Chapter 5-Cryptographic Algorithms Symmetric Ciphers_AES
Chapter 5-Cryptographic Algorithms Symmetric Ciphers_AES
ALGORITHMS SYMMETRIC
CIPHERS_AES
CS 11464
Information Chapter 5
System - Cryptographic Algorithms Symmetric Ciphers _AES
Security
Important Links
Computer Security: Principles and Practic
e 4/E, by William Stallings & Lawrie Brow
n. Pearson Press, ISBN 10: 1-292-22061-
9, ISBN 13: 978- 1-292-22061-1, 2018.
Cryptography and Network Security: Prin
ciples and Practice, 7th Edition by Willia
m Stallings. ISBN 10:1-292-15858-1 ISBN
13: 978-1-292-15858-7, 2017.
RSA Labs (de facto)
https://www.cryptool.org/en/
groups/columns)
mix columns (subs using matrix multiply of
groups)
add round key (XOR state with key material)
bytes
AES Structure
Byte Substitution ( Sbox ) 16*16
Shift Row ) 0,1,2,3)
Mix Col ( Multiplication )
Add round Key
security
Add Round Key
AES Round
AES Key Expansion
takes 128-bit (16-byte) key and expands
into array of 44/52/60 32-bit words
start by copying key into first 4 words
then loop creating words that depend on
values in previous & 4 places back
in 3 of 4 cases just XOR these together
1st word in 4 has rotate + S-box + XOR
https://www.youtube.com/watch?
v=gP4PqVGudtg