We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32
ADVANCED
ENCRYPTION STANDARD (AES) The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information.
AES is implemented in software and hardware throughout the
world to encrypt sensitive data.
It is essential for government computer security, cyber security
and electronic data protection. ◦ AES encryption works ◦ AES includes three block ciphers: ◦ AES-128 uses a 128-bit key length to encrypt and decrypt a block of messages. ◦ AES-192 uses a 192-bit key length to encrypt and decrypt a block of messages. ◦ AES-256 uses a 256-bit key length to encrypt and decrypt a block of messages. ◦ Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128, 192 and 256 bits, respectively. Working of the Cipher : AES performs operations on bytes of data rather than in bits. Since the block size is 128 bits, the cipher processes 128 bits = 16 bytes of the input data at a time. 16 bytes = 4 Words 1 Words = 32 bits
The number of rounds depends on the key length as follows :
◦ 128 bit key – 10 rounds ◦ 192 bit key – 12 rounds ◦ 256 bit key – 14 rounds ◦SubBytes Table Shift Rows Add Round Keys : Now the resultant output of the previous stage is XOR-ed with the corresponding round key. Here, the 16 bytes is not considered as a grid but just as 128 bits of data. AES and DES are both examples of symmetric block ciphers but have certain dissimilarities. RC4 Encryption Algorithm ◦ RC4 stands for Rivest Cipher 4. ◦ Ron Rivest invented RC4 in 1987, and it is a stream cipher. ◦ As RC4 is a stream cipher, it encrypts data bytes by bits. ◦ Because of its speed and simplicity, RC4 is the most extensively used stream cipher of all the stream ciphers. ◦ While RC4 is known for its ease of use and speed in software, it has been found to have several weaknesses, making it insecure.
◦ When the beginning of the output keystream isn't destroyed, or
when non-random or linked keys are utilized, it's highly vulnerable. Working of RC4 ◦ RC4 creates a pseudo-random bit stream (a keystream). ◦ These, like any other stream cipher, can be used for encryption by utilizing bit-wise exclusive or to combine it with the plaintext. ◦ The same procedure is used for decryption (since exclusive-OR is a symmetric operation). ◦ The cipher uses a secret internal state that is divided into two sections to generate the keystream − ◦ Two index pointers (8 bits each). ◦ The key-scheduling algorithm is known to initialize the permutation using a variable-length key, typically between 40 and 256 bits (KSA). A pseudo-random generating technique then generates the stream of bits. ◦ Each of the 256 available bytes is permuted. ◦ For encryption − ◦ The user enters the Plaintext and a secret key. ◦ For the secret key entered, the encryption engine creates the keystream using the KSA and PRGA algorithms. ◦ Plaintext is XORed with the generated keystream. Because RC4 is a stream cipher, byte-by-byte XORing is used to generate the encrypted text. ◦ This encrypted text is now sent in encrypted form to the intended recipient. ◦ For Decryption − ◦ The same byte-wise X-OR technique is used on the ciphertext to decrypt it