SlideShare a Scribd company logo
DR. P.U.ANITHA
1
Block Cipher
The Advanced Encryption Standard (AES), also called Rijndael, is a symmetric block cipher
with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. It was
published by NIST (National Institute of Standards and Technology) in 2001. Here, we
assume a key length of 128 bits, which is likely to be the one most commonly
implemented.
DR. P.U.ANITHA
2
AES Block Cipher
The AES Algorithm:
 AES operates on a 4 × 4 column-wise order array of bytes, called the state. For
instance, if there are 16 bytes, these bytes are represented as this two-dimensional
array:
 The key size used for an AES cipher specifies the number of transformation rounds that
convert the plaintext into the ciphertext . The number of rounds are as follows:
10 rounds for 128-bit keys.
12 rounds for 192-bit keys.
14 rounds for 256-bit keys.
 Each round consists of several processing steps, including one that depends on the
encryption key itself. A set of reverse rounds are applied to transform ciphertext back
into the original plaintext using the same encryption key.
DR. P.U.ANITHA
3
AES Block Cipher
The AES Encryption Algorithm:
 The AES algorithm can be broken into three phases: the initial round, the main rounds,
and the final round. All of the phases use the same sub-operations in different
combinations as follows:
Initial Round
AddRoundKey
Main Rounds (1,2…Nr-1)
SubBytes
ShiftRows
MixColumns
AddRoundKey
Final Round (Nr)
SubBytes
ShiftRows
AddRoundKey
Note that in the above figure, KeyExpansion: round keys are derived from the cipher key
using key expansion algorithm. AES requires a separate 128-bit round key block for each
round plus one more.
DR. P.U.ANITHA
4
AES Block Cipher
AddRoundKey: In this operation, the 128 bits of State are bitwise XORed with the 128
bits of the round key. Here is an example where the first matrix is State, and the second
matrix is the round key.
e.g.
=

DR. P.U.ANITHA
5
AES Block Cipher
SubBytes: A nonlinear substitution step where each entry (byte) of the current state
matrix is substituted by a corresponding entry in the AES S-Box. For instance: byte (6E) is
substituted by the entry of the S-Box in row 6 and column E, i.e., by (9F). (The byte input is
broken into two 4-bit halves. The first half determines the row and the second half
determines the column).
e.g.:
state =  S_box(State) =
DR. P.U.ANITHA
6
AES Encryption Cipher
ShiftRows: A transposition step where the four rows of the state are shifted cyclically to
the left by offsets of 0, 1, 2, and 3.
e.g.:
e.g.:

DR. P.U.ANITHA
7
AES Block Cipher
MixColumns: a linear mixing operation which multiplies fixed matrix against current
State Matrix:
Unlike standard matrix multiplication, MixColumns performs matrix multiplication as per
Galois Field (28).
e.g.:
DR. P.U.ANITHA
8
AES Block Cipher
The AES Decryption Algorithm:
 AddRoundKey:
Add Roundkey transformation is identical to the forward add round key transformation,
because the XOR operation is its own inverse.
 Inverse SubBytes:
This operation can be performed using the inverse S-Box. It is read identically to the S-Box
matrix.
 InvShiftRows:
Inverse Shift Rows performs the circular shifts in the opposite direction for each of the last
three rows, with a one-byte circular right shift for the second row, and so on.
 InvMixColumns:
The inverse mix column transformation is defined by the following matrix multiplication in
Galois Field (28):

More Related Content

PPTX
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
PPTX
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
PPT
advance encryption standard chapter 5.ppt
roueida mohammed
 
PPTX
694 lecture1aes
Ankur Human
 
PDF
Renas Rajab Asaad
Renas Rekany
 
PPT
AES.ppt
BincySam2
 
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
advance encryption standard chapter 5.ppt
roueida mohammed
 
694 lecture1aes
Ankur Human
 
Renas Rajab Asaad
Renas Rekany
 
AES.ppt
BincySam2
 

Similar to 1-aes.pptx (20)

PPT
Advanced Encryption System - Network and Security.ppt
VimalAadhithan
 
PPTX
Cryptography
Mannat Gill
 
PPTX
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
PDF
Aes 128 192_256_bits_project_report
sakhi rehman
 
PPT
AES.ppt
ssuser6602e0
 
PPT
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
PDF
Advanced Encryption Standard (AES).pdf
SJDalore1
 
PDF
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
PDF
AES by example
Shiraz316
 
PPTX
Topic5 advanced encryption standard (aes)
MdFazleRabbi18
 
PPT
Chapter 5 module 3
daneshwarihatti
 
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
KanchanPatil34
 
PDF
modified aes algorithm using multiple s-boxes
chutinhha
 
PDF
Modified aes algorithm using multiple s boxes
chuxuantinh
 
PPTX
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
PDF
Advanced Encryption Standard Latex Beamer Class Presentation
Naimur Rahman
 
PDF
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
PDF
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
Advanced Encryption System - Network and Security.ppt
VimalAadhithan
 
Cryptography
Mannat Gill
 
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
Aes 128 192_256_bits_project_report
sakhi rehman
 
AES.ppt
ssuser6602e0
 
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
Advanced Encryption Standard (AES).pdf
SJDalore1
 
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
AES by example
Shiraz316
 
Topic5 advanced encryption standard (aes)
MdFazleRabbi18
 
Chapter 5 module 3
daneshwarihatti
 
Unit 2_AES_AES_Structure_Encryption_Example.pdf
KanchanPatil34
 
modified aes algorithm using multiple s-boxes
chutinhha
 
Modified aes algorithm using multiple s boxes
chuxuantinh
 
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
Advanced Encryption Standard Latex Beamer Class Presentation
Naimur Rahman
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
A VHDL Implemetation of the Advanced Encryption Standard-Rijndael.pdf
RamRaja15
 
AES-Advanced Encryption Standard
Prince Rachit
 
Ad

Recently uploaded (20)

PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
FSSAI (Food Safety and Standards Authority of India) & FDA (Food and Drug Adm...
Dr. Paindla Jyothirmai
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Trends in pediatric nursing .pptx
AneetaSharma15
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
FSSAI (Food Safety and Standards Authority of India) & FDA (Food and Drug Adm...
Dr. Paindla Jyothirmai
 
CDH. pptx
AneetaSharma15
 
Trends in pediatric nursing .pptx
AneetaSharma15
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Ad

1-aes.pptx

  • 1. DR. P.U.ANITHA 1 Block Cipher The Advanced Encryption Standard (AES), also called Rijndael, is a symmetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. It was published by NIST (National Institute of Standards and Technology) in 2001. Here, we assume a key length of 128 bits, which is likely to be the one most commonly implemented.
  • 2. DR. P.U.ANITHA 2 AES Block Cipher The AES Algorithm:  AES operates on a 4 × 4 column-wise order array of bytes, called the state. For instance, if there are 16 bytes, these bytes are represented as this two-dimensional array:  The key size used for an AES cipher specifies the number of transformation rounds that convert the plaintext into the ciphertext . The number of rounds are as follows: 10 rounds for 128-bit keys. 12 rounds for 192-bit keys. 14 rounds for 256-bit keys.  Each round consists of several processing steps, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key.
  • 3. DR. P.U.ANITHA 3 AES Block Cipher The AES Encryption Algorithm:  The AES algorithm can be broken into three phases: the initial round, the main rounds, and the final round. All of the phases use the same sub-operations in different combinations as follows: Initial Round AddRoundKey Main Rounds (1,2…Nr-1) SubBytes ShiftRows MixColumns AddRoundKey Final Round (Nr) SubBytes ShiftRows AddRoundKey Note that in the above figure, KeyExpansion: round keys are derived from the cipher key using key expansion algorithm. AES requires a separate 128-bit round key block for each round plus one more.
  • 4. DR. P.U.ANITHA 4 AES Block Cipher AddRoundKey: In this operation, the 128 bits of State are bitwise XORed with the 128 bits of the round key. Here is an example where the first matrix is State, and the second matrix is the round key. e.g. = 
  • 5. DR. P.U.ANITHA 5 AES Block Cipher SubBytes: A nonlinear substitution step where each entry (byte) of the current state matrix is substituted by a corresponding entry in the AES S-Box. For instance: byte (6E) is substituted by the entry of the S-Box in row 6 and column E, i.e., by (9F). (The byte input is broken into two 4-bit halves. The first half determines the row and the second half determines the column). e.g.: state =  S_box(State) =
  • 6. DR. P.U.ANITHA 6 AES Encryption Cipher ShiftRows: A transposition step where the four rows of the state are shifted cyclically to the left by offsets of 0, 1, 2, and 3. e.g.: e.g.: 
  • 7. DR. P.U.ANITHA 7 AES Block Cipher MixColumns: a linear mixing operation which multiplies fixed matrix against current State Matrix: Unlike standard matrix multiplication, MixColumns performs matrix multiplication as per Galois Field (28). e.g.:
  • 8. DR. P.U.ANITHA 8 AES Block Cipher The AES Decryption Algorithm:  AddRoundKey: Add Roundkey transformation is identical to the forward add round key transformation, because the XOR operation is its own inverse.  Inverse SubBytes: This operation can be performed using the inverse S-Box. It is read identically to the S-Box matrix.  InvShiftRows: Inverse Shift Rows performs the circular shifts in the opposite direction for each of the last three rows, with a one-byte circular right shift for the second row, and so on.  InvMixColumns: The inverse mix column transformation is defined by the following matrix multiplication in Galois Field (28):