SlideShare a Scribd company logo
1 of 48
Download to read offline
1
Modified AES Algorithm Using Multiple S-Boxes
Instructor: Truong Tuan Anh, PhD
S: Chu Xuân Tình - 1870583
2
Modified AES Algorithm Using Multiple
S-Boxes
1. Introduction
2. Advance Encryption Standard (AES)
3. Modified AES Algorithm
4. Avaluation
AES - Modifier
3
AES - introdution
Ø In 2000, the NIST formally adopted the AES
encryption algorithm and published it as a federal
standard under the designation FIPS-197.
Ø It was chosen because of its security,
performance, efficiency, implement ability, and low
memory requirements.
• Rijndael was selected as the AES
– Designed by Vincent Rijmen and Joan Daemen
in Belgium
4
AES - introdution
Ø The AES Cipher - Rijndael
• An iterative
– processes data as block of 4 columns of 4 bytes
(128 bits)
– operates on entire data block in every round
• Rijndael design:
– simplicity
– has 128/192/256 bit keys, 128 bits data
– resistant against known attacks
– speed and code compactness on many CPUs
• The MixColumn function in the AES algorithm is
an important property of the cipher
5
AES - introdution
Ø The MixColumn function in the AES algorithm
is an important property of the cipher
ü It provides strength against differential and linear
attacks due to the complexity of its mathematical
operations.
ü Require computational resources in software
implementation.
ü Replacing the MixColumn function, the speed
performance of the AES algorithm will be
improved.
ü Propose for a modified AES algorithm using
multiple S-Boxes.
6
AES - Classfication
AES - Basic
7
AES
Plaintext (128 bits)
Ciphertext (128 bits)
Key (128-256 bits)
AES Conceptual Scheme
AES - Basic
8
Ø Multiple rounds
• Rounds are (almost) identical
– First and last round are a little different
High Level Description
No MixColumns
AES - Overall Structure
AES - Cipher
AES -128-bit values
12
• Data block viewed as 4-by-4 table of bytes
• Represented as 4 by 4 matrix of 8-bit
bytes.
• Key is expanded to array of 32 bits words
1 byte
AES - Data Unit
AES - Unit Transformation
AES - Changing Plaintext to State
AES -Details of Each Round
AES- SubBytes: Byte Substitution
• A simple substitution of each byte
– provide a confusion
• Uses one S-box of 16x16 bytes containing a permutation of all 256
8-bit values
• Each byte of state is replaced by byte indexed by row (left 4-bits) &
column (right 4-bits)
– eg. byte {95} is replaced by byte in row 9 column 5
– which has value {2A}
• S-box constructed using defined transformation of values in Galois
Field- GF(28)
AES - SubBytes and InvSubBytes
AES - SubBytes Operation
• The SubBytes operation involves 16 independent byte-
to-byte transformations. • Interpret the byte as two hexadecimal
digits xy
• SW implementation, use row (x) and
column (y) as lookup pointer
S1,1 = xy16
x’y’16
AES - SubBytes Table
• Implement by Table Lookup
AES - InvSubBytes Table
Sample SubByte Transformation
• The SubBytes and InvSubBytes
transformations are inverses of each other.
AES - ShiftRows
• Shifting, which permutes the bytes.
• A circular byte shift in each each
– 1st row is unchanged
– 2nd row does 1 byte circular shift to left
– 3rd row does 2 byte circular shift to left
– 4th row does 3 byte circular shift to left
• In the encryption, the transformation is
called ShiftRows
• In the decryption, the transformation is
called InvShiftRows and the shifting is to
the right
AES - ShiftRows Scheme
AES - ShiftRows and InvShiftRows
AES - MixColumns
• ShiftRows and MixColumns provide diffusion to
the cipher
• Each column is processed separately
• Each byte is replaced by a value dependent on
all 4 bytes in the column
• Effectively a matrix multiplication in GF(28) using
prime poly m(x) =x8+x4+x3+x+1
AES -MixClumns Scheme
The MixColumns transformation operates at the column level; it
transforms each column of the state to a new column.
AES-MixColumn & InvMixColumn
AES - AddRoundKey
• XOR state with 128-bits of the round key
• AddRoundKey proceeds one column at a
time.
– adds a round key word with each state
column matrix
– the operation is matrix addition
• Inverse for decryption identical
– since XOR own inverse, with reversed keys
• Designed to be as simple as possible
AES - AddRoundKey Scheme
AES Round
AES Key Scheduling
• takes 128-bits (16-bytes) key and expands
into array of 44 32-bit words
AES -Key Expansion Scheme
AES -Key Expansion submodule
• RotWord performs a one byte circular left shift on a word
For example:
RotWord[b0,b1,b2,b3] = [b1,b2,b3,b0]
• SubWord performs a byte substitution on each byte of
input word using the S-box
• SubWord(RotWord(temp)) is XORed with RCon[j] – the
round constant
AES Security
• AES was designed after DES.
• Most of the known attacks on DES were already tested
on AES.
• Brute-Force Attack
– AES is definitely more secure than DES due to the larger-size
key.
• Statistical Attacks
– Numerous tests have failed to do statistical analysis of the
ciphertext
• Differential and Linear Attacks
– There are no differential and linear attacks on AES as yet.
AES ALGORITHM USING MULTIPLE S-BOXES
vPROPOSED MODIFIED 128-AES ALGORITHM
USING MULTIPLE S-BOXES
Ø The MixColumns function is perceive to be
requiring more computational resources in
software implementation as compared to the
other functions
Ø Propose for a modified version of the 128-AES
algorithm using two substitution boxes
ü The first S-Box is the Rijndael S-Box
ü The second S-Box is constructed using XOR
operation and affine transformation
AES ALGORITHM USING MULTIPLE S-BOXES
AES - CONSTRUCTION OF THE NEW S-BOX
vThe second S-Box is derived from the
original S- Box as designed in the AES
ØExclusive OR Operation
§ each cell in the AES-Rijndael will be
XORed with 7F
AES-Rijndael[x,y] XOR (7F)
§ The Key[i] shall be any hexadecimal value
between 00 to FF (Table 1. AES-
2SboxXOR7F)
AES - CONSTRUCTION OF THE NEW S-BOX
AES - CONSTRUCTION OF THE NEW S-BOX
vThe second S-Box is derived from the
original S- Box as designed in the AES
ØExclusive OR Operation
ØAffine Transform Operation
ü After creating the initial values of AES-
2SboxXOR
ü Scramble the bits in each byte value, we next
apply the following transformation to each bit bi
as stored in the initial AES-2SboxXOR7F:
AES - CONSTRUCTION OF THE NEW S-BOX
ØAffine Transform Operation
ü For the inverse AES-2SboxXOR, the following
transformation to each bit was used for bit
scrambling:
AES - CONSTRUCTION OF THE NEW S-BOX
EVALUATION RESULTS
EVALUATION RESULTS
EVALUATION RESULTS
CONCLUSION
üModified AES algorithm using multiple
S-boxes.
üWe observed that the speed performance
greatly increased in the modified AES
algorithm using multiple S-Boxes, while
the security side has slightly weakened.
üEasily implemented using cheap
processors and a minimum amount of
memory.
üVery efficient
49
Referents
• [1] National Institute of Standards and
Technology, Advanced Encryption Standard,
FIPS 197 (2011).
• [2] Paper “Modified AES Algorithm Using
Multiple S-Boxes”
• [3] Wiki & slide & Internet.
50
51
Thanks for your attention!

More Related Content

What's hot

Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxeschuxuantinh
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Mazin Alwaaly
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IMohamed Loey
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Advanced data structures vol. 1
Advanced data structures   vol. 1Advanced data structures   vol. 1
Advanced data structures vol. 1Christalin Nelson
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsMohamed Loey
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and boundAbhishek Singh
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 

What's hot (20)

Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxes
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Radix sorting
Radix sortingRadix sorting
Radix sorting
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Des
DesDes
Des
 
Huffman tree
Huffman tree Huffman tree
Huffman tree
 
Advanced data structures vol. 1
Advanced data structures   vol. 1Advanced data structures   vol. 1
Advanced data structures vol. 1
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and bound
 
block ciphers
block ciphersblock ciphers
block ciphers
 
N queen problem
N queen problemN queen problem
N queen problem
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 

Similar to modified aes algorithm using multiple s-boxes

Cryptography and network security AES ALG
Cryptography and network security AES ALGCryptography and network security AES ALG
Cryptography and network security AES ALGskcbcaa10uca068
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesVaibhav Khanna
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptroueida mohammed
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementationRoman Oliynykov
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptssuseraaf866
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesVaibhav Khanna
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 

Similar to modified aes algorithm using multiple s-boxes (20)

AES.ppt
AES.pptAES.ppt
AES.ppt
 
Unit -2.ppt
Unit -2.pptUnit -2.ppt
Unit -2.ppt
 
Cryptography and network security AES ALG
Cryptography and network security AES ALGCryptography and network security AES ALG
Cryptography and network security AES ALG
 
Ch05
Ch05Ch05
Ch05
 
Cryptography
CryptographyCryptography
Cryptography
 
Aes
AesAes
Aes
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
Aes
AesAes
Aes
 
694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
Information and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aesInformation and network security 25 algorithmic steps of aes
Information and network security 25 algorithmic steps of aes
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementation
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
CR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.pptCR 05 - Advanced Encryption Standard.ppt
CR 05 - Advanced Encryption Standard.ppt
 
Information and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aesInformation and network security 24 advanced encryption standard aes
Information and network security 24 advanced encryption standard aes
 
Network security cs5
Network security cs5Network security cs5
Network security cs5
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
AES.pptx
AES.pptxAES.pptx
AES.pptx
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

modified aes algorithm using multiple s-boxes

  • 1. 1 Modified AES Algorithm Using Multiple S-Boxes Instructor: Truong Tuan Anh, PhD S: Chu Xuân Tình - 1870583
  • 2. 2 Modified AES Algorithm Using Multiple S-Boxes 1. Introduction 2. Advance Encryption Standard (AES) 3. Modified AES Algorithm 4. Avaluation AES - Modifier
  • 3. 3 AES - introdution Ø In 2000, the NIST formally adopted the AES encryption algorithm and published it as a federal standard under the designation FIPS-197. Ø It was chosen because of its security, performance, efficiency, implement ability, and low memory requirements. • Rijndael was selected as the AES – Designed by Vincent Rijmen and Joan Daemen in Belgium
  • 4. 4 AES - introdution Ø The AES Cipher - Rijndael • An iterative – processes data as block of 4 columns of 4 bytes (128 bits) – operates on entire data block in every round • Rijndael design: – simplicity – has 128/192/256 bit keys, 128 bits data – resistant against known attacks – speed and code compactness on many CPUs • The MixColumn function in the AES algorithm is an important property of the cipher
  • 5. 5 AES - introdution Ø The MixColumn function in the AES algorithm is an important property of the cipher ü It provides strength against differential and linear attacks due to the complexity of its mathematical operations. ü Require computational resources in software implementation. ü Replacing the MixColumn function, the speed performance of the AES algorithm will be improved. ü Propose for a modified AES algorithm using multiple S-Boxes.
  • 7. AES - Basic 7 AES Plaintext (128 bits) Ciphertext (128 bits) Key (128-256 bits) AES Conceptual Scheme
  • 8. AES - Basic 8 Ø Multiple rounds • Rounds are (almost) identical – First and last round are a little different
  • 10. AES - Overall Structure
  • 12. AES -128-bit values 12 • Data block viewed as 4-by-4 table of bytes • Represented as 4 by 4 matrix of 8-bit bytes. • Key is expanded to array of 32 bits words 1 byte
  • 13. AES - Data Unit
  • 14. AES - Unit Transformation
  • 15. AES - Changing Plaintext to State
  • 16. AES -Details of Each Round
  • 17. AES- SubBytes: Byte Substitution • A simple substitution of each byte – provide a confusion • Uses one S-box of 16x16 bytes containing a permutation of all 256 8-bit values • Each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits) – eg. byte {95} is replaced by byte in row 9 column 5 – which has value {2A} • S-box constructed using defined transformation of values in Galois Field- GF(28)
  • 18. AES - SubBytes and InvSubBytes
  • 19. AES - SubBytes Operation • The SubBytes operation involves 16 independent byte- to-byte transformations. • Interpret the byte as two hexadecimal digits xy • SW implementation, use row (x) and column (y) as lookup pointer S1,1 = xy16 x’y’16
  • 20. AES - SubBytes Table • Implement by Table Lookup
  • 22. Sample SubByte Transformation • The SubBytes and InvSubBytes transformations are inverses of each other.
  • 23. AES - ShiftRows • Shifting, which permutes the bytes. • A circular byte shift in each each – 1st row is unchanged – 2nd row does 1 byte circular shift to left – 3rd row does 2 byte circular shift to left – 4th row does 3 byte circular shift to left • In the encryption, the transformation is called ShiftRows • In the decryption, the transformation is called InvShiftRows and the shifting is to the right
  • 24. AES - ShiftRows Scheme
  • 25. AES - ShiftRows and InvShiftRows
  • 26. AES - MixColumns • ShiftRows and MixColumns provide diffusion to the cipher • Each column is processed separately • Each byte is replaced by a value dependent on all 4 bytes in the column • Effectively a matrix multiplication in GF(28) using prime poly m(x) =x8+x4+x3+x+1
  • 27. AES -MixClumns Scheme The MixColumns transformation operates at the column level; it transforms each column of the state to a new column.
  • 29. AES - AddRoundKey • XOR state with 128-bits of the round key • AddRoundKey proceeds one column at a time. – adds a round key word with each state column matrix – the operation is matrix addition • Inverse for decryption identical – since XOR own inverse, with reversed keys • Designed to be as simple as possible
  • 32. AES Key Scheduling • takes 128-bits (16-bytes) key and expands into array of 44 32-bit words
  • 34. AES -Key Expansion submodule • RotWord performs a one byte circular left shift on a word For example: RotWord[b0,b1,b2,b3] = [b1,b2,b3,b0] • SubWord performs a byte substitution on each byte of input word using the S-box • SubWord(RotWord(temp)) is XORed with RCon[j] – the round constant
  • 35. AES Security • AES was designed after DES. • Most of the known attacks on DES were already tested on AES. • Brute-Force Attack – AES is definitely more secure than DES due to the larger-size key. • Statistical Attacks – Numerous tests have failed to do statistical analysis of the ciphertext • Differential and Linear Attacks – There are no differential and linear attacks on AES as yet.
  • 36. AES ALGORITHM USING MULTIPLE S-BOXES vPROPOSED MODIFIED 128-AES ALGORITHM USING MULTIPLE S-BOXES Ø The MixColumns function is perceive to be requiring more computational resources in software implementation as compared to the other functions Ø Propose for a modified version of the 128-AES algorithm using two substitution boxes ü The first S-Box is the Rijndael S-Box ü The second S-Box is constructed using XOR operation and affine transformation
  • 37. AES ALGORITHM USING MULTIPLE S-BOXES
  • 38. AES - CONSTRUCTION OF THE NEW S-BOX vThe second S-Box is derived from the original S- Box as designed in the AES ØExclusive OR Operation § each cell in the AES-Rijndael will be XORed with 7F AES-Rijndael[x,y] XOR (7F) § The Key[i] shall be any hexadecimal value between 00 to FF (Table 1. AES- 2SboxXOR7F)
  • 39. AES - CONSTRUCTION OF THE NEW S-BOX
  • 40. AES - CONSTRUCTION OF THE NEW S-BOX vThe second S-Box is derived from the original S- Box as designed in the AES ØExclusive OR Operation ØAffine Transform Operation ü After creating the initial values of AES- 2SboxXOR ü Scramble the bits in each byte value, we next apply the following transformation to each bit bi as stored in the initial AES-2SboxXOR7F:
  • 41. AES - CONSTRUCTION OF THE NEW S-BOX ØAffine Transform Operation ü For the inverse AES-2SboxXOR, the following transformation to each bit was used for bit scrambling:
  • 42. AES - CONSTRUCTION OF THE NEW S-BOX
  • 46. CONCLUSION üModified AES algorithm using multiple S-boxes. üWe observed that the speed performance greatly increased in the modified AES algorithm using multiple S-Boxes, while the security side has slightly weakened. üEasily implemented using cheap processors and a minimum amount of memory. üVery efficient 49
  • 47. Referents • [1] National Institute of Standards and Technology, Advanced Encryption Standard, FIPS 197 (2011). • [2] Paper “Modified AES Algorithm Using Multiple S-Boxes” • [3] Wiki & slide & Internet. 50
  • 48. 51 Thanks for your attention!