SlideShare a Scribd company logo
1 of 44
3
‫توجه‬:‫شد‬ ‫خواهید‬ ‫منتقل‬ ‫مربوطه‬ ‫اسالید‬ ‫به‬ ،‫عنوان‬ ‫روی‬ ‫بر‬ ‫کلیک‬ ‫با‬.
4
‫رمز‬ ‫های‬‫سیستم‬
‫متقارن‬
‫ای‬‫دنباله‬
‫قالبی‬
DES
AES
5
6
7
8
‫رمزگذار‬AES
1 2 . . . 128
1 2 . . . 128
1 2 . . . 128
1 2 . . . 128
1 2 . . . 128
1 2 . . . 128
1 2 . . . 128
1 2 . . . 128
1 2 . . . Nr
9
10
1 2 . . . 128
1 2 . . . 128
Add Round key
1. Sub byte
2. Shift Rows
3. Mix Columns
4. Add Round key
1. Sub byte
2. Shift Rows
3. Add Round key
Ciphertext
1 2 . . . 128
KeyExpansion
11
12
…
01 02 04 08 10 20 40 80 1b 36
00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
09
cf
4f
3c
8a
84
eb
01
2b
7e
15
16
01
00
00
00
a0
fa
fe
17
=
13
…
28
ae
d2
a6
88
54
2c
b1
=
a0
fa
fe
17
a0
fa
fe
17
14
…
23
a3
39
39
=
a0
fa
fe
17
ab
f7
15
88
88
54
2c
b1
88
54
2c
b1
15
…
2a
6c
76
05
=
a0
fa
fe
17
88
54
2c
b1
09
cf
4f
3c
23
a3
39
39
23
a3
39
39
16
…
17
1 2 . . . 128
1 2 . . . 128
Add Round key
1. Sub byte
2. Shift Rows
3. Mix Columns
4. Add Round key
1. Sub byte
2. Shift Rows
3. Add Round key
Ciphertext
18
Add Round key
19
1 2 . . . 128
1. Sub byte
1. Sub byte
Add Round key
20
1 2 . . . 128
1. Sub byte
Add Round key
2. Shift Rows
21
1 2 . . . 128
1. Sub byte
Add Round key
2. Shift Rows
3. Mix Columns
22
1 2 . . . 128
1. Sub byte
Add Round key
2. Shift Rows
3. Mix Columns
23
Add Round key
1 2 . . . 128
1. Sub byte
Add Round key
2. Shift Rows
3. Mix Columns
4.Add Round key
24
25
1 2 . . . 128
Add Round key
1. Sub byte
2. Shift Rows
3. Mix Columns
4. Add Round key
26
1 2 . . . 128
Add Round key
1. Sub byte
2. Shift Rows
3. Mix Columns
4. Add Round key
1. Sub byte
2. Shift Rows
3. Add Round key
Ciphertext
27
1 2 . . . 128
1 2 . . . 128
Add Round key
1. Sub byte
2. Shift Rows
3. Mix Columns
4. Add Round key
1. Sub byte
2. Shift Rows
3. Add Round key
Ciphertext
28 AES Structure
29
30 AES Inv S-Box
31
32
33
xy
?
34
35
36 AES S-Box
37
xy
?
38
39 AES Inv S-Box
40
𝑹𝑪 𝟏 ∶ 𝒙 𝟏−𝟏 = 𝒙 𝟎 𝒎𝒐𝒅 𝒑(𝒙) = 𝟏 → 𝟎𝟎𝟎𝟎 𝟎𝟎𝟎𝟏 → 𝟎𝟏
𝑹𝑪 𝟐 ∶ 𝒙 𝟐−𝟏
= 𝒙 𝟏 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 → 𝟎𝟎𝟎𝟎 𝟎𝟎𝟏𝟎 → 𝟎𝟐
𝑹𝑪 𝟑 ∶ 𝒙 𝟑−𝟏
= 𝒙 𝟐 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟐 → 𝟎𝟎𝟎𝟎 𝟎𝟏𝟎𝟎 → 𝟎𝟒
𝑹𝑪 𝟒 ∶ 𝒙 𝟒−𝟏
= 𝒙 𝟑 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟑 → 𝟎𝟎𝟎𝟎 𝟏𝟎𝟎𝟎 → 𝟎𝟖
𝑹𝑪 𝟓 ∶ 𝒙 𝟓−𝟏 = 𝒙 𝟒 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟒 → 𝟎𝟎𝟎𝟏 𝟎𝟎𝟎𝟎 → 𝟏𝟎
𝑹𝑪 𝟔 ∶ 𝒙 𝟔−𝟏
= 𝒙 𝟓 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟓 → 𝟎𝟎𝟏𝟎 𝟎𝟎𝟎𝟎 → 𝟐𝟎
𝑹𝑪 𝟕 ∶ 𝒙 𝟕−𝟏 = 𝒙 𝟔 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟔 → 𝟎𝟏𝟎𝟎 𝟎𝟎𝟎𝟎 → 𝟒𝟎
𝑹𝑪 𝟖 ∶ 𝒙 𝟖−𝟏 = 𝒙 𝟕 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟕 → 𝟏𝟎𝟎𝟎 𝟎𝟎𝟎𝟎 → 𝟖𝟎
𝑹𝑪 𝟗 ∶ 𝒙 𝟗−𝟏
= 𝒙 𝟖 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟒
+𝒙 𝟑
+ 𝒙 + 𝟏 → 𝟎𝟎𝟎𝟏 𝟏𝟎𝟏𝟏 → 𝟏𝑩
𝑹𝑪 𝟏𝟎 ∶ 𝒙 𝟏𝟎−𝟏 = 𝒙 𝟗 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟓 +𝒙 𝟒 +𝒙 𝟐 +𝒙 → 𝟎𝟎𝟏𝟏 𝟎𝟏𝟏𝟎 → 𝟑𝟔
41
01 02 04 08 10 20 40 80 1b 36
00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
42
43
Advanced Encryption Standard (AES)

More Related Content

What's hot

AES by example
AES by exampleAES by example
AES by exampleShiraz316
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherMahbubur Rahman
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogHardik Manocha
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)Sam Bowne
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmRifat Tasnim
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)Topic4 data encryption standard(des)
Topic4 data encryption standard(des)MdFazleRabbi18
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answersprdpgpt
 
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)MdFazleRabbi18
 

What's hot (20)

Aes
AesAes
Aes
 
AES by example
AES by exampleAES by example
AES by example
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Ch03-Computer Security
Ch03-Computer SecurityCh03-Computer Security
Ch03-Computer Security
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
Project_Report1
Project_Report1Project_Report1
Project_Report1
 
Des
DesDes
Des
 
4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)4. The Advanced Encryption Standard (AES)
4. The Advanced Encryption Standard (AES)
 
Two fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption AlgorithmTwo fish & Rijndael (AES) Encryption Algorithm
Two fish & Rijndael (AES) Encryption Algorithm
 
Ch05
Ch05Ch05
Ch05
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
 
Symmetric ciphers questions and answers
Symmetric ciphers questions and answersSymmetric ciphers questions and answers
Symmetric ciphers questions and answers
 
SHA 1 Algorithm
SHA 1 AlgorithmSHA 1 Algorithm
SHA 1 Algorithm
 
Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)Topic5 advanced encryption standard (aes)
Topic5 advanced encryption standard (aes)
 

Viewers also liked

Viewers also liked (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Aes
AesAes
Aes
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
DES
DESDES
DES
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Advanced Encryption Standard (AES)

Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Algorithim lec1.pptx
Algorithim lec1.pptxAlgorithim lec1.pptx
Algorithim lec1.pptxrediet43
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAkashRanjandas1
 
Cryptography unit2.pptx
Cryptography unit2.pptxCryptography unit2.pptx
Cryptography unit2.pptxSayaliKawale2
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptographyNithyasriA2
 
Ch03 lexical analysis nfa_2_dfa_2019
Ch03 lexical analysis nfa_2_dfa_2019Ch03 lexical analysis nfa_2_dfa_2019
Ch03 lexical analysis nfa_2_dfa_2019Bushra Al-Anesi
 
Fear and loathing with APL (oredev)
Fear and loathing with APL (oredev)Fear and loathing with APL (oredev)
Fear and loathing with APL (oredev)Yan Cui
 
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnnratnapatil14
 
Cache Attacks On Secret Key Cryptosystems
Cache Attacks On Secret Key CryptosystemsCache Attacks On Secret Key Cryptosystems
Cache Attacks On Secret Key Cryptosystemslawuah
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxHodaAhmedBekhitAhmed
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxUsamaAliLone3
 

Similar to Advanced Encryption Standard (AES) (20)

Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
AES (2).ppt
AES (2).pptAES (2).ppt
AES (2).ppt
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
Algorithim lec1.pptx
Algorithim lec1.pptxAlgorithim lec1.pptx
Algorithim lec1.pptx
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrh
 
Serpent sboxes
Serpent sboxesSerpent sboxes
Serpent sboxes
 
Data compession
Data compession Data compession
Data compession
 
Coordinate Graph1
Coordinate Graph1Coordinate Graph1
Coordinate Graph1
 
Oct27
Oct27Oct27
Oct27
 
Cryptography unit2.pptx
Cryptography unit2.pptxCryptography unit2.pptx
Cryptography unit2.pptx
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
 
Ch03 lexical analysis nfa_2_dfa_2019
Ch03 lexical analysis nfa_2_dfa_2019Ch03 lexical analysis nfa_2_dfa_2019
Ch03 lexical analysis nfa_2_dfa_2019
 
Fear and loathing with APL (oredev)
Fear and loathing with APL (oredev)Fear and loathing with APL (oredev)
Fear and loathing with APL (oredev)
 
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
29_Tries.ppt nnnnnnnnnnnnnnnnnnnnnnnnnnn
 
Cache Attacks On Secret Key Cryptosystems
Cache Attacks On Secret Key CryptosystemsCache Attacks On Secret Key Cryptosystems
Cache Attacks On Secret Key Cryptosystems
 
Block Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptxBlock Cipher.cryptography_miu_year5.pptx
Block Cipher.cryptography_miu_year5.pptx
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
 
Side Channel Attacks on AES
Side Channel Attacks on AESSide Channel Attacks on AES
Side Channel Attacks on AES
 
01 analysis-of-algorithms
01 analysis-of-algorithms01 analysis-of-algorithms
01 analysis-of-algorithms
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Advanced Encryption Standard (AES)

  • 1.
  • 2.
  • 3. 3 ‫توجه‬:‫شد‬ ‫خواهید‬ ‫منتقل‬ ‫مربوطه‬ ‫اسالید‬ ‫به‬ ،‫عنوان‬ ‫روی‬ ‫بر‬ ‫کلیک‬ ‫با‬.
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8 ‫رمزگذار‬AES 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . 128 1 2 . . . Nr
  • 9. 9
  • 10. 10 1 2 . . . 128 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext 1 2 . . . 128 KeyExpansion
  • 11. 11
  • 12. 12 … 01 02 04 08 10 20 40 80 1b 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 cf 4f 3c 8a 84 eb 01 2b 7e 15 16 01 00 00 00 a0 fa fe 17 =
  • 17. 17 1 2 . . . 128 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext
  • 19. 19 1 2 . . . 128 1. Sub byte 1. Sub byte Add Round key
  • 20. 20 1 2 . . . 128 1. Sub byte Add Round key 2. Shift Rows
  • 21. 21 1 2 . . . 128 1. Sub byte Add Round key 2. Shift Rows 3. Mix Columns
  • 22. 22 1 2 . . . 128 1. Sub byte Add Round key 2. Shift Rows 3. Mix Columns
  • 23. 23 Add Round key 1 2 . . . 128 1. Sub byte Add Round key 2. Shift Rows 3. Mix Columns 4.Add Round key
  • 24. 24
  • 25. 25 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key
  • 26. 26 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext
  • 27. 27 1 2 . . . 128 1 2 . . . 128 Add Round key 1. Sub byte 2. Shift Rows 3. Mix Columns 4. Add Round key 1. Sub byte 2. Shift Rows 3. Add Round key Ciphertext
  • 29. 29
  • 30. 30 AES Inv S-Box
  • 31. 31
  • 32. 32
  • 34. 34
  • 35. 35
  • 38. 38
  • 39. 39 AES Inv S-Box
  • 40. 40 𝑹𝑪 𝟏 ∶ 𝒙 𝟏−𝟏 = 𝒙 𝟎 𝒎𝒐𝒅 𝒑(𝒙) = 𝟏 → 𝟎𝟎𝟎𝟎 𝟎𝟎𝟎𝟏 → 𝟎𝟏 𝑹𝑪 𝟐 ∶ 𝒙 𝟐−𝟏 = 𝒙 𝟏 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 → 𝟎𝟎𝟎𝟎 𝟎𝟎𝟏𝟎 → 𝟎𝟐 𝑹𝑪 𝟑 ∶ 𝒙 𝟑−𝟏 = 𝒙 𝟐 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟐 → 𝟎𝟎𝟎𝟎 𝟎𝟏𝟎𝟎 → 𝟎𝟒 𝑹𝑪 𝟒 ∶ 𝒙 𝟒−𝟏 = 𝒙 𝟑 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟑 → 𝟎𝟎𝟎𝟎 𝟏𝟎𝟎𝟎 → 𝟎𝟖 𝑹𝑪 𝟓 ∶ 𝒙 𝟓−𝟏 = 𝒙 𝟒 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟒 → 𝟎𝟎𝟎𝟏 𝟎𝟎𝟎𝟎 → 𝟏𝟎 𝑹𝑪 𝟔 ∶ 𝒙 𝟔−𝟏 = 𝒙 𝟓 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟓 → 𝟎𝟎𝟏𝟎 𝟎𝟎𝟎𝟎 → 𝟐𝟎 𝑹𝑪 𝟕 ∶ 𝒙 𝟕−𝟏 = 𝒙 𝟔 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟔 → 𝟎𝟏𝟎𝟎 𝟎𝟎𝟎𝟎 → 𝟒𝟎 𝑹𝑪 𝟖 ∶ 𝒙 𝟖−𝟏 = 𝒙 𝟕 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟕 → 𝟏𝟎𝟎𝟎 𝟎𝟎𝟎𝟎 → 𝟖𝟎 𝑹𝑪 𝟗 ∶ 𝒙 𝟗−𝟏 = 𝒙 𝟖 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟒 +𝒙 𝟑 + 𝒙 + 𝟏 → 𝟎𝟎𝟎𝟏 𝟏𝟎𝟏𝟏 → 𝟏𝑩 𝑹𝑪 𝟏𝟎 ∶ 𝒙 𝟏𝟎−𝟏 = 𝒙 𝟗 𝒎𝒐𝒅 𝒑(𝒙) = 𝒙 𝟓 +𝒙 𝟒 +𝒙 𝟐 +𝒙 → 𝟎𝟎𝟏𝟏 𝟎𝟏𝟏𝟎 → 𝟑𝟔
  • 41. 41 01 02 04 08 10 20 40 80 1b 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  • 42. 42
  • 43. 43