SlideShare a Scribd company logo
1 of 27
ADITYA ENGINEERING COLLEGE (A)
COURSE:CRYPTOGRAPHY AND NETWORK SECURITY
TOPIC:Advanced Encryption Standard Algorithm
By
P.Sri Latha
Sr. Assistant Professor
Dept of Computer Science & Engineering
Aditya Engineering College(A)
Surampalem.
Aditya Engineering College (A)
Cryptography & Network
Security
At the end of this class student will be able to:
Implement Advanced Encryption Standard Algorithm for transfering
data securely over a network.
Thursday, March 28, 2024
P.Srilatha
Learning Outcomes
Aditya Engineering College (A)
Cryptography & Network
Security
The Advanced Encryption Standard (AES) was published by the National
Institute of Standards and Technology (NIST) in 2001.
AES is a block cipher intended to replace DES for commercial applications.
It uses a 128-bit block size and a key size of 128, 192, or 256 bits.
AES does not use a Feistel structure. Instead, each full round consists of
four separate functions:
1. byte substitution
2. permutation
3. arithmetic operations over a finite field
4. XOR with a key.
Thursday, March 28, 2024
P.Srilatha
Advanced Encryption Standard (AES)
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
AES Parameters
Key size(words/bytes/bits) 4/16/128 6/24/192 8/32/256
Plaintext block Size
(words/bytes/bits) 4/16/128 4/16/192 4/16/256
Number of rounds 10 12 14
Round Key size (words/bytes/bits) 4/16/128 4/16/192 4/16/256
Expanded key size (words/bytes) 44/176 52/208 60/240
Aditya Engineering College (A)
Cryptography & Network
Security
The algorithm begins with an Add round key stage followed by 9
rounds of four stages and a tenth round of 3 stages.
The four stages are as follows:
1. Substitute bytes
2. Shift rows
3. Mix Columns
4. Add Round Key
The tenth round simply omits the Mix Columns stage.
Thursday, March 28, 2024
P.Srilatha
AES-Working of Single Round
Aditya Engineering College (A)
Cryptography & Network
Security
The first 9 rounds of the decryption algorithm consist of the
following:
1. Inverse Shift rows
2. Inverse Substitute bytes
3. Add Round Key
4. Inverse Mix Columns
Again, the tenth round simply leaves out the Inverse Mix Columns
stage.
Thursday, March 28, 2024
P.Srilatha
AES-Working of Single Round
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
AES Structure
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
This stage (known as SubBytes) is simply a table lookup using a 16×16
matrix of byte values called an s-box.
For this particular round each byte is mapped into a new byte in the
following way: the leftmost nibble of the byte is used to specify a
particular row of the s-box and the rightmost nibble specifies a
column.
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
The matrix that gets operated upon throughout the encryption is
known as state matrix.
For example, the byte {95} (curly brackets represent hex values )
selects row 9 column 5 which turns out to contain the value {2A}.
This is then used to update the state matrix.
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes-S Boxes
Aditya Engineering College (A)
Cryptography & Network
Security
The Inverse substitute byte transformation makes use of an inverse
s-box.
In this case what is desired is to select the value {2A} and get the
value {95}.
The s-box is designed to be resistant to known cryptanalytic attacks.
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes-S Boxes
Aditya Engineering College (A)
Cryptography & Network
Security
Shift row transformation are two types.
1. Forward Shift row transformation which is used in encryption.
2. Inverse Shift row transformation which is used in decryption.
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
FORWARD SHIFT ROW TRANSFORMATION:
The first row of State matrix is not altered.
For the second row, a 1-byte circular left shift is performed.
For the third row, a 2-byte circular left shift is performed.
For the fourth row, a 3-byte circular left shift is performed.
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
INVERSE SHIFT ROWS:
Performs the circular shifts in the opposite direction for each of the
last three rows, with a one-byte circular right shift for the second row
and so on.
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Mix columns transformation are two types.
1. Forward Mix columns transformation which is used in encryption.
2. Inverse Mix columns transformation which is used in decryption.
Thursday, March 28, 2024
P.Srilatha
Stage-3: Mix Columns Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Forward Mix columns transformation called mix columns, operates
on each column individually.
Each byte of a column is mapped into a new value that is a function
of all 4 bytes in that column.
The transformation can be defined by the following matrix
multiplication on state.
Thursday, March 28, 2024
P.Srilatha
Stage-3: Mix Columns Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
The inverse mix column transformation, called InvMixColumns, is
defined by the following matrix multiplication:
Thursday, March 28, 2024
P.Srilatha
Stage-3: Mix Columns Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
In the forward add round key transformation, called AddRoundKey,
the 128 bits of State are bitwise XORed with the 128 bits of the round
key.
Thursday, March 28, 2024
P.Srilatha
Stage-4:Add Roundkey Transformation
State array
(mix columns o/p)
Round key Output state array
Aditya Engineering College (A)
Cryptography & Network
Security
The 128-bit key value can be expanded into 44 words i.e.
44 X 32 = 1408 bits . In each round 4 words will be used i.e. (4x32=128
bits)
In Addroundkey first 4 words w0,w1,w2,w3 are used. In first
round,w4,w5,w6,w7 are used and so on…
The 128 bit key is expanded as follows:
First 128 bit key is arranged as a 4x4 matrix each value size is 8-bits
The 32 bits (k0,k1,k2,k3) is considered as w0.
The 32 bits (k4,k5,k6,k7) is considered as w1.
Thursday, March 28, 2024
P.Srilatha
AES Key Expansion
Aditya Engineering College (A)
Cryptography & Network
Security
The 32 bits (k8,k9,k10,k11) is considered as w2.
The 32 bits (k12,k13,k14,k15) is considered as w3.
Next 4 words w4,w5,w6,w7 are followed as
w4=w0 ⊕ w3
w5=w1 ⊕ w4
w6=w2 ⊕w5
w7=w3 ⊕w6
Thursday, March 28, 2024
P.Srilatha
AES Key Expansion
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
AES Key Expansion
Aditya Engineering College (A)
Cryptography & Network
Security
Learning Outcomes
AES Algorithm
Parameters of AES
AES- Working of single round
AES Structure
Stage-1: Substitution Bytes
Stage-2: Shift Rows Transformation
Stage-3: Mix Columns Transformation
Stage-4: Add Rond Key Transformation
AES Key Expansion
Thursday, March 28, 2024
P.Srilatha
Summary

More Related Content

Similar to Unit-II AES Algorithm which is used machine learning

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 

Similar to Unit-II AES Algorithm which is used machine learning (20)

A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
 
D010321824
D010321824D010321824
D010321824
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
H0154448
H0154448H0154448
H0154448
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic Mathematics
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algo...
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
 
Analytical Study of AES and Proposed Variant with Enhance Block Length and Ke...
Analytical Study of AES and Proposed Variant with Enhance Block Length and Ke...Analytical Study of AES and Proposed Variant with Enhance Block Length and Ke...
Analytical Study of AES and Proposed Variant with Enhance Block Length and Ke...
 
Empirical analysis of power side-channel leakage of high-level synthesis des...
Empirical analysis of power side-channel leakage of  high-level synthesis des...Empirical analysis of power side-channel leakage of  high-level synthesis des...
Empirical analysis of power side-channel leakage of high-level synthesis des...
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
 
Cryptography Workbook
Cryptography WorkbookCryptography Workbook
Cryptography Workbook
 

More from michaelaaron25322

Computer organization algorithms like addition and subtraction and multiplica...
Computer organization algorithms like addition and subtraction and multiplica...Computer organization algorithms like addition and subtraction and multiplica...
Computer organization algorithms like addition and subtraction and multiplica...
michaelaaron25322
 

More from michaelaaron25322 (13)

Python programming language introduction unit
Python programming language introduction unitPython programming language introduction unit
Python programming language introduction unit
 
memory Organization in computer organization
memory Organization in computer organizationmemory Organization in computer organization
memory Organization in computer organization
 
EST is a software architectural style that was created to guide the design an...
EST is a software architectural style that was created to guide the design an...EST is a software architectural style that was created to guide the design an...
EST is a software architectural style that was created to guide the design an...
 
Spring data jpa are used to develop spring applications
Spring data jpa are used to develop spring applicationsSpring data jpa are used to develop spring applications
Spring data jpa are used to develop spring applications
 
Python programming language introduction unit
Python programming language introduction unitPython programming language introduction unit
Python programming language introduction unit
 
Typescript language extension of java script
Typescript language extension of java scriptTypescript language extension of java script
Typescript language extension of java script
 
UNIT2_NaiveBayes algorithms used in machine learning
UNIT2_NaiveBayes algorithms used in machine learningUNIT2_NaiveBayes algorithms used in machine learning
UNIT2_NaiveBayes algorithms used in machine learning
 
Spring Data JPA USE FOR CREATING DATA JPA
Spring Data JPA USE FOR CREATING DATA  JPASpring Data JPA USE FOR CREATING DATA  JPA
Spring Data JPA USE FOR CREATING DATA JPA
 
Computer organization algorithms like addition and subtraction and multiplica...
Computer organization algorithms like addition and subtraction and multiplica...Computer organization algorithms like addition and subtraction and multiplica...
Computer organization algorithms like addition and subtraction and multiplica...
 
mean stack
mean stackmean stack
mean stack
 
karnaughmaprev1-130728135103-phpapp01.ppt
karnaughmaprev1-130728135103-phpapp01.pptkarnaughmaprev1-130728135103-phpapp01.ppt
karnaughmaprev1-130728135103-phpapp01.ppt
 
booleanalgebra-140914001141-phpapp01 (1).ppt
booleanalgebra-140914001141-phpapp01 (1).pptbooleanalgebra-140914001141-phpapp01 (1).ppt
booleanalgebra-140914001141-phpapp01 (1).ppt
 
mst_unit1.pptx
mst_unit1.pptxmst_unit1.pptx
mst_unit1.pptx
 

Recently uploaded

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Unit-II AES Algorithm which is used machine learning

  • 1. ADITYA ENGINEERING COLLEGE (A) COURSE:CRYPTOGRAPHY AND NETWORK SECURITY TOPIC:Advanced Encryption Standard Algorithm By P.Sri Latha Sr. Assistant Professor Dept of Computer Science & Engineering Aditya Engineering College(A) Surampalem.
  • 2. Aditya Engineering College (A) Cryptography & Network Security At the end of this class student will be able to: Implement Advanced Encryption Standard Algorithm for transfering data securely over a network. Thursday, March 28, 2024 P.Srilatha Learning Outcomes
  • 3. Aditya Engineering College (A) Cryptography & Network Security The Advanced Encryption Standard (AES) was published by the National Institute of Standards and Technology (NIST) in 2001. AES is a block cipher intended to replace DES for commercial applications. It uses a 128-bit block size and a key size of 128, 192, or 256 bits. AES does not use a Feistel structure. Instead, each full round consists of four separate functions: 1. byte substitution 2. permutation 3. arithmetic operations over a finite field 4. XOR with a key. Thursday, March 28, 2024 P.Srilatha Advanced Encryption Standard (AES)
  • 4. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha AES Parameters Key size(words/bytes/bits) 4/16/128 6/24/192 8/32/256 Plaintext block Size (words/bytes/bits) 4/16/128 4/16/192 4/16/256 Number of rounds 10 12 14 Round Key size (words/bytes/bits) 4/16/128 4/16/192 4/16/256 Expanded key size (words/bytes) 44/176 52/208 60/240
  • 5. Aditya Engineering College (A) Cryptography & Network Security The algorithm begins with an Add round key stage followed by 9 rounds of four stages and a tenth round of 3 stages. The four stages are as follows: 1. Substitute bytes 2. Shift rows 3. Mix Columns 4. Add Round Key The tenth round simply omits the Mix Columns stage. Thursday, March 28, 2024 P.Srilatha AES-Working of Single Round
  • 6. Aditya Engineering College (A) Cryptography & Network Security The first 9 rounds of the decryption algorithm consist of the following: 1. Inverse Shift rows 2. Inverse Substitute bytes 3. Add Round Key 4. Inverse Mix Columns Again, the tenth round simply leaves out the Inverse Mix Columns stage. Thursday, March 28, 2024 P.Srilatha AES-Working of Single Round
  • 7. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha AES Structure
  • 8. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 9. Aditya Engineering College (A) Cryptography & Network Security This stage (known as SubBytes) is simply a table lookup using a 16×16 matrix of byte values called an s-box. For this particular round each byte is mapped into a new byte in the following way: the leftmost nibble of the byte is used to specify a particular row of the s-box and the rightmost nibble specifies a column. Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 10. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 11. Aditya Engineering College (A) Cryptography & Network Security The matrix that gets operated upon throughout the encryption is known as state matrix. For example, the byte {95} (curly brackets represent hex values ) selects row 9 column 5 which turns out to contain the value {2A}. This is then used to update the state matrix. Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 12. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes-S Boxes
  • 13. Aditya Engineering College (A) Cryptography & Network Security The Inverse substitute byte transformation makes use of an inverse s-box. In this case what is desired is to select the value {2A} and get the value {95}. The s-box is designed to be resistant to known cryptanalytic attacks. Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 14. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes-S Boxes
  • 15. Aditya Engineering College (A) Cryptography & Network Security Shift row transformation are two types. 1. Forward Shift row transformation which is used in encryption. 2. Inverse Shift row transformation which is used in decryption. Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 16. Aditya Engineering College (A) Cryptography & Network Security FORWARD SHIFT ROW TRANSFORMATION: The first row of State matrix is not altered. For the second row, a 1-byte circular left shift is performed. For the third row, a 2-byte circular left shift is performed. For the fourth row, a 3-byte circular left shift is performed. Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 17. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 18. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 19. Aditya Engineering College (A) Cryptography & Network Security INVERSE SHIFT ROWS: Performs the circular shifts in the opposite direction for each of the last three rows, with a one-byte circular right shift for the second row and so on. Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 20. Aditya Engineering College (A) Cryptography & Network Security Mix columns transformation are two types. 1. Forward Mix columns transformation which is used in encryption. 2. Inverse Mix columns transformation which is used in decryption. Thursday, March 28, 2024 P.Srilatha Stage-3: Mix Columns Transformation
  • 21. Aditya Engineering College (A) Cryptography & Network Security Forward Mix columns transformation called mix columns, operates on each column individually. Each byte of a column is mapped into a new value that is a function of all 4 bytes in that column. The transformation can be defined by the following matrix multiplication on state. Thursday, March 28, 2024 P.Srilatha Stage-3: Mix Columns Transformation
  • 22. Aditya Engineering College (A) Cryptography & Network Security The inverse mix column transformation, called InvMixColumns, is defined by the following matrix multiplication: Thursday, March 28, 2024 P.Srilatha Stage-3: Mix Columns Transformation
  • 23. Aditya Engineering College (A) Cryptography & Network Security In the forward add round key transformation, called AddRoundKey, the 128 bits of State are bitwise XORed with the 128 bits of the round key. Thursday, March 28, 2024 P.Srilatha Stage-4:Add Roundkey Transformation State array (mix columns o/p) Round key Output state array
  • 24. Aditya Engineering College (A) Cryptography & Network Security The 128-bit key value can be expanded into 44 words i.e. 44 X 32 = 1408 bits . In each round 4 words will be used i.e. (4x32=128 bits) In Addroundkey first 4 words w0,w1,w2,w3 are used. In first round,w4,w5,w6,w7 are used and so on… The 128 bit key is expanded as follows: First 128 bit key is arranged as a 4x4 matrix each value size is 8-bits The 32 bits (k0,k1,k2,k3) is considered as w0. The 32 bits (k4,k5,k6,k7) is considered as w1. Thursday, March 28, 2024 P.Srilatha AES Key Expansion
  • 25. Aditya Engineering College (A) Cryptography & Network Security The 32 bits (k8,k9,k10,k11) is considered as w2. The 32 bits (k12,k13,k14,k15) is considered as w3. Next 4 words w4,w5,w6,w7 are followed as w4=w0 ⊕ w3 w5=w1 ⊕ w4 w6=w2 ⊕w5 w7=w3 ⊕w6 Thursday, March 28, 2024 P.Srilatha AES Key Expansion
  • 26. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha AES Key Expansion
  • 27. Aditya Engineering College (A) Cryptography & Network Security Learning Outcomes AES Algorithm Parameters of AES AES- Working of single round AES Structure Stage-1: Substitution Bytes Stage-2: Shift Rows Transformation Stage-3: Mix Columns Transformation Stage-4: Add Rond Key Transformation AES Key Expansion Thursday, March 28, 2024 P.Srilatha Summary