SlideShare a Scribd company logo
1 of 24
Advanced
Encryption
Standard Algorithm
HD
TABLE OF CONTENT
01 03
Encryption and
Decryption
02 Demo
04
Cryptography AES
CRYPTOGRAPHY
Cryptography is the science
and study of methods of
protecting data in computer
and communication systems
from unauthorized disclosure
and modification.
QUOTE
Here’s a quote from
a famous person
“Cryptography is the ultimate form of
nonviolent direct action”
—Julian Assange
What is
Encryption
and
Decryption?
★ Encryption is the process of translating
plain text data (plaintext) into
something that appears to be random
and meaningless (ciphertext).
★ Decryption is the process of converting
ciphertext back to plaintext.
Why use Encryption ?
Encryption is important because it allows you to
securely protect data that you don't want anyone
else to have access to.
DEFINITION OF CONCEPTS
Private Key
A private key, also known as a
secret key, is a variable in
cryptography that is used with an
algorithm to encrypt and decrypt
code.
Public Key
Everyone else, who wants to
communicate with the Sender is
given a key called the Public Key.
Symmetric Encryption
Symmetric Encryption is when a
secret key is leveraged for both
encryption and decryption
functions.
Asymmetric Encryption
Anyone can encrypt messages
using a public key, but only the
holder of the paired private key can
decrypt such a message.
01
03
02
04
Advanced
Encryption Standard
It is a symmetric block cipher algorithm
chosen by the U.S. government to protect
classified information and is implemented in
software and hardware throughout the world
to encrypt sensitive data.
It was intended to be easy to
implement in hardware and software,
as well as in restricted environments.
CREDITS: This presentation template
was created by Slidesgo, including
icons by Flaticon, and infographics &
images by Freepik
Bit 0 or 1
1 byte = 8 bits
1 word = 4 bytes
1 block = 4 words
State ( 4×4)
16 bytes
Stores intermediate
result.
Rounds Size of keys
10 128
12 192
14 256
It has 10/12/14 rounds.
Where block size 128 bits =
16 byes (4 words).
No. of keys generated = N + 1
INPUT ARRAY (4X4)
4 Words
128 bits
16 bytes
1 byte
STATE ARRAY (4X4)
S0,0
S1,0
S2,0
S3,0
S0,1
S1,1
S2,1
S3,1
S0,2
S1,2
S2,2
S3,2
S0,3
S1,3
S2,3
S3,3
3rd byte of
0th word
W0
W1
W2
W3
KEY
K0
K4
K8
K12
K1
K5
K9
K13
K2
K6
K10
K14
K3
K7
K11
K15
W0
W1
W2
W3
W0
W1
W2 …… W42 W43
Key Expansion Algo
44 words
Structure of each
round at the
encryption site
SUBSTITUTION
AES uses substitution. Substitution
is done for each byte.
Only one table is used for
transformation of bytes that means
if two bytes are same then
transformation is also same.
SUBBYTES
The first transformation, SubBytes,
is used at the encryption site. To
substitute a byte, we interpret the
byte as two hexadecimal digits.
1st hexadecimal digit = Row
2nd hexadecimal digit = Column
Permutation
Another transformation found in
a round is shifting, which
permutes the bytes. In the
encryption, the transformation is
called ShiftRows..
MIXING
Take each word or column i.e.
4 bytes or 4x1 matrix and
multiply it with the constant
matrix
The output is 4x1 matrix of 4
bytes and is stored in output
or state matrix.
Key Adding
AddRoundKey proceeds one
column at a time.
AddRoundKey adds a round
key word with each state
column matrix; the operation
in AddRoundKey is matrix
addition.
Conclusion
● Cryptography
● Encryption and Decryption
● Private key, public key, Symmetric
Encryption, Asymmetric Encryption.
● What is aes?
● General design of aes
PROCESS
Add
roundkey
Subbyte
Shift
rows
mixing
● Cryptography and network
security (fifth edition) by
William Stallings.
● wikipedia
References
ThankYou

More Related Content

What's hot

Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 

What's hot (20)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Tiny encryption algorithm
Tiny encryption algorithmTiny encryption algorithm
Tiny encryption algorithm
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - IntroductionSecure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithmPublic Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric EncryptionCryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
AllBits presentation - Security in Theory
AllBits presentation - Security in TheoryAllBits presentation - Security in Theory
AllBits presentation - Security in Theory
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
RSA Game using an Oracle
RSA Game using an OracleRSA Game using an Oracle
RSA Game using an Oracle
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 

Similar to Advanced Encryption Standard Algorithm

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
phanleson
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
NithyasriA2
 
Cryptography
CryptographyCryptography
Cryptography
Rohan04
 

Similar to Advanced Encryption Standard Algorithm (20)

Ch12 Encryption
Ch12 EncryptionCh12 Encryption
Ch12 Encryption
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Cryptography and its Application in Security
Cryptography and its Application in SecurityCryptography and its Application in Security
Cryptography and its Application in Security
 
Day5
Day5Day5
Day5
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
CNS2 unit 2.pdf
CNS2 unit 2.pdfCNS2 unit 2.pdf
CNS2 unit 2.pdf
 
presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standards
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Cryptography and .NET
Cryptography and .NETCryptography and .NET
Cryptography and .NET
 
CryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptxCryptX '22 W1 Release (1).pptx
CryptX '22 W1 Release (1).pptx
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Cryptography
CryptographyCryptography
Cryptography
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Final report
Final reportFinal report
Final report
 
Encryption
EncryptionEncryption
Encryption
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

Advanced Encryption Standard Algorithm

  • 2. TABLE OF CONTENT 01 03 Encryption and Decryption 02 Demo 04 Cryptography AES
  • 3. CRYPTOGRAPHY Cryptography is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification.
  • 4. QUOTE Here’s a quote from a famous person “Cryptography is the ultimate form of nonviolent direct action” —Julian Assange
  • 5. What is Encryption and Decryption? ★ Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). ★ Decryption is the process of converting ciphertext back to plaintext.
  • 6. Why use Encryption ? Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to.
  • 7. DEFINITION OF CONCEPTS Private Key A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code. Public Key Everyone else, who wants to communicate with the Sender is given a key called the Public Key. Symmetric Encryption Symmetric Encryption is when a secret key is leveraged for both encryption and decryption functions. Asymmetric Encryption Anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. 01 03 02 04
  • 8. Advanced Encryption Standard It is a symmetric block cipher algorithm chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. It was intended to be easy to implement in hardware and software, as well as in restricted environments.
  • 9. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik Bit 0 or 1 1 byte = 8 bits 1 word = 4 bytes 1 block = 4 words State ( 4×4) 16 bytes Stores intermediate result. Rounds Size of keys 10 128 12 192 14 256 It has 10/12/14 rounds. Where block size 128 bits = 16 byes (4 words). No. of keys generated = N + 1
  • 10. INPUT ARRAY (4X4) 4 Words 128 bits 16 bytes 1 byte STATE ARRAY (4X4) S0,0 S1,0 S2,0 S3,0 S0,1 S1,1 S2,1 S3,1 S0,2 S1,2 S2,2 S3,2 S0,3 S1,3 S2,3 S3,3 3rd byte of 0th word W0 W1 W2 W3
  • 12. Structure of each round at the encryption site
  • 13. SUBSTITUTION AES uses substitution. Substitution is done for each byte. Only one table is used for transformation of bytes that means if two bytes are same then transformation is also same. SUBBYTES The first transformation, SubBytes, is used at the encryption site. To substitute a byte, we interpret the byte as two hexadecimal digits. 1st hexadecimal digit = Row 2nd hexadecimal digit = Column
  • 14.
  • 15. Permutation Another transformation found in a round is shifting, which permutes the bytes. In the encryption, the transformation is called ShiftRows..
  • 16.
  • 18. Take each word or column i.e. 4 bytes or 4x1 matrix and multiply it with the constant matrix The output is 4x1 matrix of 4 bytes and is stored in output or state matrix.
  • 19. Key Adding AddRoundKey proceeds one column at a time. AddRoundKey adds a round key word with each state column matrix; the operation in AddRoundKey is matrix addition.
  • 20.
  • 21. Conclusion ● Cryptography ● Encryption and Decryption ● Private key, public key, Symmetric Encryption, Asymmetric Encryption. ● What is aes? ● General design of aes
  • 23. ● Cryptography and network security (fifth edition) by William Stallings. ● wikipedia References