4. WE ENCRYPT A LOT OF DATA
Patient Data
PGP Encryption
Transform Raw
Data Into Results
AES 256 bit Encryption
AES Decryption
AES Decryption
AES Decryption
9. Full Round
SubBytes – Each byte was substituted
ShiftRows – Last three rows of block is shifted cyclically
MixColumns – Block columns are shifted
AddRoundKey
Last Round
SubBytes
ShiftRows
AddRoundKey
128 bit Key = 10
192 bit Key = 12
256 bit Key = 14
First Round
AddRoundKey – Each byte is XOR’d with each byte of round key
KeyExpansion – create round keys from cipher key
AES Algorithm
23. Conclusion
• Choose your Provider Library wisely
• Operating mode
• Key Length
• Encryption not an application
bottleneck
• Scalable data encryption
24. Acknowledgements
Ketan Patel and David Houlding @ Intel
Ryan Kophs @ GenoSpace
Any Questions?
Niall O’Connor
Chief Technology Officer
Boston Security Conference #4
Editor's Notes
Nate—should this get moved up to end the first section?