SlideShare a Scribd company logo
(AES BLOCK CIPHER)
(INFORMATION SECURITY)
Miss FATIMA SHAHZADI
1
Outline
• Introduction to AES
• AES Algorithm description
• How AES works
• Key Generation
• AES Encryption
• AES Decryption
• Modes of operation
• References
2
Introduction
Advanced Encryption Standard (AES Ciphers)
• Is a cybersecurity technology
• Refers to the process of concealing electronic data
• A computer security standard for cryptographically securing electronic
information.
• AES algorithm cannot yet be cracked, it would take billions of years for a
supercomputer to crack a AES key.
• Quantum computers can break AES algorithms quicker.
3
AES algorithm description
• Key expansion:
Creates new keys, known as round keys, for each subsequent round of
encryption, using Rijndael’s key schedule.
• Round key addition:
during which the initial round key is added to the mix of data that has been
divided.
• Byte substitution:
which substitutes every byte with a different byte based on the Rijndael S -box
substitution box
4
AES algorithm description
• Row shifting:
moves every row of the divided data one space to the left for the second row,
two spaces to the left for the third row, and three spaces to the left for the
fourth row.
• Column mixing:
uses a pre-established matrix to multiply the divided data’s columns and create
a new block of code.
• Round key addition:
during which another round key is added to the mixture of columns. After this
initial round, the process is repeated nine, 11, or 13 times, depending on
whether the AES algorithm is using a key length of 128 bits, 192 bits, or 256
bits. 128-bit AES encryption undergoes 10 transformation rounds; 192-bit AES
encryption undergoes 12 transformation rounds; and 256-bit AES encryption
undergoes 14 transformation rounds
5
Presentation Title 2/1/20XX 6
Presentation Title 2/1/20XX 7
Presentation Title 2/1/20XX 8
9
How AES works
Key Generation
10
Key Generation
• After ROTWORD we do sub byte.
• Sub byte is a predefined table.
• In sub byte first hexadecimal
character become row and second
become column.
• Intersection point become new byte.
11
Sub byte Table
12
Key Generation
After doing rot word and sub byte of last column we get this column.
13
Key Generation
14
Presentation Title 2/1/20XX 15
Key Generation
16
AES Encryption
Rounds :
• There are three rounds in AES Encryption
Presentation Title 2/1/20XX 17
Initial Round Main Round Final Round
• XOR with round key 0 • Sub byte
• Shift Rows
• Mix Columns
• Add round key
• Sub byte
• Shift Rows
• Add last round key
AES Encryption
18
AES Encryption
19
AES Encryption
20
AES Encryption
Encryption Example Explanation
https://www.cryptool.org/en/cto/aes-step-by-step
21
AES Decryption
AES Inverse Sub byte
22
AES Decryption
AES Inverse Shift rows
23
AES Decryption
AES Inverse Mix Columns
Presentation Title 2/1/20XX 24
AES Decryption
25
AES Decryption
26
AES Decryption
27
AES Decryption
AES Inverse Round Key
Here first matrix is state array and second is round key
28
AES Decryption
After XOR of state array and round key out put is plain text as following
29
Modes of Operation
• A mode of operation which describes how to repeatedly apply DES or AES (both encryption and
decryption) on plaintexts (and ciphertexts) with large size.
• Has an initialization value (IV), which is a random bit string with same length as a block.
There are 5 modes of operation,
1. ECB mode: Electronic Code Book mode
2. CBC mode: Cipher Block Chaining mode
3. CFB mode: Cipher Feedback mode
4. OFB mode: Output Feedback mode
5. CTR mode: Counter mode
30
Electronic Code BOOK (ECB)
• Electronic code book is the easiest block cipher mode of functioning.
• It is easier because of direct encryption of each block of input plaintext and output is in form of
blocks of encrypted ciphertext.
• Generally, if a message is larger than b bits in size, it can be broken down into a bunch of blocks
and the procedure is repeated.
• Requires the last block padded before encryption if it's to short
31
ECB Encryption/Decryption
32
ECB Encryption/Decryption
• In ECB Following formulas are use for encryption and decryption
• Encryption
Ci = EK(Bi)
• Decryption
Bi = DK(Ci)
33
Cipher Block Chaining Mode (CBC)
• Cipher block chaining or CBC is an advancement made on ECB
• In CBC, the previous cipher block is given as input to the next encryption algorithm
after XOR with the original plaintext block.
• A cipher block is produced by encrypting an XOR output of the previous cipher block
and present plaintext block.
34
CBC Encryption
35
CBC Decryption
36
CBC Encryption/Decryption
• In CBC Following formulas are use for encryption and decryption
• Encryption
Ci = EK(Bi ⊕ Ci-1)
• Decryption
Bi = DK(Ci)⊕(Ci-1)
37
Cipher Feedback Mode (CFM)
• In this mode, the ciphertext of any plaintext unit is a function of all the preceding plaintext. In this case,
rather than blocks of b bits, the plaintext is divided into segments of s bits.
• For encryption, input to the encryption function is a b-bit shift register that is initially set to some initialization vector (IV).
• The leftmost (most significant) s bits of the output of the encryption function are XORed with the
first segment of plaintext.
• contents of the shift register are shifted left by s bits
• For decryption, the same scheme is used, except that the received ciphertext unit is XORed with the output of
the encryption
38
CFM Encryption
39
CFM Decryption
40
CFM Encryption/Decryption
• In CFM Following formulas are use for encryption and decryption
• Encryption
Ci = EK(Ci-1) ⊕ Bi
• Decryption
Bi = EK(Ci-1)⊕(Ci)
41
Output Feedback Mode (OFM)
• Follows nearly the same process as the Cipher Feedback mode except that it sends the encrypted
output as feedback instead of the actual cipher which is XOR output.
• In this output feedback mode, all bits of the block are sent instead of sending selected s bits.
• Holds great resistance towards bit transmission errors.
42
OFM Encryption
43
OFM Decryption
44
OFM Encryption/Decryption
• The following formula depicts how a sequence of pad vectors is created:
Vi = EK(Vi-1)
where EK denotes the block encryption algorithm using key K and Vi and Vi -1 are adjacent
vectors.
Once the sequence of pad vectors is generated, encryption with the OFB mode can be carried out
using the following formula:
Ci = Vi ⊕
Decryption:
Bi = Vi ⊕ Ci
45
Counter Mode (CTR)
• The Counter Mode or CTR is a simple counter based block cipher implementation in cryptography.
• Each or every time a counter initiated value is encrypted and given as input to XOR with plaintext or
original text which results in ciphertext block.
• The CTR mode is independent of feedback use and thus can be implemented in parallel in this
mode.
• Similar to the OFB mode, but with the key stream generated slightly different.
• it's fast because it can run in parallel and it only use the encryption algorithm.
46
CTR Encryption
47
CTR Decryption
48
CTR Encryption/Decryption
• In the CTR mode, we start off with a random seed, s, and compute pad vectors according to
the formula:
Vi = EK(s+i-1)
• Encryption
Ci = Vi ⊕ Bi
• Decryption
Bi = Vi ⊕ Ci
49
References
• https://youtu.be/Q_hi2jWg6dc
• https://youtu.be/Xm37066R38E
• https://www.educative.io/answers/what-is-ecb#:~:text=ECB%20
• https://www.educative.io/answers/what-is-
cbc#:~:text=CBC%20also%20involves%20block%20chaining,correspo
nding%20to%20Bi%2D1
50

More Related Content

Similar to AES Presentation.pptx

CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
AES.ppt
AES.pptAES.ppt
AES.ppt
BincySam2
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
huachuhulk
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
Deepak John
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin Jani
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
vss gowtham
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
Nam Yong Kim
 
ch06.ppt
ch06.pptch06.ppt
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
Mazin Alwaaly
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
31ABINESHWARANG
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 

Similar to AES Presentation.pptx (20)

CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
Symmetric
SymmetricSymmetric
Symmetric
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Chap06 block cipher operation
Chap06 block cipher operationChap06 block cipher operation
Chap06 block cipher operation
 
ch06.ppt
ch06.pptch06.ppt
ch06.ppt
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
13528 l8
13528 l813528 l8
13528 l8
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Slide 1
Slide 1Slide 1
Slide 1
 

Recently uploaded

Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
Nettur Technical Training Foundation
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 

Recently uploaded (20)

Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdfThe Role of Electrical and Electronics Engineers in IOT Technology.pdf
The Role of Electrical and Electronics Engineers in IOT Technology.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 

AES Presentation.pptx

  • 1. (AES BLOCK CIPHER) (INFORMATION SECURITY) Miss FATIMA SHAHZADI 1
  • 2. Outline • Introduction to AES • AES Algorithm description • How AES works • Key Generation • AES Encryption • AES Decryption • Modes of operation • References 2
  • 3. Introduction Advanced Encryption Standard (AES Ciphers) • Is a cybersecurity technology • Refers to the process of concealing electronic data • A computer security standard for cryptographically securing electronic information. • AES algorithm cannot yet be cracked, it would take billions of years for a supercomputer to crack a AES key. • Quantum computers can break AES algorithms quicker. 3
  • 4. AES algorithm description • Key expansion: Creates new keys, known as round keys, for each subsequent round of encryption, using Rijndael’s key schedule. • Round key addition: during which the initial round key is added to the mix of data that has been divided. • Byte substitution: which substitutes every byte with a different byte based on the Rijndael S -box substitution box 4
  • 5. AES algorithm description • Row shifting: moves every row of the divided data one space to the left for the second row, two spaces to the left for the third row, and three spaces to the left for the fourth row. • Column mixing: uses a pre-established matrix to multiply the divided data’s columns and create a new block of code. • Round key addition: during which another round key is added to the mixture of columns. After this initial round, the process is repeated nine, 11, or 13 times, depending on whether the AES algorithm is using a key length of 128 bits, 192 bits, or 256 bits. 128-bit AES encryption undergoes 10 transformation rounds; 192-bit AES encryption undergoes 12 transformation rounds; and 256-bit AES encryption undergoes 14 transformation rounds 5
  • 11. Key Generation • After ROTWORD we do sub byte. • Sub byte is a predefined table. • In sub byte first hexadecimal character become row and second become column. • Intersection point become new byte. 11
  • 13. Key Generation After doing rot word and sub byte of last column we get this column. 13
  • 17. AES Encryption Rounds : • There are three rounds in AES Encryption Presentation Title 2/1/20XX 17 Initial Round Main Round Final Round • XOR with round key 0 • Sub byte • Shift Rows • Mix Columns • Add round key • Sub byte • Shift Rows • Add last round key
  • 21. AES Encryption Encryption Example Explanation https://www.cryptool.org/en/cto/aes-step-by-step 21
  • 23. AES Decryption AES Inverse Shift rows 23
  • 24. AES Decryption AES Inverse Mix Columns Presentation Title 2/1/20XX 24
  • 28. AES Decryption AES Inverse Round Key Here first matrix is state array and second is round key 28
  • 29. AES Decryption After XOR of state array and round key out put is plain text as following 29
  • 30. Modes of Operation • A mode of operation which describes how to repeatedly apply DES or AES (both encryption and decryption) on plaintexts (and ciphertexts) with large size. • Has an initialization value (IV), which is a random bit string with same length as a block. There are 5 modes of operation, 1. ECB mode: Electronic Code Book mode 2. CBC mode: Cipher Block Chaining mode 3. CFB mode: Cipher Feedback mode 4. OFB mode: Output Feedback mode 5. CTR mode: Counter mode 30
  • 31. Electronic Code BOOK (ECB) • Electronic code book is the easiest block cipher mode of functioning. • It is easier because of direct encryption of each block of input plaintext and output is in form of blocks of encrypted ciphertext. • Generally, if a message is larger than b bits in size, it can be broken down into a bunch of blocks and the procedure is repeated. • Requires the last block padded before encryption if it's to short 31
  • 33. ECB Encryption/Decryption • In ECB Following formulas are use for encryption and decryption • Encryption Ci = EK(Bi) • Decryption Bi = DK(Ci) 33
  • 34. Cipher Block Chaining Mode (CBC) • Cipher block chaining or CBC is an advancement made on ECB • In CBC, the previous cipher block is given as input to the next encryption algorithm after XOR with the original plaintext block. • A cipher block is produced by encrypting an XOR output of the previous cipher block and present plaintext block. 34
  • 37. CBC Encryption/Decryption • In CBC Following formulas are use for encryption and decryption • Encryption Ci = EK(Bi ⊕ Ci-1) • Decryption Bi = DK(Ci)⊕(Ci-1) 37
  • 38. Cipher Feedback Mode (CFM) • In this mode, the ciphertext of any plaintext unit is a function of all the preceding plaintext. In this case, rather than blocks of b bits, the plaintext is divided into segments of s bits. • For encryption, input to the encryption function is a b-bit shift register that is initially set to some initialization vector (IV). • The leftmost (most significant) s bits of the output of the encryption function are XORed with the first segment of plaintext. • contents of the shift register are shifted left by s bits • For decryption, the same scheme is used, except that the received ciphertext unit is XORed with the output of the encryption 38
  • 41. CFM Encryption/Decryption • In CFM Following formulas are use for encryption and decryption • Encryption Ci = EK(Ci-1) ⊕ Bi • Decryption Bi = EK(Ci-1)⊕(Ci) 41
  • 42. Output Feedback Mode (OFM) • Follows nearly the same process as the Cipher Feedback mode except that it sends the encrypted output as feedback instead of the actual cipher which is XOR output. • In this output feedback mode, all bits of the block are sent instead of sending selected s bits. • Holds great resistance towards bit transmission errors. 42
  • 45. OFM Encryption/Decryption • The following formula depicts how a sequence of pad vectors is created: Vi = EK(Vi-1) where EK denotes the block encryption algorithm using key K and Vi and Vi -1 are adjacent vectors. Once the sequence of pad vectors is generated, encryption with the OFB mode can be carried out using the following formula: Ci = Vi ⊕ Decryption: Bi = Vi ⊕ Ci 45
  • 46. Counter Mode (CTR) • The Counter Mode or CTR is a simple counter based block cipher implementation in cryptography. • Each or every time a counter initiated value is encrypted and given as input to XOR with plaintext or original text which results in ciphertext block. • The CTR mode is independent of feedback use and thus can be implemented in parallel in this mode. • Similar to the OFB mode, but with the key stream generated slightly different. • it's fast because it can run in parallel and it only use the encryption algorithm. 46
  • 49. CTR Encryption/Decryption • In the CTR mode, we start off with a random seed, s, and compute pad vectors according to the formula: Vi = EK(s+i-1) • Encryption Ci = Vi ⊕ Bi • Decryption Bi = Vi ⊕ Ci 49
  • 50. References • https://youtu.be/Q_hi2jWg6dc • https://youtu.be/Xm37066R38E • https://www.educative.io/answers/what-is-ecb#:~:text=ECB%20 • https://www.educative.io/answers/what-is- cbc#:~:text=CBC%20also%20involves%20block%20chaining,correspo nding%20to%20Bi%2D1 50