5 6 7 8 9 A B C D E F
2 2 4 6 8 A C E 3 1 7 5 B 9 F D
4 4 8 C 3 7 B F 6 2 E A 5 1 D 9
9 9 1 8 2 B 3 A 4 D 5 C 6 F 7 E
Simplified Advanced Encryption Standard

(1110⊕1100) (1000⊕0110)
(1101⊕0011) (0110⊕1000)
= 0010 1110
1110 1110
R1 = 0010 1110 1110 1110
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
 Round 2
1) Inverse Shift Row
 IShRow(R1)=IShRow(0010 1110 1110 1110)=
= 0010 1110 1110 1110
2) Inverse Nibble Sub
 ISubNib( 0010 1110 1110 1110 )=
= 1001 1101 1101 1101
Inv S-Box
Simplified Advanced Encryption Standard
Inverse Shift Row
Inverse Mix Columns
Add Round Key
16-bit Plain text
16-bit Cipher text
Inverse Nibble Substitution
Inverse Shift Row
Add Round Key
Inverse Nibble Substitution
Add Round Key
𝒘 𝟐,𝟑
16-bit Key
Expand Key
𝒘 𝟒,𝟓
Expand Key
𝒘 𝟎,𝟏
Round 1
Round 2
Simplified Advanced Encryption Standard
3) Add Round 2 Key
 R2= 1001 1101 1101 1101 ⊕ Key0
= 1001 1101 1101 1101 ⊕ 0100 1010 1111 0101
=1101 0111 0010 1000
Plaintext = 1101 0111 0010 1000 = D7 28
Simplified Advanced Encryption Standard
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
Simplified Advanced Encryption Standard
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

Más contenido relacionado

La actualidad más candente

Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
Sajid Marwat
 

La actualidad más candente (20)

AES KEY EXPANSION .pptx
AES KEY EXPANSION .pptxAES KEY EXPANSION .pptx
AES KEY EXPANSION .pptx
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
SHA-3
SHA-3SHA-3
SHA-3
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Sha3
Sha3Sha3
Sha3
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptxMD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
 
0-1 KNAPSACK PROBLEM
0-1 KNAPSACK PROBLEM0-1 KNAPSACK PROBLEM
0-1 KNAPSACK PROBLEM
 
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. HeysA Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
A Tutorial on Linear and Differential Cryptanalysis by Howard M. Heys
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
how to calclute time complexity of algortihm
how to calclute time complexity of algortihmhow to calclute time complexity of algortihm
how to calclute time complexity of algortihm
 

Destacado

Destacado (9)

Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 
PMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project ManagementPMP Lecture 1: Introduction to Project Management
PMP Lecture 1: Introduction to Project Management
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
C++ Programming Language
C++ Programming Language C++ Programming Language
C++ Programming Language
 

Similar a Computer Security Lecture 5: Simplified Advanced Encryption Standard

334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdes
Benny SmKr
 
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptxchapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
Surendra Loya
 
Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...
Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...
Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...
Hsien-Hsin Sean Lee, Ph.D.
 

Similar a Computer Security Lecture 5: Simplified Advanced Encryption Standard (20)

Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption StandardComputer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
 
Data Formats used by Computers
Data Formats used by ComputersData Formats used by Computers
Data Formats used by Computers
 
Codes
CodesCodes
Codes
 
Lecture ascii and ebcdic codes
Lecture ascii and ebcdic codesLecture ascii and ebcdic codes
Lecture ascii and ebcdic codes
 
Week 5 - Number Systems.pdf
Week 5 - Number Systems.pdfWeek 5 - Number Systems.pdf
Week 5 - Number Systems.pdf
 
UNIT - I.pptx
UNIT - I.pptxUNIT - I.pptx
UNIT - I.pptx
 
UNIT - I.pptx
UNIT - I.pptxUNIT - I.pptx
UNIT - I.pptx
 
334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdes
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
 
Number system
Number systemNumber system
Number system
 
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptxchapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
chapter1digitalsystemsandbinarynumbers-151021072016-lva1-app6891.pptx
 
Lec 02
Lec 02Lec 02
Lec 02
 
Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...
Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...
Lec2 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Num...
 
Logic Design 2009
Logic Design 2009Logic Design 2009
Logic Design 2009
 
number system
number systemnumber system
number system
 
About the computer of the important field
About the computer               of the important fieldAbout the computer               of the important field
About the computer of the important field
 
Number system
Number systemNumber system
Number system
 
numbersystem-171028183820.pptx
numbersystem-171028183820.pptxnumbersystem-171028183820.pptx
numbersystem-171028183820.pptx
 
ADE UNIT-III (Digital Fundamentals).pptx
ADE UNIT-III (Digital Fundamentals).pptxADE UNIT-III (Digital Fundamentals).pptx
ADE UNIT-III (Digital Fundamentals).pptx
 
Number system
Number systemNumber system
Number system
 

Más de Mohamed Loey

Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 

Más de Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
PMP Lecture 4: Project Integration Management
PMP Lecture 4: Project Integration ManagementPMP Lecture 4: Project Integration Management
PMP Lecture 4: Project Integration Management
 
Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2Computer Security Lecture 3: Classical Encryption Techniques 2
Computer Security Lecture 3: Classical Encryption Techniques 2
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1Computer Security Lecture 2: Classical Encryption Techniques 1
Computer Security Lecture 2: Classical Encryption Techniques 1
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
PMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management ProcessesPMP Lecture 3: Project Management Processes
PMP Lecture 3: Project Management Processes
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Computer Security Lecture 5: Simplified Advanced Encryption Standard

  • 1. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard
  • 2. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard S-AES Encryption and Decryption S-AES Key Generation S-AES Encryption S-AES Decryption
  • 3. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard S-AES Encryption and Decryption S-AES Key Generation S-AES Encryption S-AES Decryption
  • 4. Simplified Advanced Encryption Standard  Simplified AES (S-AES) was developed by Professor Edward Schaefer of Santa Clara University in 2003  its purpose is educational, since its key and block size are very small 16bits  it is possible for students to encrypt or decrypt a block doing all operations by hand  it easier for students to understand the structure AES
  • 5. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard S-AES Encryption and Decryption S-AES Key Generation S-AES Encryption S-AES Decryption
  • 6. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2 Round 1 Round 2
  • 7. Simplified Advanced Encryption Standard 16-bit Plaintext, P= D7 28 =1101 0111 0010 1000 16-bit Key, K= 4A F5 =0100 1010 1111 0101
  • 8. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard S-AES Encryption and Decryption S-AES Key Generation S-AES Encryption S-AES Decryption
  • 9. Simplified Advanced Encryption Standard 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏
  • 10. Simplified Advanced Encryption Standard 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏
  • 11. Simplified Advanced Encryption Standard  K= 4A F5 = 0100 1010 1111 0101  The input key, K, is split into 2 words, w0 and w1:  w0 = 0100 1010  w1 = 1111 0101
  • 12. Simplified Advanced Encryption Standard 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏
  • 13. Simplified Advanced Encryption Standard  S-AES Key Expansion
  • 14. Simplified Advanced Encryption Standard  Function g
  • 15. Simplified Advanced Encryption Standard 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏
  • 16. Simplified Advanced Encryption Standard  w0 = 0100 1010, w1 = 1111 0101  w2 = w0 ⊕ Rcon(1) ⊕ SubNib( RotNib(w1))  RotNib() is “rotate the nibbles”, which is equivalent to swapping the nibbles , Rcon is a round constant  SubNib() is “apply S-Box substitution on nibbles using encryption S-Box”  RotNib(w1) = 0101 1111  SubNib(0101 1111) = 0001 0111  Rcon(1) = 10000000 S-Box
  • 17. Simplified Advanced Encryption Standard  w0 = 0100 1010, w1 = 1111 0101  w2 = w0 ⊕ Rcon(1) ⊕ SubNib( RotNib(w1)) = 0100 1010 ⊕ 1000 0000 ⊕ 0001 0111 = 0100 1010 ⊕ 1001 0111=1101 1101  w2 =1101 1101  w3 = w2 ⊕ w1 = 1101 1101 ⊕ 1111 0101= 0010 1000  w3 = 0010 1000
  • 18. Simplified Advanced Encryption Standard 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏
  • 19. Simplified Advanced Encryption Standard  w2 = 1101 1101, w3 = 0010 1000  w4 = w2 ⊕ Rcon(2) ⊕ SubNib( RotNib(w3) ) = 1101 1101 ⊕ 0011 0000 ⊕ SubNib( 1000 0010 ) = 1110 1101 ⊕ 0011 0000 ⊕ 0110 1010 = 1110 1101 ⊕ 0101 1010 = 1011 0111  w5 = w4 ⊕ w3 =1011 0111 ⊕ 0010 1000 =1001 1111 S-Box
  • 20. Simplified Advanced Encryption Standard 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏
  • 21. Simplified Advanced Encryption Standard  Key  Key0 = w0w1 = 0100 1010 1111 0101  Key1 = w2w3 = 1101 1101 0010 1000  Key2 = w4w5 = 1011 0111 1001 1111
  • 22. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard S-AES Encryption and Decryption S-AES Key Generation S-AES Encryption S-AES Decryption
  • 23. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 24. Simplified Advanced Encryption Standard  Assume: P= 1101 0111 0010 1000  Key0 = w0w1 = 0100 1010 1111 0101  Key1 = w2w3 = 1101 1101 0010 1000  Key2 = w4w5 = 1000 0111 1010 1111
  • 25. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 26. Simplified Advanced Encryption Standard  Round 0  P= 1101 0111 0010 1000  Key0 = 0100 1010 1111 0101  R0= P ⊕ Key0 = 1101 0111 0010 1000 ⊕ 0100 1010 1111 0101 = 1001 1101 1101 1101
  • 27. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 28. Simplified Advanced Encryption Standard  S-AES Encryption Round
  • 29. Simplified Advanced Encryption Standard  S-AES Transformation (Substitution and Shift row)
  • 30. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 31. Simplified Advanced Encryption Standard  Round 1 1) Nibble Substitution :  SubNib(1001 1101 1101 1101)= 0010 1110 1110 1110 2) Shift Row:  Swap 2nd nibble and 4th nibble  ShRow(0010 1110 1110 1110) = 0010 1110 1110 1110 S-Box
  • 32. Simplified Advanced Encryption Standard  S-AES Encryption Round
  • 33. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 34. Simplified Advanced Encryption Standard  S-AES Transformation (Mix Column)
  • 35. Simplified Advanced Encryption Standard  Mix Column Table * 1 2 3 4 5 6 7 8 9 A B C D E F 2 2 4 6 8 A C E 3 1 7 5 B 9 F D 4 4 8 C 3 7 B F 6 2 E A 5 1 D 9 9 9 1 8 2 B 3 A 4 D 5 C 6 F 7 E
  • 36. Simplified Advanced Encryption Standard  Round 1 3) Mix Columns:  MixCol (0010 1110 1110 1110) = 0010 1110 1110 1110 ∗ 1 4 4 1 =  = 2 E E E ∗ 1 4 4 1 = (2∗1⊕E∗4) (E∗1⊕E∗4) (2∗4⊕E∗1) (E∗4⊕E∗1) * 1 2 3 4 5 6 7 8 9 A B C D E F 2 2 4 6 8 A C E 3 1 7 5 B 9 F D 4 4 8 C 3 7 B F 6 2 E A 5 1 D 9 9 9 1 8 2 B 3 A 4 D 5 C 6 F 7 E
  • 37. Simplified Advanced Encryption Standard  = (2⊕D) (E⊕D) (8⊕E) (D⊕E) = (0010⊕1101) (1110⊕1101) (1000⊕1110) (1101⊕1110)  (0010⊕1101) (1110⊕1101) (1000⊕1110) (1101⊕1110) = 1111 0011 0110 0011 = 1111 0110 0011 0011
  • 38. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 39. Simplified Advanced Encryption Standard  Round 1 4) Add round Key1  Key1 = 1101 1101 0010 1000  R1= Key1 ⊕ MixCol(ShRow(SubNib(R0))) = 1101 1101 0010 1000 ⊕ 1111 0110 0011 0011 = 0010 1011 0001 1011
  • 40. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 41. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 42. Simplified Advanced Encryption Standard  S-AES Transformation (Substitution and Shift row)
  • 43. Simplified Advanced Encryption Standard  Round 2 1) Nibble Substitution :  SubNib(0010 1011 0001 1011)= 1010 0011 0100 0011 2) Shift Row:  Swap 2nd nibble and 4th nibble  ShRow(1010 0011 0100 0011) = 1010 0011 0100 0011 S-Box
  • 44. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 45. Simplified Advanced Encryption Standard  Round 2 4) Add round Key2  Key2 = 1000 0111 1010 1111  R2= Key2 ⊕ ShRow(SubNib(R1)) = 1101 1101 0010 1000 ⊕ 1010 0011 0100 0011 = 0010 0100 1110 1100 Ciphertext = 0010 0100 1110 1100
  • 46. Simplified Advanced Encryption Standard Simplified Advanced Encryption Standard S-AES Encryption and Decryption S-AES Key Generation S-AES Encryption S-AES Decryption
  • 47. Simplified Advanced Encryption Standard Shift Row Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Nibble Substitution Shift Row Add Round Key Nibble Substitution Add Round Key Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2 Round 1 Round 2
  • 48. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 49. Simplified Advanced Encryption Standard  Assume: C= 0010 0100 1110 1100  Key0 = w0w1 = 0100 1010 1111 0101  Key1 = w2w3 = 1101 1101 0010 1000  Key2 = w4w5 = 1000 0111 1010 1111
  • 50. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 51. Simplified Advanced Encryption Standard  Key2 = w4w5 = 1000 0111 1010 1111  C= 0010 0100 1110 1100  R0= C ⊕ Key2 = 0010 0100 1110 1100 ⊕ 1000 0111 1010 1111  =1010 0011 0100 0011
  • 52. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 53. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 54. Simplified Advanced Encryption Standard  Round 1 1) Inverse Shift Row  IShRow(R0)=IShRow(1010 0011 0100 0011)= = 1010 0011 0100 0011 2) Inverse Nibble Sub  ISubNib( 1010 0011 0100 0011 )= = 0010 1011 0001 1011 Inv S-Box
  • 55. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 56. Simplified Advanced Encryption Standard 3) Add Round 1 Key  0010 1011 0001 1011 ⊕ Key1 = 0010 1011 0001 1011 ⊕ 1101 1101 0010 1000 =1111 0110 0011 0011
  • 57. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 58. Simplified Advanced Encryption Standard  Round 1 4) Inverse Mix Columns :  MixCol (1111 0110 0011 0011) = 1111 0011 0110 0011 ∗ 9 2 2 9 =  = F 3 6 3 ∗ 𝟗 𝟐 𝟐 𝟗 = (F∗9⊕6∗2) (3∗9⊕3∗2) (F∗2⊕6∗9) (3∗2⊕3∗9)  = (E⊕C) (8⊕6) (D⊕3) (6⊕8)  = (1110⊕1100) (1000⊕0110) (1101⊕0011) (0110⊕1000) * 1 2 3 4 5 6 7 8 9 A B C D E F 2 2 4 6 8 A C E 3 1 7 5 B 9 F D 4 4 8 C 3 7 B F 6 2 E A 5 1 D 9 9 9 1 8 2 B 3 A 4 D 5 C 6 F 7 E
  • 59. Simplified Advanced Encryption Standard  (1110⊕1100) (1000⊕0110) (1101⊕0011) (0110⊕1000) = 0010 1110 1110 1110 R1 = 0010 1110 1110 1110
  • 60. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 61. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 62. Simplified Advanced Encryption Standard  Round 2 1) Inverse Shift Row  IShRow(R1)=IShRow(0010 1110 1110 1110)= = 0010 1110 1110 1110 2) Inverse Nibble Sub  ISubNib( 0010 1110 1110 1110 )= = 1001 1101 1101 1101 Inv S-Box
  • 63. Simplified Advanced Encryption Standard Inverse Shift Row Inverse Mix Columns Add Round Key 16-bit Plain text 16-bit Cipher text Inverse Nibble Substitution Inverse Shift Row Add Round Key Inverse Nibble Substitution Add Round Key 𝒘 𝟐,𝟑 16-bit Key Expand Key 𝒘 𝟒,𝟓 Expand Key 𝒘 𝟎,𝟏 Round 1 Round 2
  • 64. Simplified Advanced Encryption Standard 3) Add Round 2 Key  R2= 1001 1101 1101 1101 ⊕ Key0 = 1001 1101 1101 1101 ⊕ 0100 1010 1111 0101 =1101 0111 0010 1000 Plaintext = 1101 0111 0010 1000 = D7 28
  • 65. Simplified Advanced Encryption Standard facebook.com/mloey mohamedloey@gmail.com twitter.com/mloey linkedin.com/in/mloey mloey@fci.bu.edu.eg mloey.github.io
  • 66. Simplified Advanced Encryption Standard www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME