SlideShare a Scribd company logo
1 of 20
UNDER THE GUIDANCE OF: SUBMITTED BY:
MR. SP MISHRA NAYANIKA DUTT
SCIENTIST F ROLL NO: 53044
SAG, DRDO ECE -VIII SEMESTER
MINISTRY OF DEFENCE KIIT COLLEGE OF METCALFE
HOUSE, ENGINEERING
DELHI-54.
ADVANCED ENCRYPTION
STANDARD
ABOUT DRDO
● Defence Research and Development Organisation(DRDO) was formed in 1958
from the amalgamation of the then already functioning Technical Development
Establishment (TDEs) of the Indian Army and the Directorate of Technical
Development & Production (DTDP) with the Defence Science Organisation
(DSO).
● DRDO is a network of more than 50 laboratories which are engaged in
developing defence technologies covering various disciplines, like aeronautics,
armaments, electronics, combat vehicles, engineering systems,
instrumentation, missiles, advanced computing and simulation, special
materials, naval systems, life sciences, training, information systems and
agriculture.
● Presently, the Organisation is backed by over 5000 scientists and about 25,000
other scientific, technical and supporting personnel.
● Several major projects for the development of missiles, armaments, light
combat aircrafts, radars, electronic warfare systems etc are on hand and
significant achievements have already been made in several such technologies.
ABOUT SAG
● Scientific Analysis Group (SAG) was established in 1963 for evolving new
scientific methods for design and analysis of communication systems.
● In 1976, SAG started undertaking R&D projects on mathematical,
communication and speech analysis.
● SAG was further entrusted with R&D work in the field of electronics. Work
related to evaluating communication equipment to be introduced in Services
was taken up during 1980.
● Areas of Work: Advanced Mathematical and Statistical Analysis &
Development of Tools Linguistics - Computational and Structural Speech
Analysis - Recognition and Synthesis Simulation Studies Microprocessor-
based Systems Signal Processing Satellite Communication High Performance
Computing
BASICS ABOUT SMARTCARDS
● Smart cards are plastic cards containing an embedded microprocessor that
are used as secure devices in a wide range of applications.
● Metal circle - not the microprocessor rather a unit containing its outside
connections.
● Advantages:
● A memory for greater storage than can be provided on magnetic stripes.
● Intelligence for exploiting this increased data. The smart card participates
directly in controlling transactions; i.e. it is active not passive like the
magnetic card
● It cannot be reproduced, nor can its code be broken. After three wrong
codes have been tried, the chip blocks any further usage of the card, which
is therefore more secure than a magnetic card
● It stores formula within its permanent (read-only) memory which enables it
to
● verify the authenticity of the secret code typed in by the customer
● It registers and memorises the number and frequency of all transactions
effected.
APPLICATIONS
● Majority of financial orgs have mandated that credit and debit
cards will be smart card enabled.
● Enterprises provide their employees with smart ID badges.
Many governments are issuing smart card-based identity
credentials to their citizens.
● Smart health cards provide security and privacy to patient
information. Medical records are portable for emergency
purposes.
● Latest apps are in the area of transportation: modern parking
systems and public transports like metros(DMRC).
● Students can use their smart card-based IDs for multi
purposes using multi-app OS like MULTOS.
● Cryptography, hence, is used for email encryption, secure web
sites, code breaking(World Warr II) and smart cards.
CRYPTOGRAPHY
● Smart cards are used for various types of apps which include storage
and exchange of data. In most cases, this data is confidential, which
if leaked put people’s credentials at stake. Hence the data is
encrypted using certain algorithms called cryptographic algorithm.
● Ex. AES, RSA, DES, Triple-DES etc.
● Sensitive systems that are based on smart cards use protocols and
algorithms that have usually been subjected to rigorous analysis by
the cryptographic community.
● Similarly govt org need to decrypt similar encrypted data collected
from sources which are of national importance. There are such orgs
all around the world. Ex. NSA(US).
● An attacker always looks for the weakest link in your cryptosysytem.
That means we have to choose strong algos.
● Good ciphers should hide the statistical properties of the encrypted
pt. The ct symbols should appear to be normal.
ADVANCED ENCRYPTION STANDARD(AES)
● In 1997 NIST called for proposals for a new Advanced Encryption
Standard(AES).
● On October 2, 2000, NIST announced that it had chosen
Rijndael(Dr. Daemen and Dr. Rijmen) as the AES.
● Among the commercial standards that include AES are the Internet
phone Skype and numerous security products around the world. To
date, there are no attacks better than brute-force known against
AES.
● It’s a symmetric block cipher with block size of 128 bit and choice of
three key sizes: 128, 192 and 256 bit.
● The no of rounds through which a text has to go for
encryption/decryption is a function of the key size.
● Separate algorithm is required to derive separate keys(subkey) from
the original key called key schedule.
● The input is arranged into a state matrix and all the operations are
carried on byte level.
GALOIS FIELDS(GF)
● Galois Field(GF): A finite field, sometimes also called Galois field, is a set with a finite
number of elements.
● A group is a set of elements G together with an operation ◦ which combines two
elements of G. A group has the following properties:
1. The group operation ◦ is closed. That is, for all a,b,∈G, it holds that a ◦ b = c ∈ G.
2. The group operation is associative. That is, a◦(b◦c)=(a◦b)◦c for all a,b,c ∈ G.
3. There is an element 1∈G, called the neutral element (or identity element), such that a ◦ 1
= 1 ◦ a = a for all a ∈ G.
4. For each a ∈ G there exists an element a−1 ∈ G, called the inverse of a, such that a ◦
a−1 = a−1 ◦ a = 1.
5. A group G is abelian (or commutative) if, furthermore, a ◦ b =b ◦ a for all a,b ∈ G.
● A field F is a set of elements with the following properties:
1. All elements of F form an additive group with the group operation “+” and the neutral
element 0.
2. All elements of F except 0 form a multiplicative group with the group operation “×” and
the neutral element 1.
3. When the two group operations are mixed, the distributivity law holds, i.e., for all a,b,c
∈ F: a(b+c)= (ab)+(ac).
LAYERS OF THE ENCRYPTION
● There are 3 types of layers really, although iterations of 1 kind. These
layers comprise of few steps:
● Key Addition layer: A 128-bit round key, or subkey, which has
been derived from the main key in the key schedule, is XORed to the
state.
● Byte Substitution layer (S-Box): Each element of the state is
nonlinearly transformed using lookup tables with special
mathematical properties.
● ShiftRows layer: The ShiftRows transformation cyclically shifts
the second row of the state matrix by three bytes to the right, the
third row by two bytes to the right and the fourth row by one byte to
the right. The first row is not changed by the ShiftRows
transformation.
● MixColumn layer: The MixColumn step is a linear transformation
which mixes each column of the state matrix.
KEY SCHEDULE
● The AES key schedule is word-oriented, where 1 word = 32 bits.
Subkeys are stored in a key expansion array W that consists of
words. There are different key schedules for the three different AES
key sizes of 128, 192 and 256 bit.
● For a 128-b key there are 11 subkeys which are stored in a word
matrix containing 44 words. Each row contains 4 words and thus is
a subkey/roundkey.
● First row is the same as the original key. For the remaining rows,
every fifth word is derived as follows
W[4i] =W[4(i−1)]+g(W[4i−1])
where the function g() rotates its four input bytes, performs a byte-
wise S-Box substitution, and adds a round coefficient RC to it.
● The remaining three words of a subkey are computed recursively as:
W[4i+ j] =W[4i+ j−1]+W[4(i−1)+ j]
LAYERS OF THE DECRYPTION
● All layers are inverted, i.e., the Byte Substitution layer
becomes the Inv Byte Substitution layer, the ShiftRows layer
becomes the Inv ShiftRows layer, and the MixColumn layer
becomes InvMixColumn layer.
● The order of the subkeys is reversed and there is a change in
the order of the layers in the rounds of decryption.
● Since the XOR operation is its own inverse, the key addition
layer in the decryption mode is the same as in the encryption
mode.
● Inverse MixColumn Sublayer:
● Inverse ShiftRows Sublayer: Shift the rows of the state
matrix in the opposite direction.
● Inverse Byte Substitution Layer: is used when decrypting
a ciphertext.
REVERSE KEY SCHEDULE
● There is no requirement of a reverse key schedule if
the key schedule subkeys/roundkeys are only used,
but in a reverse fashion.
● Thus no separate reverse key schedule is required.
TEST VECTORS
● Encryption(128-b key):
o Key: 2b7e151628aed2a6abf7158809cf4f3c
o Plaintext: 3243f6a8885a308d313198a2e0370734
o Ciphertext: 3925841d02dc09fbdc118597196a0b32
● Decryption(128-b key):
o Key: 2b7e151628aed2a6abf7158809cf4f3c
o Ciphertext: 3925841d02dc09fbdc118597196a0b32
o Plaintext: 3243f6a8885a308d313198a2e0370734
DATA ENCRYPTION STANDARD (DES)
● In 1977 NIST adopted DES as the standard algorithm for
encryption (FIPS PUB 46). Subsequent attacks on DES led
NSA to adapt to Triple DES or 3-DES which was more secure
than DES and only brute force attack was possible on it.
● DES has a block length of 64 bits and a key length of 56 bits
and it’s a block cipher.
● Most encryption algorithms including DES, are based on
Feistel block cipher [FEIS73].
● Majority of network based symmetric cryptographic
algorithms use block cipher.
● A separate key schedule algorithm is required to derive the
subkeys for each of the 16 rounds.
● All the operations occur on bit level.
DES ENCRYPTION
● Algorithm contains two parts: one containing the 16
round functions and the key schedule.
● Apart from round function, initial permutation & inverse
initial permutation are other functions through which
the data block goes.
● Key schedule consists of similar 16 rounds of left circular
shift & permuted choice 2 functions. Apart from them
permuted choice 1 is also used.
● In round, right half of data goes through Feistel function
which expands, substitutes & permutes the input data.
● There are 8 S-boxes & each of them have 6-bit input and
4-bit output.
DES DECRYPTION
● Decryption algorithm is same as that of encryption.
● The key schedule also being same saves the need for
a different software for it.
● The only difference between encryption and
decryption is that the order of subkeys used is
reversed, i.e. for round 1 subkey 16 is used & for
round 16 subkey 1 is used.
TEST VECTORS
● Encryption (64-bit block):
o Key: 10316E028C8F3B4A
o Plaintext: 0000000000000000
o Ciphertext: 82DCBAFBDEAB6602
o Decryption (64-bit block):
o Key: 10316E028C8F3B4A
o Plaintext: 82DCBAFBDEAB6602
o Ciphertext: 0000000000000000
Thank You

More Related Content

Similar to Devlopment of crypto algo aes (1)

Similar to Devlopment of crypto algo aes (1) (20)

Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUESPERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
PERFORMANCE ANALYSIS OF D-FLIP FLOP USING CMOS, GDI, DSTC TECHNIQUES
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programming
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR...
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Aes
AesAes
Aes
 
Seq2Seq (encoder decoder) model
Seq2Seq (encoder decoder) modelSeq2Seq (encoder decoder) model
Seq2Seq (encoder decoder) model
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
icwet1097
icwet1097icwet1097
icwet1097
 
Verilog
VerilogVerilog
Verilog
 
Icbai 2018 ver_1
Icbai 2018 ver_1Icbai 2018 ver_1
Icbai 2018 ver_1
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Devlopment of crypto algo aes (1)

  • 1. UNDER THE GUIDANCE OF: SUBMITTED BY: MR. SP MISHRA NAYANIKA DUTT SCIENTIST F ROLL NO: 53044 SAG, DRDO ECE -VIII SEMESTER MINISTRY OF DEFENCE KIIT COLLEGE OF METCALFE HOUSE, ENGINEERING DELHI-54. ADVANCED ENCRYPTION STANDARD
  • 2. ABOUT DRDO ● Defence Research and Development Organisation(DRDO) was formed in 1958 from the amalgamation of the then already functioning Technical Development Establishment (TDEs) of the Indian Army and the Directorate of Technical Development & Production (DTDP) with the Defence Science Organisation (DSO). ● DRDO is a network of more than 50 laboratories which are engaged in developing defence technologies covering various disciplines, like aeronautics, armaments, electronics, combat vehicles, engineering systems, instrumentation, missiles, advanced computing and simulation, special materials, naval systems, life sciences, training, information systems and agriculture. ● Presently, the Organisation is backed by over 5000 scientists and about 25,000 other scientific, technical and supporting personnel. ● Several major projects for the development of missiles, armaments, light combat aircrafts, radars, electronic warfare systems etc are on hand and significant achievements have already been made in several such technologies.
  • 3. ABOUT SAG ● Scientific Analysis Group (SAG) was established in 1963 for evolving new scientific methods for design and analysis of communication systems. ● In 1976, SAG started undertaking R&D projects on mathematical, communication and speech analysis. ● SAG was further entrusted with R&D work in the field of electronics. Work related to evaluating communication equipment to be introduced in Services was taken up during 1980. ● Areas of Work: Advanced Mathematical and Statistical Analysis & Development of Tools Linguistics - Computational and Structural Speech Analysis - Recognition and Synthesis Simulation Studies Microprocessor- based Systems Signal Processing Satellite Communication High Performance Computing
  • 4. BASICS ABOUT SMARTCARDS ● Smart cards are plastic cards containing an embedded microprocessor that are used as secure devices in a wide range of applications. ● Metal circle - not the microprocessor rather a unit containing its outside connections. ● Advantages: ● A memory for greater storage than can be provided on magnetic stripes. ● Intelligence for exploiting this increased data. The smart card participates directly in controlling transactions; i.e. it is active not passive like the magnetic card ● It cannot be reproduced, nor can its code be broken. After three wrong codes have been tried, the chip blocks any further usage of the card, which is therefore more secure than a magnetic card ● It stores formula within its permanent (read-only) memory which enables it to ● verify the authenticity of the secret code typed in by the customer ● It registers and memorises the number and frequency of all transactions effected.
  • 5. APPLICATIONS ● Majority of financial orgs have mandated that credit and debit cards will be smart card enabled. ● Enterprises provide their employees with smart ID badges. Many governments are issuing smart card-based identity credentials to their citizens. ● Smart health cards provide security and privacy to patient information. Medical records are portable for emergency purposes. ● Latest apps are in the area of transportation: modern parking systems and public transports like metros(DMRC). ● Students can use their smart card-based IDs for multi purposes using multi-app OS like MULTOS. ● Cryptography, hence, is used for email encryption, secure web sites, code breaking(World Warr II) and smart cards.
  • 6. CRYPTOGRAPHY ● Smart cards are used for various types of apps which include storage and exchange of data. In most cases, this data is confidential, which if leaked put people’s credentials at stake. Hence the data is encrypted using certain algorithms called cryptographic algorithm. ● Ex. AES, RSA, DES, Triple-DES etc. ● Sensitive systems that are based on smart cards use protocols and algorithms that have usually been subjected to rigorous analysis by the cryptographic community. ● Similarly govt org need to decrypt similar encrypted data collected from sources which are of national importance. There are such orgs all around the world. Ex. NSA(US). ● An attacker always looks for the weakest link in your cryptosysytem. That means we have to choose strong algos. ● Good ciphers should hide the statistical properties of the encrypted pt. The ct symbols should appear to be normal.
  • 7. ADVANCED ENCRYPTION STANDARD(AES) ● In 1997 NIST called for proposals for a new Advanced Encryption Standard(AES). ● On October 2, 2000, NIST announced that it had chosen Rijndael(Dr. Daemen and Dr. Rijmen) as the AES. ● Among the commercial standards that include AES are the Internet phone Skype and numerous security products around the world. To date, there are no attacks better than brute-force known against AES. ● It’s a symmetric block cipher with block size of 128 bit and choice of three key sizes: 128, 192 and 256 bit. ● The no of rounds through which a text has to go for encryption/decryption is a function of the key size. ● Separate algorithm is required to derive separate keys(subkey) from the original key called key schedule. ● The input is arranged into a state matrix and all the operations are carried on byte level.
  • 8. GALOIS FIELDS(GF) ● Galois Field(GF): A finite field, sometimes also called Galois field, is a set with a finite number of elements. ● A group is a set of elements G together with an operation ◦ which combines two elements of G. A group has the following properties: 1. The group operation ◦ is closed. That is, for all a,b,∈G, it holds that a ◦ b = c ∈ G. 2. The group operation is associative. That is, a◦(b◦c)=(a◦b)◦c for all a,b,c ∈ G. 3. There is an element 1∈G, called the neutral element (or identity element), such that a ◦ 1 = 1 ◦ a = a for all a ∈ G. 4. For each a ∈ G there exists an element a−1 ∈ G, called the inverse of a, such that a ◦ a−1 = a−1 ◦ a = 1. 5. A group G is abelian (or commutative) if, furthermore, a ◦ b =b ◦ a for all a,b ∈ G. ● A field F is a set of elements with the following properties: 1. All elements of F form an additive group with the group operation “+” and the neutral element 0. 2. All elements of F except 0 form a multiplicative group with the group operation “×” and the neutral element 1. 3. When the two group operations are mixed, the distributivity law holds, i.e., for all a,b,c ∈ F: a(b+c)= (ab)+(ac).
  • 9. LAYERS OF THE ENCRYPTION ● There are 3 types of layers really, although iterations of 1 kind. These layers comprise of few steps: ● Key Addition layer: A 128-bit round key, or subkey, which has been derived from the main key in the key schedule, is XORed to the state. ● Byte Substitution layer (S-Box): Each element of the state is nonlinearly transformed using lookup tables with special mathematical properties. ● ShiftRows layer: The ShiftRows transformation cyclically shifts the second row of the state matrix by three bytes to the right, the third row by two bytes to the right and the fourth row by one byte to the right. The first row is not changed by the ShiftRows transformation. ● MixColumn layer: The MixColumn step is a linear transformation which mixes each column of the state matrix.
  • 10. KEY SCHEDULE ● The AES key schedule is word-oriented, where 1 word = 32 bits. Subkeys are stored in a key expansion array W that consists of words. There are different key schedules for the three different AES key sizes of 128, 192 and 256 bit. ● For a 128-b key there are 11 subkeys which are stored in a word matrix containing 44 words. Each row contains 4 words and thus is a subkey/roundkey. ● First row is the same as the original key. For the remaining rows, every fifth word is derived as follows W[4i] =W[4(i−1)]+g(W[4i−1]) where the function g() rotates its four input bytes, performs a byte- wise S-Box substitution, and adds a round coefficient RC to it. ● The remaining three words of a subkey are computed recursively as: W[4i+ j] =W[4i+ j−1]+W[4(i−1)+ j]
  • 11. LAYERS OF THE DECRYPTION ● All layers are inverted, i.e., the Byte Substitution layer becomes the Inv Byte Substitution layer, the ShiftRows layer becomes the Inv ShiftRows layer, and the MixColumn layer becomes InvMixColumn layer. ● The order of the subkeys is reversed and there is a change in the order of the layers in the rounds of decryption. ● Since the XOR operation is its own inverse, the key addition layer in the decryption mode is the same as in the encryption mode. ● Inverse MixColumn Sublayer: ● Inverse ShiftRows Sublayer: Shift the rows of the state matrix in the opposite direction. ● Inverse Byte Substitution Layer: is used when decrypting a ciphertext.
  • 12. REVERSE KEY SCHEDULE ● There is no requirement of a reverse key schedule if the key schedule subkeys/roundkeys are only used, but in a reverse fashion. ● Thus no separate reverse key schedule is required.
  • 13.
  • 14. TEST VECTORS ● Encryption(128-b key): o Key: 2b7e151628aed2a6abf7158809cf4f3c o Plaintext: 3243f6a8885a308d313198a2e0370734 o Ciphertext: 3925841d02dc09fbdc118597196a0b32 ● Decryption(128-b key): o Key: 2b7e151628aed2a6abf7158809cf4f3c o Ciphertext: 3925841d02dc09fbdc118597196a0b32 o Plaintext: 3243f6a8885a308d313198a2e0370734
  • 15. DATA ENCRYPTION STANDARD (DES) ● In 1977 NIST adopted DES as the standard algorithm for encryption (FIPS PUB 46). Subsequent attacks on DES led NSA to adapt to Triple DES or 3-DES which was more secure than DES and only brute force attack was possible on it. ● DES has a block length of 64 bits and a key length of 56 bits and it’s a block cipher. ● Most encryption algorithms including DES, are based on Feistel block cipher [FEIS73]. ● Majority of network based symmetric cryptographic algorithms use block cipher. ● A separate key schedule algorithm is required to derive the subkeys for each of the 16 rounds. ● All the operations occur on bit level.
  • 16. DES ENCRYPTION ● Algorithm contains two parts: one containing the 16 round functions and the key schedule. ● Apart from round function, initial permutation & inverse initial permutation are other functions through which the data block goes. ● Key schedule consists of similar 16 rounds of left circular shift & permuted choice 2 functions. Apart from them permuted choice 1 is also used. ● In round, right half of data goes through Feistel function which expands, substitutes & permutes the input data. ● There are 8 S-boxes & each of them have 6-bit input and 4-bit output.
  • 17. DES DECRYPTION ● Decryption algorithm is same as that of encryption. ● The key schedule also being same saves the need for a different software for it. ● The only difference between encryption and decryption is that the order of subkeys used is reversed, i.e. for round 1 subkey 16 is used & for round 16 subkey 1 is used.
  • 18.
  • 19. TEST VECTORS ● Encryption (64-bit block): o Key: 10316E028C8F3B4A o Plaintext: 0000000000000000 o Ciphertext: 82DCBAFBDEAB6602 o Decryption (64-bit block): o Key: 10316E028C8F3B4A o Plaintext: 82DCBAFBDEAB6602 o Ciphertext: 0000000000000000