SlideShare a Scribd company logo
ADVANCED ENCRYPTION STANDARD (AES)
Name: Md Fazle Rabbi
ID:16CSE057
CONTENTS
 What is AES?
 AES features
 Operation of AES
 AES security
WHAT IS AES?
 The Advanced Encryption Standard (AES) is a symmetric
block cipher chosen by the U.S. government to protect
classified information.
 The more popular and widely adopted symmetric encryption
algorithm likely to be encountered nowadays is the Advanced
Encryption Standard (AES).
 It is found at least six time faster than triple DES.
 AES is implemented in software and hardware throughout the
world to encrypt sensitive data.
 It is essential for government computer security, cyber security
and electronic data protection
AES FEATURES
AES algorithm must be a block cipher capable of handling 128-bit
blocks, using keys sized at 128, 192 and 256 bits. Other criteria for
being chosen as the next AES algorithm included the following:
 Security. Competing algorithms were to be judged on their ability to
resist attack -- as compared to other submitted ciphers. Security strength
was to be considered the most important factor in the competition.
 Cost. Intended to be released on a global, nonexclusive and royalty-free
basis, the candidate algorithms were to be evaluated on computational
and memory efficiency.
 Implementation. Factors to be considered included the algorithm's
flexibility, suitability for hardware or software implementation, and
overall simplicity.
OPERATION OF AES
 The number of rounds in AES is variable and depends on
the length of the key. AES uses 10 rounds for 128-bit
keys, 12 rounds for 192-bit keys and 14 rounds for 256-
bit keys. Each of these rounds uses a different 128-bit
round key, which is calculated from the original AES key.
THE SCHEMATIC OF AES STRUCTURE IS GIVEN IN THE FOLLOWING
ILLUSTRATION −
HOW DOES AES ENCRYPTION WORK?
1. Dividing data into blocks
 First, we have to keep in mind that AES is a block cipher.
Unlike stream ciphers, it encrypts data in blocks of
bits instead of bit-by-bit.
 Each of its blocks contains a column of 16 bytes in a layout of
four-by-four. As one byte contains 8 bits, we get 128-bit block
size (16×8=128).
 Thus, the very first step of AES encryption is dividing the
plaintext (text that is not written in code) into these blocks.
 So, let’s choose the text you want to encrypt. For example, it
can be “better late than never”.
 Applying the advanced encryption standard would
turn the beginning of this phrase into the following
block:
2.ADDING ROUND KEY
 This is the very first round of AES encryption. Here, the
algorithm adds the initial key to our phrase, which was
previously turned into a 4×4 block:
+
=
Adding two blocks of text might seem impossible. However, remember that
AES actually uses binary code, and what you now see is just a visual
representation of what is actually happening in the binary language.
ENCRYPTION PROCESS
 Here, we restrict to description of a typical round of
AES encryption. Each round comprise of four sub-
processes. The first round process is depicted
below −
I) BYTE SUBSTITUTION
The 16 input bytes (128-bit) are substituted based
on a predetermined table. The result is a matrix of
four rows and four columns where the data is altered
in a non-linear way to add confusion
II) SHIFT ROWS
Shift Row is carried out in four parts:
 First row is not shifted
 Second row is shifted one (byte) position to the left
 Third row is shifted two positions to the left
 Fourth row is shifted three positions to the left
In the end, a new matrix is formed based on the same 16 bytes.
III)) MIX-COLUMNS
This operation is the most difficult, both to explain and
perform. Each column of the state array is processed
separately to produce a new column. The new
column replaces the old one. The processing involves
a matrix multiplication.
IV) XOR-ROUND KEY
 After the Mix-Columns operation, the Xor-Round Key is very
simple indeed and hardly needs its own name. This operation
simply takes the existing state array, XORs the value of the
appropriate round key, and replaces the state array with the
result.
AES SECURITY
 Security experts maintain that AES is secure when
implemented properly. However, AES encryption keys need
to be protected. Even the most extensive cryptographic
systems can be vulnerable if a hacker gains access to the
encryption key.
 Use of strong passwords, password managers, multifactor
authentication (MFA), firewalls and antivirus software is
critical to enterprise security. Employees should also be
trained in ways to prevent social engineering and phishing
attacks.
THE END

More Related Content

What's hot

IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
Avadhesh Agrawal
 
Ipsec
IpsecIpsec
Aes
AesAes
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
 
Ipsec
IpsecIpsec
AES.ppt
AES.pptAES.ppt
AES.ppt
BincySam2
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptographydrewz lin
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
Sahil Kureel
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Two fish cipher
Two fish cipherTwo fish cipher
Two fish cipher
Waqar Memon
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
Charles Southerland
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
Tirthika Bandi
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
Sou Jana
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
davisli
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
NEHA PATEL
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
Khoa Nguyen
 

What's hot (20)

IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
Ipsec
IpsecIpsec
Ipsec
 
Aes
AesAes
Aes
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Ipsec
IpsecIpsec
Ipsec
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
Two fish cipher
Two fish cipherTwo fish cipher
Two fish cipher
 
One-Time Pad Encryption
One-Time Pad EncryptionOne-Time Pad Encryption
One-Time Pad Encryption
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 

Similar to Topic5 advanced encryption standard (aes)

Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
AES (Intro Advanced Encryption Standard).pptx
AES (Intro Advanced Encryption Standard).pptxAES (Intro Advanced Encryption Standard).pptx
AES (Intro Advanced Encryption Standard).pptx
ssuser0a47f0
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
Network security cs5
Network security cs5Network security cs5
Network security cs5
Infinity Tech Solutions
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
Renas Rekany
 
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docxReply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
audeleypearl
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
roueida mohammed
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
Dharani675311
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
1-aes.pptx
1-aes.pptx1-aes.pptx
1-aes.pptx
anithachristopher3
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
ijcsit
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
Sumathi Reddy
 
F017364451
F017364451F017364451
F017364451
IOSR Journals
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
iosrjce
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
Deepak John
 

Similar to Topic5 advanced encryption standard (aes) (20)

Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
AES (Intro Advanced Encryption Standard).pptx
AES (Intro Advanced Encryption Standard).pptxAES (Intro Advanced Encryption Standard).pptx
AES (Intro Advanced Encryption Standard).pptx
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptxLecture # 007 AES.pptx
Lecture # 007 AES.pptx
 
Aes
AesAes
Aes
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Network security cs5
Network security cs5Network security cs5
Network security cs5
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docxReply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
 
Ch05
Ch05Ch05
Ch05
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
advance encryption standard chapter 5.ppt
advance encryption standard chapter 5.pptadvance encryption standard chapter 5.ppt
advance encryption standard chapter 5.ppt
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
1-aes.pptx
1-aes.pptx1-aes.pptx
1-aes.pptx
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
 
F017364451
F017364451F017364451
F017364451
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 

More from MdFazleRabbi18

5.programmable interval timer 8253
5.programmable interval timer 82535.programmable interval timer 8253
5.programmable interval timer 8253
MdFazleRabbi18
 
4.programmable dma controller 8257
4.programmable dma controller 82574.programmable dma controller 8257
4.programmable dma controller 8257
MdFazleRabbi18
 
3.programmable interrupt controller 8259
3.programmable interrupt controller 82593.programmable interrupt controller 8259
3.programmable interrupt controller 8259
MdFazleRabbi18
 
1.ppi 8255
1.ppi 8255 1.ppi 8255
1.ppi 8255
MdFazleRabbi18
 
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
MdFazleRabbi18
 
Topic3 playfain
Topic3 playfainTopic3 playfain
Topic3 playfain
MdFazleRabbi18
 
Topic2 caser hill_cripto
Topic2 caser hill_criptoTopic2 caser hill_cripto
Topic2 caser hill_cripto
MdFazleRabbi18
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
11. lzw coding
11. lzw coding11. lzw coding
11. lzw coding
MdFazleRabbi18
 
9. hofman coding in DIP
9. hofman coding in DIP9. hofman coding in DIP
9. hofman coding in DIP
MdFazleRabbi18
 
7. image enhancement using spatial filtering
7. image enhancement using spatial filtering7. image enhancement using spatial filtering
7. image enhancement using spatial filtering
MdFazleRabbi18
 
5. gray level transformation
5. gray level transformation5. gray level transformation
5. gray level transformation
MdFazleRabbi18
 
1. steps in image processing
1. steps in image processing1. steps in image processing
1. steps in image processing
MdFazleRabbi18
 
5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals 5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals
MdFazleRabbi18
 
4. operations of signals
4. operations of signals 4. operations of signals
4. operations of signals
MdFazleRabbi18
 
3. systems
3. systems 3. systems
3. systems
MdFazleRabbi18
 
2. classification of signals
2. classification of signals 2. classification of signals
2. classification of signals
MdFazleRabbi18
 
1. elementary signals
1. elementary signals 1. elementary signals
1. elementary signals
MdFazleRabbi18
 
4. random number and it's generating techniques
4. random number and it's generating techniques 4. random number and it's generating techniques
4. random number and it's generating techniques
MdFazleRabbi18
 
3. different types of simulations for appropriate systems
3. different types of simulations for appropriate systems 3. different types of simulations for appropriate systems
3. different types of simulations for appropriate systems
MdFazleRabbi18
 

More from MdFazleRabbi18 (20)

5.programmable interval timer 8253
5.programmable interval timer 82535.programmable interval timer 8253
5.programmable interval timer 8253
 
4.programmable dma controller 8257
4.programmable dma controller 82574.programmable dma controller 8257
4.programmable dma controller 8257
 
3.programmable interrupt controller 8259
3.programmable interrupt controller 82593.programmable interrupt controller 8259
3.programmable interrupt controller 8259
 
1.ppi 8255
1.ppi 8255 1.ppi 8255
1.ppi 8255
 
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
 
Topic3 playfain
Topic3 playfainTopic3 playfain
Topic3 playfain
 
Topic2 caser hill_cripto
Topic2 caser hill_criptoTopic2 caser hill_cripto
Topic2 caser hill_cripto
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
11. lzw coding
11. lzw coding11. lzw coding
11. lzw coding
 
9. hofman coding in DIP
9. hofman coding in DIP9. hofman coding in DIP
9. hofman coding in DIP
 
7. image enhancement using spatial filtering
7. image enhancement using spatial filtering7. image enhancement using spatial filtering
7. image enhancement using spatial filtering
 
5. gray level transformation
5. gray level transformation5. gray level transformation
5. gray level transformation
 
1. steps in image processing
1. steps in image processing1. steps in image processing
1. steps in image processing
 
5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals 5. convolution and correlation of discrete time signals
5. convolution and correlation of discrete time signals
 
4. operations of signals
4. operations of signals 4. operations of signals
4. operations of signals
 
3. systems
3. systems 3. systems
3. systems
 
2. classification of signals
2. classification of signals 2. classification of signals
2. classification of signals
 
1. elementary signals
1. elementary signals 1. elementary signals
1. elementary signals
 
4. random number and it's generating techniques
4. random number and it's generating techniques 4. random number and it's generating techniques
4. random number and it's generating techniques
 
3. different types of simulations for appropriate systems
3. different types of simulations for appropriate systems 3. different types of simulations for appropriate systems
3. different types of simulations for appropriate systems
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
SriSurya50
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptxFresher’s Quiz 2023 at GMC Nizamabad.pptx
Fresher’s Quiz 2023 at GMC Nizamabad.pptx
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 

Topic5 advanced encryption standard (aes)

  • 1. ADVANCED ENCRYPTION STANDARD (AES) Name: Md Fazle Rabbi ID:16CSE057
  • 2. CONTENTS  What is AES?  AES features  Operation of AES  AES security
  • 3. WHAT IS AES?  The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information.  The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES).  It is found at least six time faster than triple DES.  AES is implemented in software and hardware throughout the world to encrypt sensitive data.  It is essential for government computer security, cyber security and electronic data protection
  • 4. AES FEATURES AES algorithm must be a block cipher capable of handling 128-bit blocks, using keys sized at 128, 192 and 256 bits. Other criteria for being chosen as the next AES algorithm included the following:  Security. Competing algorithms were to be judged on their ability to resist attack -- as compared to other submitted ciphers. Security strength was to be considered the most important factor in the competition.  Cost. Intended to be released on a global, nonexclusive and royalty-free basis, the candidate algorithms were to be evaluated on computational and memory efficiency.  Implementation. Factors to be considered included the algorithm's flexibility, suitability for hardware or software implementation, and overall simplicity.
  • 5. OPERATION OF AES  The number of rounds in AES is variable and depends on the length of the key. AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256- bit keys. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key.
  • 6. THE SCHEMATIC OF AES STRUCTURE IS GIVEN IN THE FOLLOWING ILLUSTRATION −
  • 7. HOW DOES AES ENCRYPTION WORK? 1. Dividing data into blocks  First, we have to keep in mind that AES is a block cipher. Unlike stream ciphers, it encrypts data in blocks of bits instead of bit-by-bit.  Each of its blocks contains a column of 16 bytes in a layout of four-by-four. As one byte contains 8 bits, we get 128-bit block size (16×8=128).  Thus, the very first step of AES encryption is dividing the plaintext (text that is not written in code) into these blocks.  So, let’s choose the text you want to encrypt. For example, it can be “better late than never”.
  • 8.  Applying the advanced encryption standard would turn the beginning of this phrase into the following block:
  • 9. 2.ADDING ROUND KEY  This is the very first round of AES encryption. Here, the algorithm adds the initial key to our phrase, which was previously turned into a 4×4 block: + = Adding two blocks of text might seem impossible. However, remember that AES actually uses binary code, and what you now see is just a visual representation of what is actually happening in the binary language.
  • 10. ENCRYPTION PROCESS  Here, we restrict to description of a typical round of AES encryption. Each round comprise of four sub- processes. The first round process is depicted below −
  • 11. I) BYTE SUBSTITUTION The 16 input bytes (128-bit) are substituted based on a predetermined table. The result is a matrix of four rows and four columns where the data is altered in a non-linear way to add confusion
  • 12. II) SHIFT ROWS Shift Row is carried out in four parts:  First row is not shifted  Second row is shifted one (byte) position to the left  Third row is shifted two positions to the left  Fourth row is shifted three positions to the left In the end, a new matrix is formed based on the same 16 bytes.
  • 13. III)) MIX-COLUMNS This operation is the most difficult, both to explain and perform. Each column of the state array is processed separately to produce a new column. The new column replaces the old one. The processing involves a matrix multiplication.
  • 14. IV) XOR-ROUND KEY  After the Mix-Columns operation, the Xor-Round Key is very simple indeed and hardly needs its own name. This operation simply takes the existing state array, XORs the value of the appropriate round key, and replaces the state array with the result.
  • 15. AES SECURITY  Security experts maintain that AES is secure when implemented properly. However, AES encryption keys need to be protected. Even the most extensive cryptographic systems can be vulnerable if a hacker gains access to the encryption key.  Use of strong passwords, password managers, multifactor authentication (MFA), firewalls and antivirus software is critical to enterprise security. Employees should also be trained in ways to prevent social engineering and phishing attacks.