0% found this document useful (0 votes)
3 views

Topic16 Advanced Encryption Standard

The document outlines the Advanced Encryption Standard (AES), which was established by NIST in 2001 as a symmetric block cipher with a block length of 128 bits and key lengths of 128, 192, or 256 bits. It highlights the limitations of 3DES and the criteria for AES's selection, including security and efficiency. AES operates through four stages of encryption and decryption, utilizing a unique structure that differs from traditional Feistel ciphers.

Uploaded by

shahwaruddin546
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Topic16 Advanced Encryption Standard

The document outlines the Advanced Encryption Standard (AES), which was established by NIST in 2001 as a symmetric block cipher with a block length of 128 bits and key lengths of 128, 192, or 256 bits. It highlights the limitations of 3DES and the criteria for AES's selection, including security and efficiency. AES operates through four stages of encryption and decryption, utilizing a unique structure that differs from traditional Feistel ciphers.

Uploaded by

shahwaruddin546
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Advanced Encryption Standard

Network Security

1
Advanced Encryption Standard
Objectives of the
Topic
• After completing this
topic, a student will
be able to
– describe Advanced
Encryption
Standard.

2
Advanced Encryption Standard
Figures and material
in this topic have
been
• adapted from
“Network Security
Essentials:
Applications and
Standards”, 2014, by
William Stallings.

3
Advanced Encryption Standard
• The principal
drawbacks of 3DES:
• 1.It has three times as
many rounds as DEA
and is correspondingly
slower.
• 2.Both DEA and 3DES
use a 64-bit block size.
• Its not a reasonable
candidate for long
term use.
4
Advanced Encryption Standard
• In 1997 NIST issued a
call for proposals for a
new AES:
• 1.Should have a
security strength
equal to or better
than 3DES and
significantly improved
efficiency.

5
Advanced Encryption Standard
• 2. Must be a
symmetric block
cipher with a block
length of 128 bits and
support for key
lengths of 128, 192,
and 256 bits.

6
Advanced Encryption Standard
• 3. Evaluation criteria
included security,
computational
efficiency, memory
requirements,
hardware and
software suitability,
and flexibility

7
Advanced Encryption Standard
• NIST selected Rijndael
as the proposed AES
algorithm
• Developers were two
cryptographers from
Belgium: Dr. Joan
Daemen and Dr.
Vincent Rijmen
• published as a final
standard (FIPS PUB
197) in 2001.
8
Advanced Encryption Standard
• AES uses a block
length of 128 bits and
a key length that can
be 128, 192, or 256
bits.
• For our discussion, we
assume 128 bits in
this topic.

9
Advanced Encryption Standard
• The input to the
encryption and
decryption algorithms
is a single 128-bit
block.
• In FIPS PUB 197, this
block is depicted as a
square matrix of
bytes.

10
Advanced Encryption Standard
• The block is copied
into the State array,
which is modified at
each stage of
encryption or
decryption.
• After the final stage,
State is copied to an
output matrix.

11
Advanced Encryption Standard
• Similarly, the 128-bit
key is depicted as a
square matrix of
bytes.
• This key is then
expanded into an
array of key schedule
words: Each word is
four bytes and total
key schedule is 44
words for 128-bit key.
12
Advanced Encryption Standard
• Ordering of bytes in a
matrix is by column.
• First four bytes of a
128-bit plaintext input
to the encryption
cipher occupy the first
column of the in
matrix, the second
four bytes occupy the
second column, and
so on.
13
Advanced Encryption Standard
• Similarly, the first four
bytes of the expanded
key, which form a
word, occupy the first
column of the w
matrix.

14
Advanced Encryption Standard
AES’s Working:
• Four different stages
are used, one of
permutation and
three of substitution

15
Advanced Encryption Standard
• Substitute bytes:
Uses a table, referred
to as an S-box, to
perform a byte-by-
byte substitution of
the block.
• Shift rows: A simple
permutation that is
performed row by
row.

16
Advanced Encryption Standard
• Mix columns: A
substitution that
alters each byte in a
column as a function
of all of the bytes in
the column.
• Add round key: A
simple bitwise XOR of
the current block with
a portion of the
expanded key.
17
Advanced Encryption Standard

18
Advanced Encryption Standard

Internal Details of a
round.

19
Advanced Encryption Standard

20
Advanced Encryption Standard
Some comments:
• AES structure is not a
Feistel structure.
• For both encryption
and decryption, the
cipher begins with an
Add Round Key stage,
followed by nine
rounds that each
includes all four stages

21
Advanced Encryption Standard
• Each stage is easily
reversible.
• The final round of
both encryption and
decryption consists of
only three stages.
• The decryption
algorithm is not
identical to the
encryption algorithm.

22
Advanced Encryption Standard
• The decryption
algorithm makes use
of the expanded key
in reverse order.

End

23

You might also like