0% found this document useful (0 votes)
9 views

2.3 Aes

Uploaded by

dejafix462
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

2.3 Aes

Uploaded by

dejafix462
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

ADVANCED

ENCRYPTION
STANDARD (AES)
The Advanced Encryption Standard (AES) is a symmetric
block cipher chosen by the U.S. government to protect
classified information.

AES is implemented in software and hardware throughout the


world to encrypt sensitive data.

It is essential for government computer security, cyber security


and electronic data protection.
◦ AES encryption works
◦ AES includes three block ciphers:
◦ AES-128 uses a 128-bit key length to encrypt and decrypt a block of
messages.
◦ AES-192 uses a 192-bit key length to encrypt and decrypt a block of
messages.
◦ AES-256 uses a 256-bit key length to encrypt and decrypt a block of
messages.
◦ Each cipher encrypts and decrypts data in blocks of 128 bits using
cryptographic keys of 128, 192 and 256 bits, respectively.
Working of the Cipher :
AES performs operations on bytes of data rather than in
bits. Since the block size is 128 bits, the cipher processes
128 bits = 16 bytes of the input data at a time.
16 bytes = 4 Words
1 Words = 32 bits

The number of rounds depends on the key length as follows :


◦ 128 bit key – 10 rounds
◦ 192 bit key – 12 rounds
◦ 256 bit key – 14 rounds
◦SubBytes Table
Shift Rows
Add Round Keys :
Now the resultant output of the previous stage is XOR-ed with the corresponding round key. Here, the 16 bytes is not considered as a grid but just
as 128 bits of data.
AES and DES are both examples of symmetric block ciphers but
have certain dissimilarities.
RC4 Encryption Algorithm
◦ RC4 stands for Rivest Cipher 4.
◦ Ron Rivest invented RC4 in 1987, and it is a stream cipher.
◦ As RC4 is a stream cipher, it encrypts data bytes by bits.
◦ Because of its speed and simplicity, RC4 is the most extensively
used stream cipher of all the stream ciphers.
◦ While RC4 is known for its ease of use and speed in software, it has
been found to have several weaknesses, making it insecure.

◦ When the beginning of the output keystream isn't destroyed, or


when non-random or linked keys are utilized, it's highly
vulnerable.
Working of RC4
◦ RC4 creates a pseudo-random bit stream (a keystream).
◦ These, like any other stream cipher, can be used for encryption by
utilizing bit-wise exclusive or to combine it with the plaintext.
◦ The same procedure is used for decryption (since exclusive-OR is a
symmetric operation).
◦ The cipher uses a secret internal state that is divided into two sections to
generate the keystream −
◦ Two index pointers (8 bits each).
◦ The key-scheduling algorithm is known to initialize the
permutation using a variable-length key, typically between 40 and
256 bits (KSA). A pseudo-random generating technique then
generates the stream of bits.
◦ Each of the 256 available bytes is permuted.
◦ For encryption −
◦ The user enters the Plaintext and a secret key.
◦ For the secret key entered, the encryption engine creates the keystream using
the KSA and PRGA algorithms.
◦ Plaintext is XORed with the generated keystream. Because RC4 is a stream
cipher, byte-by-byte XORing is used to generate the encrypted text.
◦ This encrypted text is now sent in encrypted form to the intended recipient.
◦ For Decryption −
◦ The same byte-wise X-OR technique is used on the ciphertext to
decrypt it

You might also like