SlideShare a Scribd company logo
1 of 48
Download to read offline
1
Modified AES Algorithm Using Multiple S-Boxes
Instructor: Truong Tuan Anh, PhD
S: Chu Xuân Tình - 1870583
2
Modified AES Algorithm Using Multiple
S-Boxes
1. Introduction
2. Advance Encryption Standard (AES)
3. Modified AES Algorithm
4. Avaluation
AES - Modifier
3
AES - introdution
Ø In 2000, the NIST formally adopted the AES
encryption algorithm and published it as a federal
standard under the designation FIPS-197.
Ø It was chosen because of its security,
performance, efficiency, implement ability, and low
memory requirements.
• Rijndael was selected as the AES
– Designed by Vincent Rijmen and Joan Daemen
in Belgium
4
AES - introdution
Ø The AES Cipher - Rijndael
• An iterative
– processes data as block of 4 columns of 4 bytes
(128 bits)
– operates on entire data block in every round
• Rijndael design:
– simplicity
– has 128/192/256 bit keys, 128 bits data
– resistant against known attacks
– speed and code compactness on many CPUs
• The MixColumn function in the AES algorithm is
an important property of the cipher
5
AES - introdution
Ø The MixColumn function in the AES algorithm
is an important property of the cipher
ü It provides strength against differential and linear
attacks due to the complexity of its mathematical
operations.
ü Require computational resources in software
implementation.
ü Replacing the MixColumn function, the speed
performance of the AES algorithm will be
improved.
ü Propose for a modified AES algorithm using
multiple S-Boxes.
6
AES - Classfication
AES - Basic
7
AES
Plaintext (128 bits)
Ciphertext (128 bits)
Key (128-256 bits)
AES Conceptual Scheme
AES - Basic
8
Ø Multiple rounds
• Rounds are (almost) identical
– First and last round are a little different
High Level Description
No MixColumns
AES - Overall Structure
AES - Cipher
AES -128-bit values
12
• Data block viewed as 4-by-4 table of bytes
• Represented as 4 by 4 matrix of 8-bit
bytes.
• Key is expanded to array of 32 bits words
1 byte
AES - Data Unit
AES - Unit Transformation
AES - Changing Plaintext to State
AES -Details of Each Round
AES- SubBytes: Byte Substitution
• A simple substitution of each byte
– provide a confusion
• Uses one S-box of 16x16 bytes containing a permutation of all 256
8-bit values
• Each byte of state is replaced by byte indexed by row (left 4-bits) &
column (right 4-bits)
– eg. byte {95} is replaced by byte in row 9 column 5
– which has value {2A}
• S-box constructed using defined transformation of values in Galois
Field- GF(28)
AES - SubBytes and InvSubBytes
AES - SubBytes Operation
• The SubBytes operation involves 16 independent byte-
to-byte transformations. • Interpret the byte as two hexadecimal
digits xy
• SW implementation, use row (x) and
column (y) as lookup pointer
S1,1 = xy16
x’y’16
AES - SubBytes Table
• Implement by Table Lookup
AES - InvSubBytes Table
Sample SubByte Transformation
• The SubBytes and InvSubBytes
transformations are inverses of each other.
AES - ShiftRows
• Shifting, which permutes the bytes.
• A circular byte shift in each each
– 1st row is unchanged
– 2nd row does 1 byte circular shift to left
– 3rd row does 2 byte circular shift to left
– 4th row does 3 byte circular shift to left
• In the encryption, the transformation is
called ShiftRows
• In the decryption, the transformation is
called InvShiftRows and the shifting is to
the right
AES - ShiftRows Scheme
AES - ShiftRows and InvShiftRows
AES - MixColumns
• ShiftRows and MixColumns provide diffusion to
the cipher
• Each column is processed separately
• Each byte is replaced by a value dependent on
all 4 bytes in the column
• Effectively a matrix multiplication in GF(28) using
prime poly m(x) =x8+x4+x3+x+1
AES -MixClumns Scheme
The MixColumns transformation operates at the column level; it
transforms each column of the state to a new column.
AES-MixColumn & InvMixColumn
AES - AddRoundKey
• XOR state with 128-bits of the round key
• AddRoundKey proceeds one column at a
time.
– adds a round key word with each state
column matrix
– the operation is matrix addition
• Inverse for decryption identical
– since XOR own inverse, with reversed keys
• Designed to be as simple as possible
AES - AddRoundKey Scheme
AES Round
AES Key Scheduling
• takes 128-bits (16-bytes) key and expands
into array of 44 32-bit words
AES -Key Expansion Scheme
AES -Key Expansion submodule
• RotWord performs a one byte circular left shift on a word
For example:
RotWord[b0,b1,b2,b3] = [b1,b2,b3,b0]
• SubWord performs a byte substitution on each byte of
input word using the S-box
• SubWord(RotWord(temp)) is XORed with RCon[j] – the
round constant
AES Security
• AES was designed after DES.
• Most of the known attacks on DES were already tested
on AES.
• Brute-Force Attack
– AES is definitely more secure than DES due to the larger-size
key.
• Statistical Attacks
– Numerous tests have failed to do statistical analysis of the
ciphertext
• Differential and Linear Attacks
– There are no differential and linear attacks on AES as yet.
AES ALGORITHM USING MULTIPLE S-BOXES
vPROPOSED MODIFIED 128-AES ALGORITHM
USING MULTIPLE S-BOXES
Ø The MixColumns function is perceive to be
requiring more computational resources in
software implementation as compared to the
other functions
Ø Propose for a modified version of the 128-AES
algorithm using two substitution boxes
ü The first S-Box is the Rijndael S-Box
ü The second S-Box is constructed using XOR
operation and affine transformation
AES ALGORITHM USING MULTIPLE S-BOXES
AES - CONSTRUCTION OF THE NEW S-BOX
vThe second S-Box is derived from the
original S- Box as designed in the AES
ØExclusive OR Operation
§ each cell in the AES-Rijndael will be
XORed with 7F
AES-Rijndael[x,y] XOR (7F)
§ The Key[i] shall be any hexadecimal value
between 00 to FF (Table 1. AES-
2SboxXOR7F)
AES - CONSTRUCTION OF THE NEW S-BOX
AES - CONSTRUCTION OF THE NEW S-BOX
vThe second S-Box is derived from the
original S- Box as designed in the AES
ØExclusive OR Operation
ØAffine Transform Operation
ü After creating the initial values of AES-
2SboxXOR
ü Scramble the bits in each byte value, we next
apply the following transformation to each bit bi
as stored in the initial AES-2SboxXOR7F:
AES - CONSTRUCTION OF THE NEW S-BOX
ØAffine Transform Operation
ü For the inverse AES-2SboxXOR, the following
transformation to each bit was used for bit
scrambling:
AES - CONSTRUCTION OF THE NEW S-BOX
EVALUATION RESULTS
EVALUATION RESULTS
EVALUATION RESULTS
CONCLUSION
üModified AES algorithm using multiple
S-boxes.
üWe observed that the speed performance
greatly increased in the modified AES
algorithm using multiple S-Boxes, while
the security side has slightly weakened.
üEasily implemented using cheap
processors and a minimum amount of
memory.
üVery efficient
49
Referents
• [1] National Institute of Standards and
Technology, Advanced Encryption Standard,
FIPS 197 (2011).
• [2] Paper “Modified AES Algorithm Using
Multiple S-Boxes”
• [3] Wiki & slide & Internet.
50
51
Thanks for your attention!

More Related Content

What's hot

Tim hieu thanh ghi in asm
Tim hieu thanh ghi in asmTim hieu thanh ghi in asm
Tim hieu thanh ghi in asmMy Đá
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codesTedi Thug
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)farazvirk554
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsSam Bowne
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardComputer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardMohamed Loey
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
Kiến trúc máy tính và hợp ngữ bài 08
Kiến trúc máy tính và hợp ngữ bài 08Kiến trúc máy tính và hợp ngữ bài 08
Kiến trúc máy tính và hợp ngữ bài 08Nhóc Nhóc
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
Chương 3. Dịch ngược mã độc.pdf
Chương 3.  Dịch ngược mã độc.pdfChương 3.  Dịch ngược mã độc.pdf
Chương 3. Dịch ngược mã độc.pdfdong55
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes SHUBHA CHATURVEDI
 

What's hot (20)

SHA-3
SHA-3SHA-3
SHA-3
 
Aes
AesAes
Aes
 
Ch03
Ch03Ch03
Ch03
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
 
Tim hieu thanh ghi in asm
Tim hieu thanh ghi in asmTim hieu thanh ghi in asm
Tim hieu thanh ghi in asm
 
Ciphers and codes
Ciphers and codesCiphers and codes
Ciphers and codes
 
Aes
AesAes
Aes
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Chapter 5 module 3
Chapter 5 module 3Chapter 5 module 3
Chapter 5 module 3
 
Computer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption StandardComputer Security Lecture 5: Simplified Advanced Encryption Standard
Computer Security Lecture 5: Simplified Advanced Encryption Standard
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Kiến trúc máy tính và hợp ngữ bài 08
Kiến trúc máy tính và hợp ngữ bài 08Kiến trúc máy tính và hợp ngữ bài 08
Kiến trúc máy tính và hợp ngữ bài 08
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Chương 3. Dịch ngược mã độc.pdf
Chương 3.  Dịch ngược mã độc.pdfChương 3.  Dịch ngược mã độc.pdf
Chương 3. Dịch ngược mã độc.pdf
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 

Similar to Modified aes algorithm using multiple s boxes

Cryptography and network security AES ALG
Cryptography and network security AES ALGCryptography and network security AES ALG
Cryptography and network security AES ALGskcbcaa10uca068
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Mazin Alwaaly
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesVaibhav Khanna
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptroueida mohammed
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptssuseraaf866
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesVaibhav Khanna
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Cryptography chapter 5
Cryptography chapter 5Cryptography chapter 5
Cryptography chapter 5easytricks
 

Similar to Modified aes algorithm using multiple s boxes (20)

AES.ppt
AES.pptAES.ppt
AES.ppt
 
Unit -2.ppt
Unit -2.pptUnit -2.ppt
Unit -2.ppt
 
Cryptography and network security AES ALG
Cryptography and network security AES ALGCryptography and network security AES ALG
Cryptography and network security AES ALG
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Ch05
Ch05Ch05
Ch05
 
Cryptography
CryptographyCryptography
Cryptography
 
Aes
AesAes
Aes
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
 
Network security cs5
Network security cs5Network security cs5
Network security cs5
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
Cryptography chapter 5
Cryptography chapter 5Cryptography chapter 5
Cryptography chapter 5
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Modified aes algorithm using multiple s boxes

  • 1. 1 Modified AES Algorithm Using Multiple S-Boxes Instructor: Truong Tuan Anh, PhD S: Chu Xuân Tình - 1870583
  • 2. 2 Modified AES Algorithm Using Multiple S-Boxes 1. Introduction 2. Advance Encryption Standard (AES) 3. Modified AES Algorithm 4. Avaluation AES - Modifier
  • 3. 3 AES - introdution Ø In 2000, the NIST formally adopted the AES encryption algorithm and published it as a federal standard under the designation FIPS-197. Ø It was chosen because of its security, performance, efficiency, implement ability, and low memory requirements. • Rijndael was selected as the AES – Designed by Vincent Rijmen and Joan Daemen in Belgium
  • 4. 4 AES - introdution Ø The AES Cipher - Rijndael • An iterative – processes data as block of 4 columns of 4 bytes (128 bits) – operates on entire data block in every round • Rijndael design: – simplicity – has 128/192/256 bit keys, 128 bits data – resistant against known attacks – speed and code compactness on many CPUs • The MixColumn function in the AES algorithm is an important property of the cipher
  • 5. 5 AES - introdution Ø The MixColumn function in the AES algorithm is an important property of the cipher ü It provides strength against differential and linear attacks due to the complexity of its mathematical operations. ü Require computational resources in software implementation. ü Replacing the MixColumn function, the speed performance of the AES algorithm will be improved. ü Propose for a modified AES algorithm using multiple S-Boxes.
  • 7. AES - Basic 7 AES Plaintext (128 bits) Ciphertext (128 bits) Key (128-256 bits) AES Conceptual Scheme
  • 8. AES - Basic 8 Ø Multiple rounds • Rounds are (almost) identical – First and last round are a little different
  • 10. AES - Overall Structure
  • 12. AES -128-bit values 12 • Data block viewed as 4-by-4 table of bytes • Represented as 4 by 4 matrix of 8-bit bytes. • Key is expanded to array of 32 bits words 1 byte
  • 13. AES - Data Unit
  • 14. AES - Unit Transformation
  • 15. AES - Changing Plaintext to State
  • 16. AES -Details of Each Round
  • 17. AES- SubBytes: Byte Substitution • A simple substitution of each byte – provide a confusion • Uses one S-box of 16x16 bytes containing a permutation of all 256 8-bit values • Each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits) – eg. byte {95} is replaced by byte in row 9 column 5 – which has value {2A} • S-box constructed using defined transformation of values in Galois Field- GF(28)
  • 18. AES - SubBytes and InvSubBytes
  • 19. AES - SubBytes Operation • The SubBytes operation involves 16 independent byte- to-byte transformations. • Interpret the byte as two hexadecimal digits xy • SW implementation, use row (x) and column (y) as lookup pointer S1,1 = xy16 x’y’16
  • 20. AES - SubBytes Table • Implement by Table Lookup
  • 22. Sample SubByte Transformation • The SubBytes and InvSubBytes transformations are inverses of each other.
  • 23. AES - ShiftRows • Shifting, which permutes the bytes. • A circular byte shift in each each – 1st row is unchanged – 2nd row does 1 byte circular shift to left – 3rd row does 2 byte circular shift to left – 4th row does 3 byte circular shift to left • In the encryption, the transformation is called ShiftRows • In the decryption, the transformation is called InvShiftRows and the shifting is to the right
  • 24. AES - ShiftRows Scheme
  • 25. AES - ShiftRows and InvShiftRows
  • 26. AES - MixColumns • ShiftRows and MixColumns provide diffusion to the cipher • Each column is processed separately • Each byte is replaced by a value dependent on all 4 bytes in the column • Effectively a matrix multiplication in GF(28) using prime poly m(x) =x8+x4+x3+x+1
  • 27. AES -MixClumns Scheme The MixColumns transformation operates at the column level; it transforms each column of the state to a new column.
  • 29. AES - AddRoundKey • XOR state with 128-bits of the round key • AddRoundKey proceeds one column at a time. – adds a round key word with each state column matrix – the operation is matrix addition • Inverse for decryption identical – since XOR own inverse, with reversed keys • Designed to be as simple as possible
  • 32. AES Key Scheduling • takes 128-bits (16-bytes) key and expands into array of 44 32-bit words
  • 34. AES -Key Expansion submodule • RotWord performs a one byte circular left shift on a word For example: RotWord[b0,b1,b2,b3] = [b1,b2,b3,b0] • SubWord performs a byte substitution on each byte of input word using the S-box • SubWord(RotWord(temp)) is XORed with RCon[j] – the round constant
  • 35. AES Security • AES was designed after DES. • Most of the known attacks on DES were already tested on AES. • Brute-Force Attack – AES is definitely more secure than DES due to the larger-size key. • Statistical Attacks – Numerous tests have failed to do statistical analysis of the ciphertext • Differential and Linear Attacks – There are no differential and linear attacks on AES as yet.
  • 36. AES ALGORITHM USING MULTIPLE S-BOXES vPROPOSED MODIFIED 128-AES ALGORITHM USING MULTIPLE S-BOXES Ø The MixColumns function is perceive to be requiring more computational resources in software implementation as compared to the other functions Ø Propose for a modified version of the 128-AES algorithm using two substitution boxes ü The first S-Box is the Rijndael S-Box ü The second S-Box is constructed using XOR operation and affine transformation
  • 37. AES ALGORITHM USING MULTIPLE S-BOXES
  • 38. AES - CONSTRUCTION OF THE NEW S-BOX vThe second S-Box is derived from the original S- Box as designed in the AES ØExclusive OR Operation § each cell in the AES-Rijndael will be XORed with 7F AES-Rijndael[x,y] XOR (7F) § The Key[i] shall be any hexadecimal value between 00 to FF (Table 1. AES- 2SboxXOR7F)
  • 39. AES - CONSTRUCTION OF THE NEW S-BOX
  • 40. AES - CONSTRUCTION OF THE NEW S-BOX vThe second S-Box is derived from the original S- Box as designed in the AES ØExclusive OR Operation ØAffine Transform Operation ü After creating the initial values of AES- 2SboxXOR ü Scramble the bits in each byte value, we next apply the following transformation to each bit bi as stored in the initial AES-2SboxXOR7F:
  • 41. AES - CONSTRUCTION OF THE NEW S-BOX ØAffine Transform Operation ü For the inverse AES-2SboxXOR, the following transformation to each bit was used for bit scrambling:
  • 42. AES - CONSTRUCTION OF THE NEW S-BOX
  • 46. CONCLUSION üModified AES algorithm using multiple S-boxes. üWe observed that the speed performance greatly increased in the modified AES algorithm using multiple S-Boxes, while the security side has slightly weakened. üEasily implemented using cheap processors and a minimum amount of memory. üVery efficient 49
  • 47. Referents • [1] National Institute of Standards and Technology, Advanced Encryption Standard, FIPS 197 (2011). • [2] Paper “Modified AES Algorithm Using Multiple S-Boxes” • [3] Wiki & slide & Internet. 50
  • 48. 51 Thanks for your attention!