Ch06 Crypto7e
Ch06 Crypto7e
y and
Network
Security
Seventh Edition, Global Edition
by William Stallings
(a) S-box
(Table can be found on page 163 in
textbook)
© 2017 Pearson Education, Ltd., All rights reserved.
Table 6.2
• Inclusion of a round-
dependent round • Knowledge of a part of the cipher key or round key does
constant eliminates not enable calculation of many other round-key bits
• An invertible transformation
the symmetry • Speed on a wide range of processors
• Usage of round constants to eliminate symmetries
between the ways in • Diffusion of cipher key differences into the round keys
• Enough nonlinearity to prohibit the full determination of
which round keys are round key differences from cipher key differences only
• Simplicity of description
generated in different
rounds
© 2017 Pearson Education, Ltd., All rights reserved.
Table 6.3
AES
Example
Key
Expansion
(Table is located on page 175
in textbook)
AES
Example
(Table is located on page 177
in textbook)
Avalanche
Effect
in AES:
Change in
Plaintext
(Table is located on page 178
in textbook)
Avalanche
Effect
in AES:
Change
in Key
(Table is located on page 179
in textbook)
f
ir
s
t
t
w
o
s
t
a
g
e
s
o
f
t
h
e
d
e
c
r
y
p
ti
o
n
r
o
u
n
d
n
e
e
d
t
o
b
e
i
n
t
e
r
c
h
a
n
g
e
d
T
h
e
encryption cipher
n
d
t
w
o
• The sequence of s
t
a
g
transformations differs e
s
t
h
e
same
r
y
p
t
i
o
r
o
software or firmware
e
e
d
b
e
decryption
n
g
e
d