3
Most read
4
Most read
5
Most read
Directed by: Sina Manavi
What is AES?


AES features:

AES vs. DES


AES vs. RSA

Summary

Q&A
 After Des Cracked, Triple-DES which was slow they
  announced in competition for calling algorithms and
  between 15 algorithms on October 2000 Rijndeal
  which was invented by two Belgians, Joan Daemen,
  Vincent Rijmen. On 2002 Rijndael became AES.



 Rijndael is free in commercial and non-commercial use
 designed simple

 Low memory cost

 High speed algorithm

 The key used to decrypt and encrypt is same

 Cipher text and plain text are same size

 Fast both in Software and Hardware
Aes (advance encryption standard)
AES is a Symmetric block cipher algorithm ,a supersedes of DES.
This cipher is good for encoding and decoding files, documents,
and etc. Reliability and high performance made it distinct
between other methods. On the other hand if you wish to use
AES in communication, because of the Key exchange problem
this problem is solved by using a asymmetric algorithm such as
RSA. Message is encoded by a private key and the receiver
decode it with the public key. Although asymmetric algorithms
are slow, we can use them for exchanging the key and encode
the data with symmetric algorithm,
 DES is really old while AES is relatively new

 DES is breakable while AES is still unbreakable

 DES uses a much smaller key size compared to AES

 DES uses a smaller block size compared to AES

 DES uses a balanced Feistel structure while AES uses
  substitution-permutation
Aes (advance encryption standard)

More Related Content

PDF
4. The Advanced Encryption Standard (AES)
PPT
DES (Data Encryption Standard) pressentation
PDF
AES-Advanced Encryption Standard
PPTX
Advanced encryption standard (aes)
PPTX
Trible data encryption standard (3DES)
PPTX
Hash Function
PPTX
Cryptography
4. The Advanced Encryption Standard (AES)
DES (Data Encryption Standard) pressentation
AES-Advanced Encryption Standard
Advanced encryption standard (aes)
Trible data encryption standard (3DES)
Hash Function
Cryptography

What's hot (20)

PPTX
Classical encryption techniques
PPTX
Ip security
PPT
Cryptography
PPTX
Cryptography.ppt
PPTX
Vigenere cipher
PPTX
Double DES & Triple DES
PPT
Classical cryptography
PPTX
Public Key Cryptography
PPTX
Cryptography & Steganography
PPTX
Steganography
PPTX
Encryption algorithms
PPTX
Cryptography
PPTX
Hash Function
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PPTX
Data Encryption Standard (DES)
PPTX
Transposition Cipher
PDF
2. Stream Ciphers
PPTX
Cryptography
PPT
block ciphers
Classical encryption techniques
Ip security
Cryptography
Cryptography.ppt
Vigenere cipher
Double DES & Triple DES
Classical cryptography
Public Key Cryptography
Cryptography & Steganography
Steganography
Encryption algorithms
Cryptography
Hash Function
Advanced Encryption Standard (AES) Implementaion using Java
Data Encryption Standard (DES)
Transposition Cipher
2. Stream Ciphers
Cryptography
block ciphers
Ad

Viewers also liked (20)

PPT
Secure hashing algorithm
PPTX
Secure Hash Algorithm
PPTX
02 introduction to network security
PPT
Classical Encryption Techniques
PPTX
OSI Security Architecture
PPT
Network Security 1st Lecture
PPT
Types of attacks and threads
PPT
Chapter 3: Block Ciphers and the Data Encryption Standard
PPT
Classical Encryption Techniques in Network Security
PPTX
Computer security threats & prevention
PPT
Network Attacks
PPTX
Different types of attacks in internet
PDF
Network Security & Attacks
PPTX
Digital signature
PPT
Data encryption standard (des)
PPT
PDF
Advanced Encryption Standard (AES)
PPSX
Advanced Encryption Standard (AES)
PPT
Digital signature
Secure hashing algorithm
Secure Hash Algorithm
02 introduction to network security
Classical Encryption Techniques
OSI Security Architecture
Network Security 1st Lecture
Types of attacks and threads
Chapter 3: Block Ciphers and the Data Encryption Standard
Classical Encryption Techniques in Network Security
Computer security threats & prevention
Network Attacks
Different types of attacks in internet
Network Security & Attacks
Digital signature
Data encryption standard (des)
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Digital signature
Ad

Similar to Aes (advance encryption standard) (20)

PPTX
Cryptography
PPTX
Cryptography
PPT
Advanced Encryption Standard presentation slide
PPTX
Information and data security advanced encryption standard (aes)
PPTX
CNS Module 3_AES. in cryptography and network security
PPT
Minor Project- AES Implementation in Verilog
PDF
Advanced Encryption Standard (AES) with Dynamic Substitution Box
PDF
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PDF
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PPTX
694 lecture1aes
PPT
advance encryption standard chapter 5.ppt
PPTX
Information and network security 24 advanced encryption standard aes
PPT
Unit -2.ppt
PPTX
Cryptography
PPT
CR 05 - Advanced Encryption Standard.ppt
PPT
AES.ppt
PPTX
Lecture 05 - 04 Nov 21.pptx
PPT
Unit V network management and security
PPTX
Software EngineeringModule 2 (Complete).pptx
PDF
Advanced Encryption Standard (AES).pdf
Cryptography
Cryptography
Advanced Encryption Standard presentation slide
Information and data security advanced encryption standard (aes)
CNS Module 3_AES. in cryptography and network security
Minor Project- AES Implementation in Verilog
Advanced Encryption Standard (AES) with Dynamic Substitution Box
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
694 lecture1aes
advance encryption standard chapter 5.ppt
Information and network security 24 advanced encryption standard aes
Unit -2.ppt
Cryptography
CR 05 - Advanced Encryption Standard.ppt
AES.ppt
Lecture 05 - 04 Nov 21.pptx
Unit V network management and security
Software EngineeringModule 2 (Complete).pptx
Advanced Encryption Standard (AES).pdf

More from Sina Manavi (10)

PPTX
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
PPTX
EC-Council Hackway Workshop Presentation- Social Media Forensics
PPTX
Password Attack
PPTX
Android Hacking + Pentesting
PPTX
Password Cracking
PPTX
An Introduction on Design and Implementation on BYOD and Mobile Security
PPT
A Brief Introduction in SQL Injection
PPTX
Shannon and 5 good criteria of a good cipher
PPT
Honeypot honeynet
PPTX
Mendeley resentation , Sina Manavi
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
EC-Council Hackway Workshop Presentation- Social Media Forensics
Password Attack
Android Hacking + Pentesting
Password Cracking
An Introduction on Design and Implementation on BYOD and Mobile Security
A Brief Introduction in SQL Injection
Shannon and 5 good criteria of a good cipher
Honeypot honeynet
Mendeley resentation , Sina Manavi

Recently uploaded (20)

PDF
Farming Based Livelihood Systems English Notes
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PDF
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
PDF
Physical education and sports and CWSN notes
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
FYJC - Chemistry textbook - standard 11.
PPTX
Thinking Routines and Learning Engagements.pptx
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PPTX
IT infrastructure and emerging technologies
PDF
African Communication Research: A review
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PDF
Compact First Student's Book Cambridge Official
DOCX
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
PPTX
Macbeth play - analysis .pptx english lit
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
Farming Based Livelihood Systems English Notes
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
Solved Past paper of Pediatric Health Nursing PHN BS Nursing 5th Semester
Physical education and sports and CWSN notes
Power Point PR B.Inggris 12 Ed. 2019.pptx
Chevening Scholarship Application and Interview Preparation Guide
Disorder of Endocrine system (1).pdfyyhyyyy
FYJC - Chemistry textbook - standard 11.
Thinking Routines and Learning Engagements.pptx
ACFE CERTIFICATION TRAINING ON LAW.pptx
IT infrastructure and emerging technologies
African Communication Research: A review
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Nurlina - Urban Planner Portfolio (english ver)
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Compact First Student's Book Cambridge Official
EDUCATIONAL ASSESSMENT ASSIGNMENT SEMESTER MAY 2025.docx
Macbeth play - analysis .pptx english lit
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx

Aes (advance encryption standard)

  • 2. What is AES? AES features: AES vs. DES AES vs. RSA Summary Q&A
  • 3.  After Des Cracked, Triple-DES which was slow they announced in competition for calling algorithms and between 15 algorithms on October 2000 Rijndeal which was invented by two Belgians, Joan Daemen, Vincent Rijmen. On 2002 Rijndael became AES.  Rijndael is free in commercial and non-commercial use
  • 4.  designed simple  Low memory cost  High speed algorithm  The key used to decrypt and encrypt is same  Cipher text and plain text are same size  Fast both in Software and Hardware
  • 6. AES is a Symmetric block cipher algorithm ,a supersedes of DES. This cipher is good for encoding and decoding files, documents, and etc. Reliability and high performance made it distinct between other methods. On the other hand if you wish to use AES in communication, because of the Key exchange problem this problem is solved by using a asymmetric algorithm such as RSA. Message is encoded by a private key and the receiver decode it with the public key. Although asymmetric algorithms are slow, we can use them for exchanging the key and encode the data with symmetric algorithm,
  • 7.  DES is really old while AES is relatively new  DES is breakable while AES is still unbreakable  DES uses a much smaller key size compared to AES  DES uses a smaller block size compared to AES  DES uses a balanced Feistel structure while AES uses substitution-permutation