Seminar presentation
Seminar presentation
DEEP DIVE
PRESENTED BY:
SIDDHANT MISHRA
REGD. NO.:2201289170
COMPUTER SCIENCE & ENGINEERING
Symmetric VS Asymmetric
What is Cryptography?
• Cryptography is the science of securing communication from adversaries
by transforming information into an unreadable format (encryption) and
back into a readable format (decryption). It ensures:
1. Confidentiality – Only intended recipients can read the message.
2. Integrity – Ensures that the message has not been altered.
3. Authentication – Verifies the identity of the sender and receiver.
4. Non-repudiation – Prevents denial of a transaction or communication.
EVOLUTION AND TYPES OF ENCRYPTION
• Cryptography, the art of securing information, has evolved significantly since its inception. Historically, one of
the earliest known uses of cryptography dates back to around 1900 BC, where non-standard hieroglyphs were
carved into the tomb of Khnumhotep II in Egypt. These modifications were likely intended to obscure the
message or add an element of mystery.
• Over time, various encryption methods have been developed to protect information into two main types:
Symmetric Encryption: This method uses a single Asymmetric Encryption: Introduced in the 1970s,
key for both encryption and decryption. A classic this approach employs a pair of keys—one public
example is the Caesar cipher, attributed to Julius and one private. The public key encrypts the data,
Caesar, which involved shifting letters of the while the private key decrypts it, enhancing
alphabet by a fixed number to encode messages. security by eliminating the need to share secret
Modern symmetric algorithms include the keys. RSA is a well-known asymmetric encryption
Advanced Encryption Standard (AES). Splunk algorithm. Cisco
ASYMMETRIC ENCRYPTION
Security Less secure if the key is exposed More secure due to separate keys
Key Distribution Difficult (requires a secure channel) Easier (public key can be shared)
Best Use Encrypting large data, VPNs Secure key exchange, authentication
ADVANCED ENCRYPTION STANDARD (AES):
THE CORE OF MODERN CRYPTOGRAPHY
What is AES?
• The Advanced Encryption Standard (AES) is a symmetric block cipher algorithm
standardized by the National Institute of Standards and Technology (NIST) in 2001 to
replace the older Data Encryption Standard (DES).
• AES is used globally for securing sensitive data in banking, government, military, and
everyday internet security protocols (such as HTTPS, VPNs, and encrypted
messaging).
History:
•Developed by Rijndael (Joan Daemen & Vincent Rijmen) in
1998.
•Selected by NIST (National Institute of Standards and
Technology) in 2001 as a replacement for DES.
•Used by governments, businesses, and industries worldwide.
AES FEATURES & PROPERTIES
Why was AES Needed?
Efficiency: Fast and optimized •DES used a 56-bit key, which became
for both hardware and
software implementations. vulnerable to brute-force attacks.
•AES supports larger key sizes (128, 192,
and 256 bits), making it far more secure.
Block Cipher: Encrypts
data in fixed-size blocks
of 128 bits.
AES-128 10 rounds
AES-192 12 rounds
AES-256 14 rounds
Substitution Process:
• Each byte in the state matrix is split into two
4-bit halves.
• The first half determines the row, and the
second half determines the column in the S-
Box.
• The byte is then replaced with the value
found at this row and column intersection in
the S-Box. Example:
•If a byte in hexadecimal is 0x53:
•Split into 5 (row) and 3 (column).
•Locate the value in the S-Box at row 5, column 3.
•Suppose this value is 0xED; thus, 0x53 is replaced with 0xED
SHIFT ROWS
n the ShiftRows step of the Advanced Encryption
Standard (AES), the rows of the 4×4 state matrix
are shifted to the left by varying offsets. Here's a
simplified breakdown:
1.Purpose: Enhances diffusion by rearranging the
bytes in each row, ensuring that the columns are
mixed in subsequent steps.
1.Shifting Process:
1. First Row: No shift.
2. Second Row: Shifted one byte to the left.
3. Third Row: Shifted two bytes to the left.
4. Fourth Row: Shifted three bytes to the left.
MIX COLUMNS
•Purpose: To mix the data within each
column, ensuring that the influence of each
input byte spreads over four output bytes,
thereby increasing the complexity for
potential attackers.
Transformation Process:
•For positions that are multiples of the key length ( i divisible by N):
•i. Rotate Word (RotWord): Shift the bytes in the word
cyclically.
•ii. Substitute Bytes (SubWord): Replace each byte using
the AES S-Box.
•iii. Add Round Constant (Rcon): XOR the result with a
round-specific constant.
•For other positions:
•XOR the current word with the word N positions earlier.
AES MODES OF OPERATION
AES (Advanced Encryption Standard) employs various modes of operation to securely encrypt data. These
modes define how AES processes data blocks and include:
Quantum computing poses a major threat to traditional encryption algorithms. While AES is still considered safe, research
is ongoing to develop quantum-resistant cryptographic methods.
•Example: Ethereum and Bitcoin wallets use AES-256 to encrypt private keys.
Key Takeaways:
• AES-256 is still secure and widely used in government,
finance, blockchain, and AI.