SlideShare a Scribd company logo
Advanced Encryption Standard
Naimur Rahman
naimur978@gmail.com
Department of Computer Science Engineering
University of Chittagong
November 21, 2020
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 1 / 20
What is AES?
AES is an encryption standard chosen by the National Institute of
Standards and Technology(NIST), USA to protect classified
information. It has been accepted world wide as a desirable
algorithm to encrypt sensitive data.
It is a block cipher which operates on block size of 128 bits for both
encrypting as well as decrypting.
Each Round performs same operations.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 2 / 20
Why AES?
In 1990’s the cracking of DES algorithm became possible.
Around 50hrs of bruteforcing allowed to crack the message.
NIST started searching for new feasible algorithm and proposed its
requirement in 1997.
In 2001 Rijndael algorithm designed by Rijment and Daemon of
Belgium was declared as the winner of the competition.
It met all Security, Cost and Implementation criteria.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 3 / 20
How Does it works?
AES basically repeats 4 major functions to encrypt data.It takes 128
bit block of data and a key[laymans term password] and gives a
ciphertext as output.The functions are:
1. Sub Bytes
2. Shift Rows
3. Mix Columns
4. Add Key
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 4 / 20
How Does it works?
The number of rounds performed by the algorithm strictly depends
on the size of key.
The following table gives overview of no. Of rounds performed with
the input of varying key lengths:
Key Size (in bits) Rounds
128 10
192 12
256 14
The larger the number of keys the more secure will be the data. The
time taken by s/w to encrypt will increase with no. of rounds.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 5 / 20
How Does it works?
Figure 2: Example Figure
Here,
E=encryption function for a symmetric block cipher
m=plaintext message of size 128bits
n=ciphertext]
k=key of size 128bits which is same for both encryption and
decryption
D= Decryption function for symmetric block cipher
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 6 / 20
Steps for encryption and decryption
Figure 3: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 7 / 20
Analysis of Steps
KeyExpansions- In the key Expansion process the given 128 bits
cipher key is stored in [4]x[4] bytes matrix (16*8=128 bits) and then
the four column words of the key matrix is expanded into a schedule
of 44 words (44*4=176) resulting in 11 round keys (176/11=16
bytes or 128 bits).
Number of round keys = Nr + 1. Where Nr is the number of rounds
(which is 10 in case of 128 bits key size) So here the round keys =
11.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 8 / 20
Analysis of Steps
Figure 4: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 9 / 20
Analysis of Steps
SubBytes- Each element of the matrix is replaced by the an element
of s-box matrix.
Figure 5: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 10 / 20
Analysis of Steps
SubBytes
For an element d1 corresponding value is 3e
Figure 6: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 11 / 20
Analysis of Steps
SubBytes
The S-box is a special lookup table which is constructed by Galois
fields.
The Generating function used in this algorithm is GF(28
)
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 12 / 20
Analysis of Steps
Shift Rows
In this step rows of the block are cylindrically shifted in left direction.
The first row is untouched , the second by one shift, third by two
and fourth by 3.
Figure 7: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 13 / 20
Analysis of Steps
Shift Rows
Figure 8: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 14 / 20
Analysis of Steps
Mix columns
This is the most important part of the algorithm causes the flip of
bits to spread all over the block
In this step the block is multiplied with a fixed matrix.
The multiplication is field multiplication in galois field.
For each row there are 16 multiplication, 12 XORs and a 4 byte
output.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 15 / 20
Analysis of Steps
Mix columns
Figure 9: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 16 / 20
Analysis of Steps
Add round key
Figure 10: Example Figure
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 17 / 20
Analysis of Steps
Add round key
In this step each byte is XOR-ed with corresponding element of key’s
matrix.
Once this step is done the keys are no longer available for this step.
Using the same key will weaken the algorithm.
To overcome this problem keys are expanded.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 18 / 20
Analysis of Steps
In the last round the mix column step is skipped.
It is not documented anywhere why this is done but recently a paper
was published against this method highlighting the weakening of
cipher text.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 19 / 20
Attacks
It is similar to the exhaustive key search attack(brute force attack -
trying all the possible set of keys) but it is adaptive. It is 4 times
better than the exhaustive key search. But it is infeasible using
current technology on block cipher having a keyspace of 128 bits
and above.
There are more advanced attack on AES-256 bits like the Related
Key Attack, which involves several distinct keys linked together by a
common relation which reduces the keyspace to 99.5 bits which is
also infeasible.
Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 20 / 20

More Related Content

What's hot

Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
CSCJournals
 
AES Encryption
AES EncryptionAES Encryption
AES Encryption
Rahul Marwaha
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
Ajay Karri
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
Huffman > Data Structures & Algorithums
Huffman > Data Structures & AlgorithumsHuffman > Data Structures & Algorithums
Huffman > Data Structures & Algorithums
Ain-ul-Moiz Khawaja
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Classical cryptography
Classical cryptographyClassical cryptography
Classical cryptography
Aravindharamanan S
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
farazvirk554
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
kinleay
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
nathanurag
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 

What's hot (20)

Crypto graphy
Crypto graphyCrypto graphy
Crypto graphy
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Le chiffrement
Le chiffrementLe chiffrement
Le chiffrement
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
 
AES Encryption
AES EncryptionAES Encryption
AES Encryption
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Huffman > Data Structures & Algorithums
Huffman > Data Structures & AlgorithumsHuffman > Data Structures & Algorithums
Huffman > Data Structures & Algorithums
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Classical cryptography
Classical cryptographyClassical cryptography
Classical cryptography
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 

Similar to Advanced Encryption Standard Latex Beamer Class Presentation

Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Associate Professor in VSB Coimbatore
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
 
D44091720
D44091720D44091720
D44091720
IJERA Editor
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET Journal
 
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
iosrjce
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
Deepak John
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
 
Enhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving EncryptionEnhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving Encryption
International Journal of Engineering Inventions www.ijeijournal.com
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
IJERD Editor
 
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfComparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
chWaqasZahid
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
HodaAhmedBekhitAhmed
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
IRJET Journal
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
 
Final report
Final reportFinal report
Final report
Jagbir Kalirai
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptx
matmurdock0111
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 

Similar to Advanced Encryption Standard Latex Beamer Class Presentation (20)

Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
D44091720
D44091720D44091720
D44091720
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for M...
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Enhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving EncryptionEnhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving Encryption
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfComparative Analysis of Aes and Rsa Algorithms for Data.pdf
Comparative Analysis of Aes and Rsa Algorithms for Data.pdf
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdfA VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
Final report
Final reportFinal report
Final report
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptx
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 

Recently uploaded

一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
osoyvvf
 
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative ClassifiersML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
MastanaihnaiduYasam
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdfNamma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
22ad0301
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus
Timothy Spann
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
hqfek
 
Drownings spike from May to August in children
Drownings spike from May to August in childrenDrownings spike from May to August in children
Drownings spike from May to August in children
Bisnar Chase Personal Injury Attorneys
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
NABLAS株式会社
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
9gr6pty
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
Rebecca Bilbro
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
agdhot
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
keesa2
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
perranet1
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
Vineet
 

Recently uploaded (20)

一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
一比一原版(uom毕业证书)曼彻斯特大学毕业证如何办理
 
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative ClassifiersML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdfNamma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
Namma-Kalvi-11th-Physics-Study-Material-Unit-1-EM-221086.pdf
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus06-18-2024-Princeton Meetup-Introduction to Milvus
06-18-2024-Princeton Meetup-Introduction to Milvus
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
 
Drownings spike from May to August in children
Drownings spike from May to August in childrenDrownings spike from May to August in children
Drownings spike from May to August in children
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
 

Advanced Encryption Standard Latex Beamer Class Presentation

  • 1. Advanced Encryption Standard Naimur Rahman naimur978@gmail.com Department of Computer Science Engineering University of Chittagong November 21, 2020 Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 1 / 20
  • 2. What is AES? AES is an encryption standard chosen by the National Institute of Standards and Technology(NIST), USA to protect classified information. It has been accepted world wide as a desirable algorithm to encrypt sensitive data. It is a block cipher which operates on block size of 128 bits for both encrypting as well as decrypting. Each Round performs same operations. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 2 / 20
  • 3. Why AES? In 1990’s the cracking of DES algorithm became possible. Around 50hrs of bruteforcing allowed to crack the message. NIST started searching for new feasible algorithm and proposed its requirement in 1997. In 2001 Rijndael algorithm designed by Rijment and Daemon of Belgium was declared as the winner of the competition. It met all Security, Cost and Implementation criteria. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 3 / 20
  • 4. How Does it works? AES basically repeats 4 major functions to encrypt data.It takes 128 bit block of data and a key[laymans term password] and gives a ciphertext as output.The functions are: 1. Sub Bytes 2. Shift Rows 3. Mix Columns 4. Add Key Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 4 / 20
  • 5. How Does it works? The number of rounds performed by the algorithm strictly depends on the size of key. The following table gives overview of no. Of rounds performed with the input of varying key lengths: Key Size (in bits) Rounds 128 10 192 12 256 14 The larger the number of keys the more secure will be the data. The time taken by s/w to encrypt will increase with no. of rounds. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 5 / 20
  • 6. How Does it works? Figure 2: Example Figure Here, E=encryption function for a symmetric block cipher m=plaintext message of size 128bits n=ciphertext] k=key of size 128bits which is same for both encryption and decryption D= Decryption function for symmetric block cipher Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 6 / 20
  • 7. Steps for encryption and decryption Figure 3: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 7 / 20
  • 8. Analysis of Steps KeyExpansions- In the key Expansion process the given 128 bits cipher key is stored in [4]x[4] bytes matrix (16*8=128 bits) and then the four column words of the key matrix is expanded into a schedule of 44 words (44*4=176) resulting in 11 round keys (176/11=16 bytes or 128 bits). Number of round keys = Nr + 1. Where Nr is the number of rounds (which is 10 in case of 128 bits key size) So here the round keys = 11. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 8 / 20
  • 9. Analysis of Steps Figure 4: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 9 / 20
  • 10. Analysis of Steps SubBytes- Each element of the matrix is replaced by the an element of s-box matrix. Figure 5: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 10 / 20
  • 11. Analysis of Steps SubBytes For an element d1 corresponding value is 3e Figure 6: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 11 / 20
  • 12. Analysis of Steps SubBytes The S-box is a special lookup table which is constructed by Galois fields. The Generating function used in this algorithm is GF(28 ) Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 12 / 20
  • 13. Analysis of Steps Shift Rows In this step rows of the block are cylindrically shifted in left direction. The first row is untouched , the second by one shift, third by two and fourth by 3. Figure 7: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 13 / 20
  • 14. Analysis of Steps Shift Rows Figure 8: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 14 / 20
  • 15. Analysis of Steps Mix columns This is the most important part of the algorithm causes the flip of bits to spread all over the block In this step the block is multiplied with a fixed matrix. The multiplication is field multiplication in galois field. For each row there are 16 multiplication, 12 XORs and a 4 byte output. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 15 / 20
  • 16. Analysis of Steps Mix columns Figure 9: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 16 / 20
  • 17. Analysis of Steps Add round key Figure 10: Example Figure Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 17 / 20
  • 18. Analysis of Steps Add round key In this step each byte is XOR-ed with corresponding element of key’s matrix. Once this step is done the keys are no longer available for this step. Using the same key will weaken the algorithm. To overcome this problem keys are expanded. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 18 / 20
  • 19. Analysis of Steps In the last round the mix column step is skipped. It is not documented anywhere why this is done but recently a paper was published against this method highlighting the weakening of cipher text. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 19 / 20
  • 20. Attacks It is similar to the exhaustive key search attack(brute force attack - trying all the possible set of keys) but it is adaptive. It is 4 times better than the exhaustive key search. But it is infeasible using current technology on block cipher having a keyspace of 128 bits and above. There are more advanced attack on AES-256 bits like the Related Key Attack, which involves several distinct keys linked together by a common relation which reduces the keyspace to 99.5 bits which is also infeasible. Naimur Rahman 17701045 Advanced Encryption Standard November 21, 2020 20 / 20