SlideShare a Scribd company logo
ADVANCE 
ENCRYPTION 
STANDARD(AES) 
11BCE111 
KUNAL PRAJAPATI
INTRODUCTION 
It is a symmetric algorithm. 
It is a block cipher. 
Size of data block::128 bits. 
We represent data block using 4*4 matrix . it can 
also called state matrix. 
size of each element in matrix is 1 byte. 
Size of key::128/192/256 bits. 
Key is expanded to array of words.
INTRODUCTION 
 Length of key Rounds 
128 bits 10 
192 bits 12 
256 bits 14 
 operates entire data block in every round.
AES 
For encryption, each round consists of the following 
four steps: 
1) Substitute bytes(Sub- byte)2) Shift rows, 3) Mix 
columns, and 4) Add 
round key. 
For decryption, each round consists of the following 
four steps: 1) Inverse substitute byte rows, 2) Inverse 
shift row 3) Inverse mix columns and 4) Add round 
key
Byte Substitution 
a simple substitution of each byte. 
S-box constructed using defined transformation of values in 
GF(28). 
each byte of state is replaced by byte indexed by row (left 4- 
bits) & column (right 4-bits) 
• eg. byte {EA} is replaced by byte in row E column A 
• which has value {87}
S-Box
Example
Shift Byte 
1st row is unchanged 
2nd row does 1 byte circular shift to left 
3rd row does 2 byte circular shift to left 
4th row does 3 byte circular shift to left
Example
Mix Column 
each byte is replaced by a value 
dependent on all 4 bytes in the column. 
If result of multiplication greater than FF 
than we will take XOR between result of 
multiplication and Irreducible polynomial. 
Irreducible polynomial(x8+x4+x3+x+1) must 
be of power of m.
`
Mix column
Example of Mix column
Add round key 
 key is also arranged in the form of a matrix of 4 × 4 bytes. 
As with the input block, the first word from the key fills the 
first column of the matrix, and so on. 
XOR between state matrix and 128-bits of the round key.
Add Round Key 
Each round has its own round key that is derived from the 
original 128-bit encryption key in the manner described in 
this section. 
 The logic of the key expansion algorithm is designed to 
ensure that if you change one bit of the encryption key, it 
should affect the round keys for several rounds.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
Let’s say that we have the four words of the round 
key for the ith round: 
wi wi+1 wi+2 wi+3 
For these to serve as the round key for the ith 
round, i must be a multiple of 4.For example, 
w4,w5,w6,w7 is the round key for round 1, the 
sequence of words w8,w9,w10,w11 the round key or 
round 2, and so on.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
wi+5 = wi+4 ⊗ wi+1 
wi+6 = wi+5 ⊗ wi+2 
wi+7 = wi+6 ⊗ wi+3 
So now we only need to figure out wi+4. This is the 
beginning word of each 4-word grouping in the key expansion. 
The beginning word of each round key is obtained by: 
wi+4 = wi ⊗ g(wi+3) 
That is, the first word of the new 4-word grouping is to be 
obtained by XOR’ing the first word of the last grouping with 
what is returned by applying a function g() to the last word of 
the previous 4-word grouping.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
The function g() consists of the following three steps: 
Perform a one-byte left circular rotation on the argument 4- 
byte . 
Perform a byte substitution for each byte of the word 
returned by the previous step by using the same 16 × 16 
lookup table as used in the SubBytes step of the encryption 
rounds. 
The round constant is a word whose three rightmost bytes 
are always zero. Therefore, XOR’ing with the round constant 
amounts to XOR’ing with just its leftmost byte.
from a 4-Word 
Round Key to the Next 4-Word 
Round Key 
The round constant for the ith round is denoted Rcon[i]. 
Since, by specification, the three rightmost bytes of the 
round constant are zero, we can write it as shown below. The 
left hand side of the equation below stands for the round 
constant to be used in the ith round. The right hand side of 
the equation says that the rightmost three bytes of the round 
constant are zero. 
Rcon[i] = (RC[i], 0x00, 0x00, 0x00) 
The addition of the round constants is for the purpose of 
destroying any symmetries that may have been introduced by 
the other steps in the key expansion algorithm.
Thank 
You

More Related Content

What's hot

MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Mona Rajput
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
Octal to Hexadecimal and Hexadecimal to Octal
Octal to Hexadecimal  and Hexadecimal to OctalOctal to Hexadecimal  and Hexadecimal to Octal
Octal to Hexadecimal and Hexadecimal to Octal
SRM Institute of Science & Technology, Tiruchirappalli
 
Aes algorithm notes
Aes algorithm notesAes algorithm notes
Aes algorithm notes
Supriyareddy Danda
 
C dilinde dinamik bellek yönetimi
C dilinde dinamik bellek yönetimiC dilinde dinamik bellek yönetimi
C dilinde dinamik bellek yönetimi
MehmetKelepce
 
Set associative mapping
Set associative mappingSet associative mapping
Set associative mapping
Ashik Khan
 
DATA STRUCTURE AND ALGORITHMS
DATA STRUCTURE AND ALGORITHMS DATA STRUCTURE AND ALGORITHMS
DATA STRUCTURE AND ALGORITHMS
Adams Sidibe
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
farazvirk554
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
Ramadhi Irawan
 
Chapter 3: Simplification of Boolean Function
Chapter 3: Simplification of Boolean FunctionChapter 3: Simplification of Boolean Function
Chapter 3: Simplification of Boolean Function
Er. Nawaraj Bhandari
 
Binomial Heaps
Binomial HeapsBinomial Heaps
Binomial Heaps
sathish sak
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Computer Oragnization Flipflops
Computer Oragnization FlipflopsComputer Oragnization Flipflops
Computer Oragnization Flipflops
Vanitha Chandru
 
AES.ppt
AES.pptAES.ppt
AES.ppt
BincySam2
 
Twofish algo
Twofish algoTwofish algo
Twofish algo
AAQIB PARREY
 
final presentation of sudoku solver project
final presentation of sudoku solver projectfinal presentation of sudoku solver project
final presentation of sudoku solver project
Arafat Bin Reza
 
Multiplexer & Demultiplexer by Dr. Arvind Nautiyal.ppt
Multiplexer & Demultiplexer  by Dr. Arvind Nautiyal.pptMultiplexer & Demultiplexer  by Dr. Arvind Nautiyal.ppt
Multiplexer & Demultiplexer by Dr. Arvind Nautiyal.ppt
AswathAwin
 

What's hot (20)

MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Octal to Hexadecimal and Hexadecimal to Octal
Octal to Hexadecimal  and Hexadecimal to OctalOctal to Hexadecimal  and Hexadecimal to Octal
Octal to Hexadecimal and Hexadecimal to Octal
 
Aes algorithm notes
Aes algorithm notesAes algorithm notes
Aes algorithm notes
 
C dilinde dinamik bellek yönetimi
C dilinde dinamik bellek yönetimiC dilinde dinamik bellek yönetimi
C dilinde dinamik bellek yönetimi
 
Set associative mapping
Set associative mappingSet associative mapping
Set associative mapping
 
DATA STRUCTURE AND ALGORITHMS
DATA STRUCTURE AND ALGORITHMS DATA STRUCTURE AND ALGORITHMS
DATA STRUCTURE AND ALGORITHMS
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Caesar cipher
Caesar cipherCaesar cipher
Caesar cipher
 
Chapter 3: Simplification of Boolean Function
Chapter 3: Simplification of Boolean FunctionChapter 3: Simplification of Boolean Function
Chapter 3: Simplification of Boolean Function
 
Binomial Heaps
Binomial HeapsBinomial Heaps
Binomial Heaps
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Computer Oragnization Flipflops
Computer Oragnization FlipflopsComputer Oragnization Flipflops
Computer Oragnization Flipflops
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Twofish algo
Twofish algoTwofish algo
Twofish algo
 
final presentation of sudoku solver project
final presentation of sudoku solver projectfinal presentation of sudoku solver project
final presentation of sudoku solver project
 
Multiplexer & Demultiplexer by Dr. Arvind Nautiyal.ppt
Multiplexer & Demultiplexer  by Dr. Arvind Nautiyal.pptMultiplexer & Demultiplexer  by Dr. Arvind Nautiyal.ppt
Multiplexer & Demultiplexer by Dr. Arvind Nautiyal.ppt
 

Viewers also liked

Digital signature
Digital signatureDigital signature
Digital signature
Yash Karanke
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Amirul Wiramuda
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
هيثم فرج
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)Mecheko Sha
 
Digital signature
Digital signatureDigital signature
Digital signature
Hossain Md Shakhawat
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Amir Masinaei
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
cns 2marks
cns 2markscns 2marks
cns 2marks
ilakiyadinesh
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
Agung Julisman
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 

Viewers also liked (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Aes
AesAes
Aes
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Substitution Cipher
Substitution CipherSubstitution Cipher
Substitution Cipher
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
DES
DESDES
DES
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 

Similar to Aes

Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)
MuskanSony
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
roueida mohammed
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
Ankur Human
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
Vaibhav Khanna
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
UsamaAliLone3
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
IOSR Journals
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
RizwanBasha12
 
1-aes.pptx
1-aes.pptx1-aes.pptx
1-aes.pptx
anithachristopher3
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Chapter 5 module 3
Chapter 5 module 3Chapter 5 module 3
Chapter 5 module 3
daneshwarihatti
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
Nikhil Gupta
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
Anamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
Anamika Singh
 
Information security Seminar #3
Information security Seminar #3 Information security Seminar #3
Information security Seminar #3
Alexander Kolybelnikov
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptx
matmurdock0111
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
Shiraz316
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
Santhosh Prabhu
 

Similar to Aes (20)

Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)Aes(Advance Encryption Algorithm)
Aes(Advance Encryption Algorithm)
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 
Block Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docxBlock Encryption Algorithm Project.docx
Block Encryption Algorithm Project.docx
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
1-aes.pptx
1-aes.pptx1-aes.pptx
1-aes.pptx
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key CipherModern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
 
Chapter 5 module 3
Chapter 5 module 3Chapter 5 module 3
Chapter 5 module 3
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Information security Seminar #3
Information security Seminar #3 Information security Seminar #3
Information security Seminar #3
 
Advance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptxAdvance Encryption Standard (A-E-S).pptx
Advance Encryption Standard (A-E-S).pptx
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
 

Recently uploaded

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 

Recently uploaded (20)

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 

Aes

  • 1. ADVANCE ENCRYPTION STANDARD(AES) 11BCE111 KUNAL PRAJAPATI
  • 2. INTRODUCTION It is a symmetric algorithm. It is a block cipher. Size of data block::128 bits. We represent data block using 4*4 matrix . it can also called state matrix. size of each element in matrix is 1 byte. Size of key::128/192/256 bits. Key is expanded to array of words.
  • 3. INTRODUCTION  Length of key Rounds 128 bits 10 192 bits 12 256 bits 14  operates entire data block in every round.
  • 4. AES For encryption, each round consists of the following four steps: 1) Substitute bytes(Sub- byte)2) Shift rows, 3) Mix columns, and 4) Add round key. For decryption, each round consists of the following four steps: 1) Inverse substitute byte rows, 2) Inverse shift row 3) Inverse mix columns and 4) Add round key
  • 5. Byte Substitution a simple substitution of each byte. S-box constructed using defined transformation of values in GF(28). each byte of state is replaced by byte indexed by row (left 4- bits) & column (right 4-bits) • eg. byte {EA} is replaced by byte in row E column A • which has value {87}
  • 8. Shift Byte 1st row is unchanged 2nd row does 1 byte circular shift to left 3rd row does 2 byte circular shift to left 4th row does 3 byte circular shift to left
  • 10. Mix Column each byte is replaced by a value dependent on all 4 bytes in the column. If result of multiplication greater than FF than we will take XOR between result of multiplication and Irreducible polynomial. Irreducible polynomial(x8+x4+x3+x+1) must be of power of m.
  • 11. `
  • 13. Example of Mix column
  • 14. Add round key  key is also arranged in the form of a matrix of 4 × 4 bytes. As with the input block, the first word from the key fills the first column of the matrix, and so on. XOR between state matrix and 128-bits of the round key.
  • 15. Add Round Key Each round has its own round key that is derived from the original 128-bit encryption key in the manner described in this section.  The logic of the key expansion algorithm is designed to ensure that if you change one bit of the encryption key, it should affect the round keys for several rounds.
  • 16. from a 4-Word Round Key to the Next 4-Word Round Key Let’s say that we have the four words of the round key for the ith round: wi wi+1 wi+2 wi+3 For these to serve as the round key for the ith round, i must be a multiple of 4.For example, w4,w5,w6,w7 is the round key for round 1, the sequence of words w8,w9,w10,w11 the round key or round 2, and so on.
  • 17. from a 4-Word Round Key to the Next 4-Word Round Key wi+5 = wi+4 ⊗ wi+1 wi+6 = wi+5 ⊗ wi+2 wi+7 = wi+6 ⊗ wi+3 So now we only need to figure out wi+4. This is the beginning word of each 4-word grouping in the key expansion. The beginning word of each round key is obtained by: wi+4 = wi ⊗ g(wi+3) That is, the first word of the new 4-word grouping is to be obtained by XOR’ing the first word of the last grouping with what is returned by applying a function g() to the last word of the previous 4-word grouping.
  • 18. from a 4-Word Round Key to the Next 4-Word Round Key The function g() consists of the following three steps: Perform a one-byte left circular rotation on the argument 4- byte . Perform a byte substitution for each byte of the word returned by the previous step by using the same 16 × 16 lookup table as used in the SubBytes step of the encryption rounds. The round constant is a word whose three rightmost bytes are always zero. Therefore, XOR’ing with the round constant amounts to XOR’ing with just its leftmost byte.
  • 19. from a 4-Word Round Key to the Next 4-Word Round Key The round constant for the ith round is denoted Rcon[i]. Since, by specification, the three rightmost bytes of the round constant are zero, we can write it as shown below. The left hand side of the equation below stands for the round constant to be used in the ith round. The right hand side of the equation says that the rightmost three bytes of the round constant are zero. Rcon[i] = (RC[i], 0x00, 0x00, 0x00) The addition of the round constants is for the purpose of destroying any symmetries that may have been introduced by the other steps in the key expansion algorithm.