Information and data security advanced encryption standard (aes)
Origins
• The Advanced Encryption Standard (AES) is the
block cipher algorithm chosen by the National
Institute of Standards and Technology
(NIST) It supersedes the Data Encryption
Standard (DES).
• Rijndael is an iterated block cipher. Therefore, the
encryption or decryption of a block of data is
accomplished by the iteration.
Cont. Origins
• Rijndael was evaluated based on its security, its
cost and its algorithm and implementation
characteristics. The primary focus of the analysis
was on the cipher's security, but the choice of
Rijndael was based on its simple algorithm and
implementation characteristics. There were
several candidate algorithms but Rijndael was
selected because based on the analyses, it had the
best combination of security, performance,
efficiency, ease of implementation and flexibility.
The AES Cipher - Rijndael
• designed by Belgium academics Dr.Joan
Daemen and Dr.Vincent Rijmen.
• designed to be:
• resistant against known attacks
• speed and code compactness on many CPUs
• design simplicity
• AES is block cipher with ablock length of 128
bits.
• AES allows for three different key lengths:
128 , 192 ,or 256 bits.
V. Rijmen
J. Daemen
AES
Encryption
Process
AES Structure
• data block of 4 columns of 4 bytes is state
• key length: 10 rounds for a 16-byte key, 12 rounds for a
24-byte key, and 14 rounds for a 32-byte key.
• state undergoes:
• byte substitution (S-box used on every byte).
• shift rows (permute bytes between groups/columns).
• mix columns (subs using matrix multiply of groups).
• add round key (XOR state with key material).
Data Unit
AES Structure
Some Comments on AES
1. an iterative rather than feistel cipher.
2. key expanded into array of 32-bit words.
3. 4 different stages are used.
4. has a simple structure.
5. only AddRoundKey uses key.
6. AddRoundKey a form of Vernam cipher.
7. each stage is easily reversible.
8. decryption uses keys in reverse order.
9. decryption does recover plaintext.
10.final round has only 3 stages
Substitute Bytes
• a simple substitution of each byte.
• uses one table of 16x16 bytes called an s-box.
• each byte of state is replaced by byte indexed by
row (left 4-bits) & column (right 4-bits).
• eg. byte {95} is replaced by byte in row 9 column 5.
• which has value {2A}.
• S-box constructed using defined transformation
of values in GF(28).
• designed to be resistant to all known attacks.
Substitute Bytes
Example of S-box
Inverse s-box
Shift Rows
• a circular byte shift in each row
• 1st row is unchanged
• 2nd row does 1 byte circular shift to left
• 3rd row does 2 byte circular shift to left
• 4th row does 3 byte circular shift to left
• decrypt does shifts to right
• this step permutes bytes between the
columns
Shift Rows
Mix Columns
• each column is processed separately
• each byte is replaced by a value dependent
on all 4 bytes in the column
Constant matrix Old matrix New matrix
Mix Columns
Mix Columns Example
AES Arithmetic
• uses arithmetic in the finite field GF(28)
• with irreducible polynomial
m(x) = 𝑥8+ 𝑥4 + 𝑥3 + 𝑥 + 1
which is (100011011) or {11b}
• e.g.
{02} • {87}=
(1 0000 1110) xor (1 0001 1011) = (0001 0101)
Add Round Key
• The strength of this algorithm at this stage.
• XOR state with 128-bits of the round key.
• inverse for decryption identical.
• designed to be as simple as possible.
• requires other stages for complexity / security.
AES Key Expansion
• takes 128-bit (16-byte) key and expands into
array of 44, 32-bit words.
• start by copying key into first 4 words.
• then loop creating words that depend on values
in previous & 4 places back.
• in 3 of 4 cases just XOR these together.
• 1st word in 4 has rotate + S-box + XOR round constant on previous,
before XOR 4th back.
AES Key Expansion
Shift 1byte
to bottom
AES Key Expansion
Key Expansion Rationale
• designed to resist known attacks
• design criteria included:
• knowing part key insufficient to find many more.
• invertible transformation.
• fast on wide range of processor.
• use round constants to eliminate symmetries.
• diffuse key bits into round keys.
• enough non-linearity to hinder analysis.
• simplicity of description.
AES Decryption
• AES decryption is not identical to encryption
since steps done in reverse.
• but can define an equivalent inverse cipher with
steps as for encryption.
• but using inverses of each step.
• with a different key schedule.
• works since result is unchanged when:
• swap byte substitution & shift rows.
• swap mix columns & add round key.
AES
Decryption
Uses AES
Since AES is an encryption algorithm therefore has many
uses , which includes protecting the user via the Internet for
up to protect and ensure the data in the banks and
laboratories as that for -AES uses in the military , that is
within the AES useful in all these applications is the lack of a
way effective for breaking it , as some months programs and
protocols based on AES resistance to electronic attacks ,
including :
• AES is used in programs (WINZIP) in the event that the user request
evidence after encryption compressed.
• used in the TLS protocol , a protocol to establish a secure connection.
• him as well as use in the IPsec protocol , a protocol to ensure safety in
connections that are powered by IP via the Internet.

More Related Content

PDF
Computer Security Lecture 7: RSA
PPTX
Two fish cipher
PPTX
Advanced encryption standard (aes)
PPTX
Cryptographic algorithms
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Aes (advance encryption standard)
PPTX
AES KEY EXPANSION .pptx
Computer Security Lecture 7: RSA
Two fish cipher
Advanced encryption standard (aes)
Cryptographic algorithms
Block Ciphers and the Data Encryption Standard
Aes (advance encryption standard)
AES KEY EXPANSION .pptx

What's hot (20)

PPT
Ch03 block-cipher-and-data-encryption-standard
PPT
block ciphers
PPT
Cryptography and Network Security William Stallings Lawrie Brown
DOCX
What is AES? Advanced Encryption Standards
PPT
AES Cryptosystem
PDF
Elliptic curve cryptography
PPTX
RC 4
PPT
Elliptical curve cryptography
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
PPTX
Internet Key Exchange Protocol
PPTX
Cryptography.ppt
PPT
Fundamentals of cryptography
PPTX
Idea(international data encryption algorithm)
PPTX
Homomorphic encryption
PDF
symmetric key encryption algorithms
PPTX
Rsa Crptosystem
PDF
RSA ALGORITHM
Ch03 block-cipher-and-data-encryption-standard
block ciphers
Cryptography and Network Security William Stallings Lawrie Brown
What is AES? Advanced Encryption Standards
AES Cryptosystem
Elliptic curve cryptography
RC 4
Elliptical curve cryptography
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Internet Key Exchange Protocol
Cryptography.ppt
Fundamentals of cryptography
Idea(international data encryption algorithm)
Homomorphic encryption
symmetric key encryption algorithms
Rsa Crptosystem
RSA ALGORITHM
Ad

Similar to Information and data security advanced encryption standard (aes) (20)

PPT
AES.ppt
PPTX
Cryptography
PPTX
Lecture # 007 AES.pptx
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
PPT
Cryptography and network security AES ALG
PPTX
Information and network security 24 advanced encryption standard aes
PPTX
CNS Module 3_AES. in cryptography and network security
PPT
Unit -2.ppt
PPTX
694 lecture1aes
PPTX
Software EngineeringModule 2 (Complete).pptx
PPTX
Information and network security 26 aes decryption and implementational issues
PDF
Advanced Encryption Standard (AES).pdf
PPTX
Encryption techniqudgfhgvj,hbkes (2).pptx
PDF
modified aes algorithm using multiple s-boxes
PDF
Modified aes algorithm using multiple s boxes
PPT
advance encryption standard chapter 5.ppt
PPT
CR 05 - Advanced Encryption Standard.ppt
PPT
AES.ppt
AES.ppt
Cryptography
Lecture # 007 AES.pptx
Unit 2_AES_AES_Structure_Encryption_Example.pdf
Cryptography and network security AES ALG
Information and network security 24 advanced encryption standard aes
CNS Module 3_AES. in cryptography and network security
Unit -2.ppt
694 lecture1aes
Software EngineeringModule 2 (Complete).pptx
Information and network security 26 aes decryption and implementational issues
Advanced Encryption Standard (AES).pdf
Encryption techniqudgfhgvj,hbkes (2).pptx
modified aes algorithm using multiple s-boxes
Modified aes algorithm using multiple s boxes
advance encryption standard chapter 5.ppt
CR 05 - Advanced Encryption Standard.ppt
AES.ppt
Ad

More from Mazin Alwaaly (20)

PPTX
Pattern recognition voice biometrics
PPTX
Pattern recognition palm print authentication system
PPTX
Pattern recognition on line signature
PPTX
Pattern recognition multi biometrics using face and ear
PPTX
Pattern recognition IRIS recognition
PPT
Pattern recognition hand vascular pattern recognition
PPTX
Pattern recognition Hand Geometry
PPTX
Pattern recognition forensic dental identification
PPT
Pattern recognition fingerprints
PPTX
Pattern recognition facial recognition
PPTX
Pattern recognition ear as a biometric
PPTX
Pattern recognition 3d face recognition
PPTX
Multimedia multimedia over wireless and mobile networks
PPT
Multimedia network services and protocols for multimedia communications
PPTX
Multimedia content based retrieval in digital libraries
PPTX
Multimedia lossy compression algorithms
PPTX
Multimedia lossless compression algorithms
PPTX
Multimedia basic video compression techniques
PPT
Multimedia image compression standards
PPTX
Multimedia fundamental concepts in video
Pattern recognition voice biometrics
Pattern recognition palm print authentication system
Pattern recognition on line signature
Pattern recognition multi biometrics using face and ear
Pattern recognition IRIS recognition
Pattern recognition hand vascular pattern recognition
Pattern recognition Hand Geometry
Pattern recognition forensic dental identification
Pattern recognition fingerprints
Pattern recognition facial recognition
Pattern recognition ear as a biometric
Pattern recognition 3d face recognition
Multimedia multimedia over wireless and mobile networks
Multimedia network services and protocols for multimedia communications
Multimedia content based retrieval in digital libraries
Multimedia lossy compression algorithms
Multimedia lossless compression algorithms
Multimedia basic video compression techniques
Multimedia image compression standards
Multimedia fundamental concepts in video

Recently uploaded (20)

PDF
chemical-kinetics-Basics for Btech .pdf
PDF
Physics of Bitcoin #30 Perrenod Santostasi.pdf
PPTX
flavonoids/ Secondary Metabolites_BCH 314-2025.pptx
PPTX
Bacterial and protozoal infections in pregnancy.pptx
PPT
INSTRUMENTAL ANALYSIS (Electrochemical processes )-1.ppt
PPTX
Earth-and-Life-Pieces-of-Evidence-Q2.pptx
PDF
Microplastics: Environmental Impact and Remediation Strategies
PPTX
Introduction of Plant Ecology and Diversity Conservation
PDF
Thyroid Hormone by Iqra Nasir detail.pdf
PDF
CHEM - GOC general organic chemistry.ppt
PPT
Chapter 6 Introductory course Biology Camp
PPT
what do you want to know about myeloprolifritive disorders .ppt
PPTX
23ME402 Materials and Metallurgy- PPT.pptx
PDF
FSNRD Proceeding Finalized on May 11 2021.pdf
PDF
SOCIAL PSYCHOLOGY chapter 1-what is social psychology and its definition
PPT
dcs-computertraningbasics-170826004702.ppt
PPT
Chapter 52 introductory biology course Camp
PDF
final prehhhejjehehhehehehebesentation.pdf
PDF
Unit Four Lesson in Carbohydrates chemistry
PPTX
Chromosomal Aberrations Dr. Thirunahari Ugandhar.pptx
chemical-kinetics-Basics for Btech .pdf
Physics of Bitcoin #30 Perrenod Santostasi.pdf
flavonoids/ Secondary Metabolites_BCH 314-2025.pptx
Bacterial and protozoal infections in pregnancy.pptx
INSTRUMENTAL ANALYSIS (Electrochemical processes )-1.ppt
Earth-and-Life-Pieces-of-Evidence-Q2.pptx
Microplastics: Environmental Impact and Remediation Strategies
Introduction of Plant Ecology and Diversity Conservation
Thyroid Hormone by Iqra Nasir detail.pdf
CHEM - GOC general organic chemistry.ppt
Chapter 6 Introductory course Biology Camp
what do you want to know about myeloprolifritive disorders .ppt
23ME402 Materials and Metallurgy- PPT.pptx
FSNRD Proceeding Finalized on May 11 2021.pdf
SOCIAL PSYCHOLOGY chapter 1-what is social psychology and its definition
dcs-computertraningbasics-170826004702.ppt
Chapter 52 introductory biology course Camp
final prehhhejjehehhehehehebesentation.pdf
Unit Four Lesson in Carbohydrates chemistry
Chromosomal Aberrations Dr. Thirunahari Ugandhar.pptx

Information and data security advanced encryption standard (aes)

  • 2. Origins • The Advanced Encryption Standard (AES) is the block cipher algorithm chosen by the National Institute of Standards and Technology (NIST) It supersedes the Data Encryption Standard (DES). • Rijndael is an iterated block cipher. Therefore, the encryption or decryption of a block of data is accomplished by the iteration.
  • 3. Cont. Origins • Rijndael was evaluated based on its security, its cost and its algorithm and implementation characteristics. The primary focus of the analysis was on the cipher's security, but the choice of Rijndael was based on its simple algorithm and implementation characteristics. There were several candidate algorithms but Rijndael was selected because based on the analyses, it had the best combination of security, performance, efficiency, ease of implementation and flexibility.
  • 4. The AES Cipher - Rijndael • designed by Belgium academics Dr.Joan Daemen and Dr.Vincent Rijmen. • designed to be: • resistant against known attacks • speed and code compactness on many CPUs • design simplicity • AES is block cipher with ablock length of 128 bits. • AES allows for three different key lengths: 128 , 192 ,or 256 bits. V. Rijmen J. Daemen
  • 6. AES Structure • data block of 4 columns of 4 bytes is state • key length: 10 rounds for a 16-byte key, 12 rounds for a 24-byte key, and 14 rounds for a 32-byte key. • state undergoes: • byte substitution (S-box used on every byte). • shift rows (permute bytes between groups/columns). • mix columns (subs using matrix multiply of groups). • add round key (XOR state with key material).
  • 9. Some Comments on AES 1. an iterative rather than feistel cipher. 2. key expanded into array of 32-bit words. 3. 4 different stages are used. 4. has a simple structure. 5. only AddRoundKey uses key. 6. AddRoundKey a form of Vernam cipher. 7. each stage is easily reversible. 8. decryption uses keys in reverse order. 9. decryption does recover plaintext. 10.final round has only 3 stages
  • 10. Substitute Bytes • a simple substitution of each byte. • uses one table of 16x16 bytes called an s-box. • each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits). • eg. byte {95} is replaced by byte in row 9 column 5. • which has value {2A}. • S-box constructed using defined transformation of values in GF(28). • designed to be resistant to all known attacks.
  • 14. Shift Rows • a circular byte shift in each row • 1st row is unchanged • 2nd row does 1 byte circular shift to left • 3rd row does 2 byte circular shift to left • 4th row does 3 byte circular shift to left • decrypt does shifts to right • this step permutes bytes between the columns
  • 16. Mix Columns • each column is processed separately • each byte is replaced by a value dependent on all 4 bytes in the column Constant matrix Old matrix New matrix
  • 19. AES Arithmetic • uses arithmetic in the finite field GF(28) • with irreducible polynomial m(x) = 𝑥8+ 𝑥4 + 𝑥3 + 𝑥 + 1 which is (100011011) or {11b} • e.g. {02} • {87}= (1 0000 1110) xor (1 0001 1011) = (0001 0101)
  • 20. Add Round Key • The strength of this algorithm at this stage. • XOR state with 128-bits of the round key. • inverse for decryption identical. • designed to be as simple as possible. • requires other stages for complexity / security.
  • 21. AES Key Expansion • takes 128-bit (16-byte) key and expands into array of 44, 32-bit words. • start by copying key into first 4 words. • then loop creating words that depend on values in previous & 4 places back. • in 3 of 4 cases just XOR these together. • 1st word in 4 has rotate + S-box + XOR round constant on previous, before XOR 4th back.
  • 22. AES Key Expansion Shift 1byte to bottom
  • 24. Key Expansion Rationale • designed to resist known attacks • design criteria included: • knowing part key insufficient to find many more. • invertible transformation. • fast on wide range of processor. • use round constants to eliminate symmetries. • diffuse key bits into round keys. • enough non-linearity to hinder analysis. • simplicity of description.
  • 25. AES Decryption • AES decryption is not identical to encryption since steps done in reverse. • but can define an equivalent inverse cipher with steps as for encryption. • but using inverses of each step. • with a different key schedule. • works since result is unchanged when: • swap byte substitution & shift rows. • swap mix columns & add round key.
  • 27. Uses AES Since AES is an encryption algorithm therefore has many uses , which includes protecting the user via the Internet for up to protect and ensure the data in the banks and laboratories as that for -AES uses in the military , that is within the AES useful in all these applications is the lack of a way effective for breaking it , as some months programs and protocols based on AES resistance to electronic attacks , including : • AES is used in programs (WINZIP) in the event that the user request evidence after encryption compressed. • used in the TLS protocol , a protocol to establish a secure connection. • him as well as use in the IPsec protocol , a protocol to ensure safety in connections that are powered by IP via the Internet.