SlideShare a Scribd company logo
1 of 43
Network Security
CS-5
By: Prof. Ganesh Ingle
Session 2 objective
CS-5 Revision Previous Session revision
CS -5 Block Ciphering
CS -5 Revision of DES,Feistel Cipher Structure
CS -5 Confusion and Diffusion Theory
CS -5 AES and its importance in security
CS-5 Efficient implementation of AES using C and C# demo.
SUMMARY
CS -5 Block Ciphering
This functionality is similar to block cipher
Only difference is key
CS -5 Block Ciphering
This functionality is similar to
block cipher Only difference is key
CS -5 Block Ciphering
This functionality is
similar to block
cipher Only
difference
is key And must
be reversible
CS -5 Block Ciphering
CS -5 Block Ciphering
Can any function be used as a block cipher ???
CS -5 Block Ciphering
Block Cipher Algorithms:
DES (Explanation done in session two ,refer video lecture Module 7)
AES
RC6
9
CS -5 Feistel Cipher Structure
1. PT=2 halves
2. Apply function to right
3. Function can be anything a logical model
4. For function a separate key will be used
5. O/p from 5 is XORed with left
6. O/P of left and right is swapped
7. Process 1 to 7 is a round
8. Number of rounds
Block Cipher Design Principles
1.Block Size (10B PT=10B CT)
2.Key size
3.Sub Keys Count
4.Round Function
5.Plain Text in Two equal Halves
10
CS -5 Confusion and Diffusion Theory
11
CS -5 Confusion and Diffusion Theory
12
CS -5 AES and its importance in security
 AES(Applications in commercial market)
 Intel and AMD processors include the AES instruction set.
 Signal Protocol
 Google Allo (optional)
 Facebook Messenger (optional)
 Signal
 TextSecure
 WhatsApp
 Linux kernel's Crypto API, now exposed to userspace
 DataLocker Uses AES 256-bit CBC and XTS mode hardware encryption
 BitLocker (part of certain editions of Windows operating systems)
 7z ,Amanda Backup,PeaZip,PKZIP,RAR,WinZip,UltraISO
 Hadoop
13
CS -5 AES and its importance in security
 AES(Advance Encryption Standard):
 Symmetric Key Block cipher (Same key ???)
 128 bit data
 128 bit key size
 56 bit size key was used in DES vulnerable for the brut
force attack
 Stronger and faster than DES
14
CS -5 AES and its importance in security
Rounds Key
10 128
12 192
14 256
15
CS -5 AES and its importance in security
AES Structure: AES Encryption process:
16
CS -5 AES and its importance in security
 AES(Advance Encryption Standard):
 Considering 10 rounds
 S1:Input PT=128 bits
 S2:Pre round transformation ( a key goes here k0) like
DES here also we have key expansion block
 S3:Now starts number of rounds (key is added to each
round)
 It runs up to round n depending upon key size
17
CS -5 AES and its importance in security
 AES(Advance Encryption Standard):
 designed by Rijmen-Daemen in Belgium
 has 128/192/256 bit keys, 128 bit data
 an iterative rather than Feistel cipher
 processes data as block of 4 columns of 4 bytes
 operates on entire data block in every round
 designed to have:
 resistance against known attacks
 speed and code compactness on many CPUs
 design simplicity
CS -5 AES key expansion block
CS -5 AES encryption process
 S1:Input PT=128 bits
 S2:Pre round transformation ( a key goes
here k0) like DES here also we have key
expansion block
 S3:Now starts number of rounds (key is
added to each round)
 Sub bytes : its matrix of 4x4 (s-boxes)
 Shift rows (Left shift only) & create
new matrix for net step
 Mix columns : Columns are mixed with
some mathematical function
 Add round key : Bit streams are now
XORed with round key
 This process is repeated till last round
Row number Shift left
1 0
2 1
3 2
4 3
Decryption process
is exact reverse of this
20
CS-5 Efficient implementation of AES.
Sub bytes : Wikipedia reference
CS -5 AES encryption process S box
CS -5 AES encryption process
 Substitute Bytes
 Example
CS -5 AES encryption process
Shift Rows
 A circular byte shift in each each
 1st row is unchanged
 2nd row does 1 byte circular shift to left
 3rd row does 2 byte circular shift to left
 4th row does 3 byte circular shift to left
 Decrypt inverts using shifts to right
 Since state is processed by columns, this step
permutes bytes between the columns
CS -5 AES encryption process
Shift Rows
CS -5 AES encryption process
Mix Columns
 each column is processed separately
 each byte is replaced by a value dependent on all 4 bytes in the
column
 effectively a matrix multiplication in GF(28) using prime poly m(x)
=x8+x4+x3+x+1
CS -5 AES encryption process
Mix Columns
CS -5 AES encryption process
AES Arithmetic
 uses arithmetic in the finite field GF(28)
 with irreducible polynomial
 m(x) = x8 + x4 + x3 + x + 1
 which is (100011011) or {11b}
 e.g.
 {02} • {87} mod {11b} = (1 0000 1110) mod {11b}
 = (1 0000 1110) xor (1 0001 1011) = (0001 0101)
CS -5 AES encryption process
Add Round Key
 XOR state with 128-bits of the round key
 again processed by column (though effectively a series of
byte operations)
 inverse for decryption identical
 since XOR own inverse, with reversed keys
 designed to be as simple as possible
 a form of Vernam cipher on expanded key
 requires other stages for complexity / security
CS -5 AES encryption process
Add Round Key
CS -5 AES encryption process
Key Expansion
 takes 128-bit (16-byte) key and
expands into array of 44/52/60
32-bit words
 start by copying key into first 4
words
 then loop creating words that
depend on values in previous &
4 places back
 in 3 of 4 cases just XOR these
together
 1st word in 4 has rotate + S-box
+ XOR round constant on
previous, before XOR 4th back
31
CS -5 AES and its importance in security
32
CS -5 AES and its importance in security
 Summary
 an iterative rather than Feistel cipher
 key expanded into array of 32-bit words
 four words form round key in each round
 4 different stages are used as shown
 has a simple structure
 only AddRoundKey uses key
 AddRoundKey a form of Vernam cipher
 each stage is easily reversible
 decryption uses keys in reverse order
 decryption does recover plaintext
 final round has only 3 stages
33
CS -5 AES and its importance in security
34
CS-5 Efficient implementation of AES.
35
CS-5 Efficient implementation of AES.
36
CS-5 Efficient implementation of AES.
37
CS-5 Efficient implementation of AES.
38
CS-5 Efficient implementation of AES.
39
CS-5 Efficient implementation of AES.
40
CS-5 Efficient implementation of AES.
41
CS-5 Efficient implementation of AES.
CS-5 AES vs DES
Thank you
Image Source
searchenterpriseai.techtarget.com
wikipedia

More Related Content

What's hot

Classical programming interview questions
Classical programming interview questionsClassical programming interview questions
Classical programming interview questionsGradeup
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dDharmalingam Ganesan
 
An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)Dharmalingam Ganesan
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
How do computers exchange secrets using Math?
How do computers exchange secrets using Math?How do computers exchange secrets using Math?
How do computers exchange secrets using Math?Dharmalingam Ganesan
 
Solutions to online rsa factoring challenges
Solutions to online rsa factoring challengesSolutions to online rsa factoring challenges
Solutions to online rsa factoring challengesDharmalingam Ganesan
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSAMohamed Loey
 
5 stream ciphers
5 stream ciphers5 stream ciphers
5 stream ciphersHarish Sahu
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eDharmalingam Ganesan
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice CryptographyPriyanka Aash
 
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionImplementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionMd. Ariful Hoque
 

What's hot (20)

Classical programming interview questions
Classical programming interview questionsClassical programming interview questions
Classical programming interview questions
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent dAnalysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
 
An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)An Analysis of Secure Remote Password (SRP)
An Analysis of Secure Remote Password (SRP)
 
RSA without Integrity Checks
RSA without Integrity ChecksRSA without Integrity Checks
RSA without Integrity Checks
 
RSA without Padding
RSA without PaddingRSA without Padding
RSA without Padding
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
How do computers exchange secrets using Math?
How do computers exchange secrets using Math?How do computers exchange secrets using Math?
How do computers exchange secrets using Math?
 
Solutions to online rsa factoring challenges
Solutions to online rsa factoring challengesSolutions to online rsa factoring challenges
Solutions to online rsa factoring challenges
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
5 stream ciphers
5 stream ciphers5 stream ciphers
5 stream ciphers
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
 
An Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent eAn Analysis of RSA Public Exponent e
An Analysis of RSA Public Exponent e
 
Lattice Cryptography
Lattice CryptographyLattice Cryptography
Lattice Cryptography
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
RSA Game using an Oracle
RSA Game using an OracleRSA Game using an Oracle
RSA Game using an Oracle
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionImplementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
 

Similar to Network security cs5

advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptroueida mohammed
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptssuseraaf866
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsFaisal Shahzad Khan
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)MdFazleRabbi18
 

Similar to Network security cs5 (20)

Aes
AesAes
Aes
 
Aes
AesAes
Aes
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Ch05
Ch05Ch05
Ch05
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
 
CNS2 unit 2.pdf
CNS2 unit 2.pdfCNS2 unit 2.pdf
CNS2 unit 2.pdf
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
DES.ppt
DES.pptDES.ppt
DES.ppt
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)
 

More from Infinity Tech Solutions

Database Management System-session 3-4-5
Database Management System-session 3-4-5Database Management System-session 3-4-5
Database Management System-session 3-4-5Infinity Tech Solutions
 
Main topic 3 problem solving and office automation
Main topic 3 problem solving and office automationMain topic 3 problem solving and office automation
Main topic 3 problem solving and office automationInfinity Tech Solutions
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languagesInfinity Tech Solutions
 
AI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorAI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorInfinity Tech Solutions
 
Programming with matlab session 5 looping
Programming with matlab session 5 loopingProgramming with matlab session 5 looping
Programming with matlab session 5 loopingInfinity Tech Solutions
 

More from Infinity Tech Solutions (20)

Database management system session 6
Database management system session 6Database management system session 6
Database management system session 6
 
Database management system session 5
Database management system session 5Database management system session 5
Database management system session 5
 
Database Management System-session 3-4-5
Database Management System-session 3-4-5Database Management System-session 3-4-5
Database Management System-session 3-4-5
 
Database Management System-session1-2
Database Management System-session1-2Database Management System-session1-2
Database Management System-session1-2
 
Main topic 3 problem solving and office automation
Main topic 3 problem solving and office automationMain topic 3 problem solving and office automation
Main topic 3 problem solving and office automation
 
Introduction to c programming
Introduction to c programmingIntroduction to c programming
Introduction to c programming
 
E commerce
E commerce E commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
Bds session 13 14
Bds session 13 14Bds session 13 14
Bds session 13 14
 
Computer memory, Types of programming languages
Computer memory, Types of programming languagesComputer memory, Types of programming languages
Computer memory, Types of programming languages
 
Basic hardware familiarization
Basic hardware familiarizationBasic hardware familiarization
Basic hardware familiarization
 
User defined functions in matlab
User defined functions in  matlabUser defined functions in  matlab
User defined functions in matlab
 
Programming with matlab session 6
Programming with matlab session 6Programming with matlab session 6
Programming with matlab session 6
 
Programming with matlab session 3 notes
Programming with matlab session 3 notesProgramming with matlab session 3 notes
Programming with matlab session 3 notes
 
AI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime SectorAI/ML/DL/BCT A Revolution in Maritime Sector
AI/ML/DL/BCT A Revolution in Maritime Sector
 
Programming with matlab session 5 looping
Programming with matlab session 5 loopingProgramming with matlab session 5 looping
Programming with matlab session 5 looping
 
BIG DATA Session 7 8
BIG DATA Session 7 8BIG DATA Session 7 8
BIG DATA Session 7 8
 
BIG DATA Session 6
BIG DATA Session 6BIG DATA Session 6
BIG DATA Session 6
 
MS word
MS word MS word
MS word
 
DBMS CS 4-5
DBMS CS 4-5DBMS CS 4-5
DBMS CS 4-5
 

Recently uploaded

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 

Recently uploaded (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 

Network security cs5

  • 2. Session 2 objective CS-5 Revision Previous Session revision CS -5 Block Ciphering CS -5 Revision of DES,Feistel Cipher Structure CS -5 Confusion and Diffusion Theory CS -5 AES and its importance in security CS-5 Efficient implementation of AES using C and C# demo. SUMMARY
  • 3. CS -5 Block Ciphering This functionality is similar to block cipher Only difference is key
  • 4. CS -5 Block Ciphering This functionality is similar to block cipher Only difference is key
  • 5. CS -5 Block Ciphering This functionality is similar to block cipher Only difference is key And must be reversible
  • 6. CS -5 Block Ciphering
  • 7. CS -5 Block Ciphering Can any function be used as a block cipher ???
  • 8. CS -5 Block Ciphering Block Cipher Algorithms: DES (Explanation done in session two ,refer video lecture Module 7) AES RC6
  • 9. 9 CS -5 Feistel Cipher Structure 1. PT=2 halves 2. Apply function to right 3. Function can be anything a logical model 4. For function a separate key will be used 5. O/p from 5 is XORed with left 6. O/P of left and right is swapped 7. Process 1 to 7 is a round 8. Number of rounds Block Cipher Design Principles 1.Block Size (10B PT=10B CT) 2.Key size 3.Sub Keys Count 4.Round Function 5.Plain Text in Two equal Halves
  • 10. 10 CS -5 Confusion and Diffusion Theory
  • 11. 11 CS -5 Confusion and Diffusion Theory
  • 12. 12 CS -5 AES and its importance in security  AES(Applications in commercial market)  Intel and AMD processors include the AES instruction set.  Signal Protocol  Google Allo (optional)  Facebook Messenger (optional)  Signal  TextSecure  WhatsApp  Linux kernel's Crypto API, now exposed to userspace  DataLocker Uses AES 256-bit CBC and XTS mode hardware encryption  BitLocker (part of certain editions of Windows operating systems)  7z ,Amanda Backup,PeaZip,PKZIP,RAR,WinZip,UltraISO  Hadoop
  • 13. 13 CS -5 AES and its importance in security  AES(Advance Encryption Standard):  Symmetric Key Block cipher (Same key ???)  128 bit data  128 bit key size  56 bit size key was used in DES vulnerable for the brut force attack  Stronger and faster than DES
  • 14. 14 CS -5 AES and its importance in security Rounds Key 10 128 12 192 14 256
  • 15. 15 CS -5 AES and its importance in security AES Structure: AES Encryption process:
  • 16. 16 CS -5 AES and its importance in security  AES(Advance Encryption Standard):  Considering 10 rounds  S1:Input PT=128 bits  S2:Pre round transformation ( a key goes here k0) like DES here also we have key expansion block  S3:Now starts number of rounds (key is added to each round)  It runs up to round n depending upon key size
  • 17. 17 CS -5 AES and its importance in security  AES(Advance Encryption Standard):  designed by Rijmen-Daemen in Belgium  has 128/192/256 bit keys, 128 bit data  an iterative rather than Feistel cipher  processes data as block of 4 columns of 4 bytes  operates on entire data block in every round  designed to have:  resistance against known attacks  speed and code compactness on many CPUs  design simplicity
  • 18. CS -5 AES key expansion block
  • 19. CS -5 AES encryption process  S1:Input PT=128 bits  S2:Pre round transformation ( a key goes here k0) like DES here also we have key expansion block  S3:Now starts number of rounds (key is added to each round)  Sub bytes : its matrix of 4x4 (s-boxes)  Shift rows (Left shift only) & create new matrix for net step  Mix columns : Columns are mixed with some mathematical function  Add round key : Bit streams are now XORed with round key  This process is repeated till last round Row number Shift left 1 0 2 1 3 2 4 3 Decryption process is exact reverse of this
  • 20. 20 CS-5 Efficient implementation of AES. Sub bytes : Wikipedia reference
  • 21. CS -5 AES encryption process S box
  • 22. CS -5 AES encryption process  Substitute Bytes  Example
  • 23. CS -5 AES encryption process Shift Rows  A circular byte shift in each each  1st row is unchanged  2nd row does 1 byte circular shift to left  3rd row does 2 byte circular shift to left  4th row does 3 byte circular shift to left  Decrypt inverts using shifts to right  Since state is processed by columns, this step permutes bytes between the columns
  • 24. CS -5 AES encryption process Shift Rows
  • 25. CS -5 AES encryption process Mix Columns  each column is processed separately  each byte is replaced by a value dependent on all 4 bytes in the column  effectively a matrix multiplication in GF(28) using prime poly m(x) =x8+x4+x3+x+1
  • 26. CS -5 AES encryption process Mix Columns
  • 27. CS -5 AES encryption process AES Arithmetic  uses arithmetic in the finite field GF(28)  with irreducible polynomial  m(x) = x8 + x4 + x3 + x + 1  which is (100011011) or {11b}  e.g.  {02} • {87} mod {11b} = (1 0000 1110) mod {11b}  = (1 0000 1110) xor (1 0001 1011) = (0001 0101)
  • 28. CS -5 AES encryption process Add Round Key  XOR state with 128-bits of the round key  again processed by column (though effectively a series of byte operations)  inverse for decryption identical  since XOR own inverse, with reversed keys  designed to be as simple as possible  a form of Vernam cipher on expanded key  requires other stages for complexity / security
  • 29. CS -5 AES encryption process Add Round Key
  • 30. CS -5 AES encryption process Key Expansion  takes 128-bit (16-byte) key and expands into array of 44/52/60 32-bit words  start by copying key into first 4 words  then loop creating words that depend on values in previous & 4 places back  in 3 of 4 cases just XOR these together  1st word in 4 has rotate + S-box + XOR round constant on previous, before XOR 4th back
  • 31. 31 CS -5 AES and its importance in security
  • 32. 32 CS -5 AES and its importance in security  Summary  an iterative rather than Feistel cipher  key expanded into array of 32-bit words  four words form round key in each round  4 different stages are used as shown  has a simple structure  only AddRoundKey uses key  AddRoundKey a form of Vernam cipher  each stage is easily reversible  decryption uses keys in reverse order  decryption does recover plaintext  final round has only 3 stages
  • 33. 33 CS -5 AES and its importance in security
  • 42. CS-5 AES vs DES