SlideShare a Scribd company logo
3
Most read
12
Most read
15
Most read
ADVANCED ENCRYPTION STANDARD (AES)
Name: Md Fazle Rabbi
ID:16CSE057
CONTENTS
 What is AES?
 AES features
 Operation of AES
 AES security
WHAT IS AES?
 The Advanced Encryption Standard (AES) is a symmetric
block cipher chosen by the U.S. government to protect
classified information.
 The more popular and widely adopted symmetric encryption
algorithm likely to be encountered nowadays is the Advanced
Encryption Standard (AES).
 It is found at least six time faster than triple DES.
 AES is implemented in software and hardware throughout the
world to encrypt sensitive data.
 It is essential for government computer security, cyber security
and electronic data protection
AES FEATURES
AES algorithm must be a block cipher capable of handling 128-bit
blocks, using keys sized at 128, 192 and 256 bits. Other criteria for
being chosen as the next AES algorithm included the following:
 Security. Competing algorithms were to be judged on their ability to
resist attack -- as compared to other submitted ciphers. Security strength
was to be considered the most important factor in the competition.
 Cost. Intended to be released on a global, nonexclusive and royalty-free
basis, the candidate algorithms were to be evaluated on computational
and memory efficiency.
 Implementation. Factors to be considered included the algorithm's
flexibility, suitability for hardware or software implementation, and
overall simplicity.
OPERATION OF AES
 The number of rounds in AES is variable and depends on
the length of the key. AES uses 10 rounds for 128-bit
keys, 12 rounds for 192-bit keys and 14 rounds for 256-
bit keys. Each of these rounds uses a different 128-bit
round key, which is calculated from the original AES key.
THE SCHEMATIC OF AES STRUCTURE IS GIVEN IN THE FOLLOWING
ILLUSTRATION −
HOW DOES AES ENCRYPTION WORK?
1. Dividing data into blocks
 First, we have to keep in mind that AES is a block cipher.
Unlike stream ciphers, it encrypts data in blocks of
bits instead of bit-by-bit.
 Each of its blocks contains a column of 16 bytes in a layout of
four-by-four. As one byte contains 8 bits, we get 128-bit block
size (16×8=128).
 Thus, the very first step of AES encryption is dividing the
plaintext (text that is not written in code) into these blocks.
 So, let’s choose the text you want to encrypt. For example, it
can be “better late than never”.
 Applying the advanced encryption standard would
turn the beginning of this phrase into the following
block:
2.ADDING ROUND KEY
 This is the very first round of AES encryption. Here, the
algorithm adds the initial key to our phrase, which was
previously turned into a 4×4 block:
+
=
Adding two blocks of text might seem impossible. However, remember that
AES actually uses binary code, and what you now see is just a visual
representation of what is actually happening in the binary language.
ENCRYPTION PROCESS
 Here, we restrict to description of a typical round of
AES encryption. Each round comprise of four sub-
processes. The first round process is depicted
below −
I) BYTE SUBSTITUTION
The 16 input bytes (128-bit) are substituted based
on a predetermined table. The result is a matrix of
four rows and four columns where the data is altered
in a non-linear way to add confusion
II) SHIFT ROWS
Shift Row is carried out in four parts:
 First row is not shifted
 Second row is shifted one (byte) position to the left
 Third row is shifted two positions to the left
 Fourth row is shifted three positions to the left
In the end, a new matrix is formed based on the same 16 bytes.
III)) MIX-COLUMNS
This operation is the most difficult, both to explain and
perform. Each column of the state array is processed
separately to produce a new column. The new
column replaces the old one. The processing involves
a matrix multiplication.
IV) XOR-ROUND KEY
 After the Mix-Columns operation, the Xor-Round Key is very
simple indeed and hardly needs its own name. This operation
simply takes the existing state array, XORs the value of the
appropriate round key, and replaces the state array with the
result.
AES SECURITY
 Security experts maintain that AES is secure when
implemented properly. However, AES encryption keys need
to be protected. Even the most extensive cryptographic
systems can be vulnerable if a hacker gains access to the
encryption key.
 Use of strong passwords, password managers, multifactor
authentication (MFA), firewalls and antivirus software is
critical to enterprise security. Employees should also be
trained in ways to prevent social engineering and phishing
attacks.
THE END

More Related Content

What's hot (20)

PPTX
Topic20 The RC4 Algorithm.pptx
UrjaDhabarde
 
PPTX
Hash Function
Siddharth Srivastava
 
PPTX
Rc4
Amjad Rehman
 
DOCX
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
 
PPTX
MD5 ALGORITHM.pptx
Rajapriya82
 
PPTX
Symmetric encryption and message confidentiality
CAS
 
PPTX
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
PPTX
5. message authentication and hash function
Chirag Patel
 
PDF
Introduction to Cryptography
Seema Goel
 
PPTX
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel
 
PPTX
Symmetric ciphermodel
priyapavi96
 
PDF
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
PDF
Computer Security Lecture 7: RSA
Mohamed Loey
 
PPTX
Secret key cryptography
Prabhat Goel
 
PPTX
RSA Algorithm
Srinadh Muvva
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PPTX
Steganography
Uttam Jain
 
Topic20 The RC4 Algorithm.pptx
UrjaDhabarde
 
Hash Function
Siddharth Srivastava
 
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
 
MD5 ALGORITHM.pptx
Rajapriya82
 
Symmetric encryption and message confidentiality
CAS
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
5. message authentication and hash function
Chirag Patel
 
Introduction to Cryptography
Seema Goel
 
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel
 
Symmetric ciphermodel
priyapavi96
 
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Computer Security Lecture 7: RSA
Mohamed Loey
 
Secret key cryptography
Prabhat Goel
 
RSA Algorithm
Srinadh Muvva
 
Data Encryption Standard (DES)
Haris Ahmed
 
Steganography
Uttam Jain
 

Similar to Topic5 advanced encryption standard (aes) (20)

PPTX
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
PDF
Aes 128 192_256_bits_project_report
sakhi rehman
 
PPTX
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
PDF
Advanced Encryption Standard (AES).pdf
SJDalore1
 
PPTX
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
PPTX
AES algorithm and easy explanation of AES
sanskarpawar2003
 
PPTX
694 lecture1aes
Ankur Human
 
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
PPTX
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
PPTX
Adavanced Encryption Standard in Cryptography
ridhi807156
 
DOCX
Why was aes developed
datastructure_ssvps
 
PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
PPT
advance encryption standard chapter 5.ppt
roueida mohammed
 
PPT
AES.ppt
BincySam2
 
PPTX
Cryptography
Mannat Gill
 
PPT
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
PPT
AES.ppt
ssuser6602e0
 
PPTX
1-aes.pptx
anithachristopher3
 
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
Aes 128 192_256_bits_project_report
sakhi rehman
 
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Advanced Encryption Standard (AES).pdf
SJDalore1
 
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
AES algorithm and easy explanation of AES
sanskarpawar2003
 
694 lecture1aes
Ankur Human
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
Nirav Desai
 
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
Adavanced Encryption Standard in Cryptography
ridhi807156
 
Why was aes developed
datastructure_ssvps
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
advance encryption standard chapter 5.ppt
roueida mohammed
 
AES.ppt
BincySam2
 
Cryptography
Mannat Gill
 
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
AES.ppt
ssuser6602e0
 
1-aes.pptx
anithachristopher3
 
Ad

More from MdFazleRabbi18 (20)

PPTX
5.programmable interval timer 8253
MdFazleRabbi18
 
PPTX
4.programmable dma controller 8257
MdFazleRabbi18
 
PPTX
3.programmable interrupt controller 8259
MdFazleRabbi18
 
PPTX
1.ppi 8255
MdFazleRabbi18
 
PPTX
Topic4 data encryption standard(des)
MdFazleRabbi18
 
PPTX
Topic3 playfain
MdFazleRabbi18
 
PPTX
Topic2 caser hill_cripto
MdFazleRabbi18
 
PPTX
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
PPTX
11. lzw coding
MdFazleRabbi18
 
PPTX
9. hofman coding in DIP
MdFazleRabbi18
 
PPTX
7. image enhancement using spatial filtering
MdFazleRabbi18
 
PPTX
5. gray level transformation
MdFazleRabbi18
 
PPTX
1. steps in image processing
MdFazleRabbi18
 
PPTX
5. convolution and correlation of discrete time signals
MdFazleRabbi18
 
PPTX
4. operations of signals
MdFazleRabbi18
 
PPTX
3. systems
MdFazleRabbi18
 
PPTX
2. classification of signals
MdFazleRabbi18
 
PPTX
1. elementary signals
MdFazleRabbi18
 
PPTX
4. random number and it's generating techniques
MdFazleRabbi18
 
PPTX
3. different types of simulations for appropriate systems
MdFazleRabbi18
 
5.programmable interval timer 8253
MdFazleRabbi18
 
4.programmable dma controller 8257
MdFazleRabbi18
 
3.programmable interrupt controller 8259
MdFazleRabbi18
 
1.ppi 8255
MdFazleRabbi18
 
Topic4 data encryption standard(des)
MdFazleRabbi18
 
Topic3 playfain
MdFazleRabbi18
 
Topic2 caser hill_cripto
MdFazleRabbi18
 
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
11. lzw coding
MdFazleRabbi18
 
9. hofman coding in DIP
MdFazleRabbi18
 
7. image enhancement using spatial filtering
MdFazleRabbi18
 
5. gray level transformation
MdFazleRabbi18
 
1. steps in image processing
MdFazleRabbi18
 
5. convolution and correlation of discrete time signals
MdFazleRabbi18
 
4. operations of signals
MdFazleRabbi18
 
3. systems
MdFazleRabbi18
 
2. classification of signals
MdFazleRabbi18
 
1. elementary signals
MdFazleRabbi18
 
4. random number and it's generating techniques
MdFazleRabbi18
 
3. different types of simulations for appropriate systems
MdFazleRabbi18
 
Ad

Recently uploaded (20)

PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Manage Promotions in Odoo 18 Sales
Celine George
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PDF
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PPTX
BANDHA (BANDAGES) PPT.pptx ayurveda shalya tantra
rakhan78619
 
PDF
1, 2, 3… E MAIS UM CICLO CHEGA AO FIM!.pdf
Colégio Santa Teresinha
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
'' IMPORTANCE OF EXCLUSIVE BREAST FEEDING ''
SHAHEEN SHAIKH
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
community health nursing question paper 2.pdf
Prince kumar
 
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Manage Promotions in Odoo 18 Sales
Celine George
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
Dimensions of Societal Planning in Commonism
StefanMz
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
BANDHA (BANDAGES) PPT.pptx ayurveda shalya tantra
rakhan78619
 
1, 2, 3… E MAIS UM CICLO CHEGA AO FIM!.pdf
Colégio Santa Teresinha
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
IMP NAAC-Reforms-Stakeholder-Consultation-Presentation-on-Draft-Metrics-Unive...
BHARTIWADEKAR
 

Topic5 advanced encryption standard (aes)

  • 1. ADVANCED ENCRYPTION STANDARD (AES) Name: Md Fazle Rabbi ID:16CSE057
  • 2. CONTENTS  What is AES?  AES features  Operation of AES  AES security
  • 3. WHAT IS AES?  The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified information.  The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES).  It is found at least six time faster than triple DES.  AES is implemented in software and hardware throughout the world to encrypt sensitive data.  It is essential for government computer security, cyber security and electronic data protection
  • 4. AES FEATURES AES algorithm must be a block cipher capable of handling 128-bit blocks, using keys sized at 128, 192 and 256 bits. Other criteria for being chosen as the next AES algorithm included the following:  Security. Competing algorithms were to be judged on their ability to resist attack -- as compared to other submitted ciphers. Security strength was to be considered the most important factor in the competition.  Cost. Intended to be released on a global, nonexclusive and royalty-free basis, the candidate algorithms were to be evaluated on computational and memory efficiency.  Implementation. Factors to be considered included the algorithm's flexibility, suitability for hardware or software implementation, and overall simplicity.
  • 5. OPERATION OF AES  The number of rounds in AES is variable and depends on the length of the key. AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256- bit keys. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key.
  • 6. THE SCHEMATIC OF AES STRUCTURE IS GIVEN IN THE FOLLOWING ILLUSTRATION −
  • 7. HOW DOES AES ENCRYPTION WORK? 1. Dividing data into blocks  First, we have to keep in mind that AES is a block cipher. Unlike stream ciphers, it encrypts data in blocks of bits instead of bit-by-bit.  Each of its blocks contains a column of 16 bytes in a layout of four-by-four. As one byte contains 8 bits, we get 128-bit block size (16×8=128).  Thus, the very first step of AES encryption is dividing the plaintext (text that is not written in code) into these blocks.  So, let’s choose the text you want to encrypt. For example, it can be “better late than never”.
  • 8.  Applying the advanced encryption standard would turn the beginning of this phrase into the following block:
  • 9. 2.ADDING ROUND KEY  This is the very first round of AES encryption. Here, the algorithm adds the initial key to our phrase, which was previously turned into a 4×4 block: + = Adding two blocks of text might seem impossible. However, remember that AES actually uses binary code, and what you now see is just a visual representation of what is actually happening in the binary language.
  • 10. ENCRYPTION PROCESS  Here, we restrict to description of a typical round of AES encryption. Each round comprise of four sub- processes. The first round process is depicted below −
  • 11. I) BYTE SUBSTITUTION The 16 input bytes (128-bit) are substituted based on a predetermined table. The result is a matrix of four rows and four columns where the data is altered in a non-linear way to add confusion
  • 12. II) SHIFT ROWS Shift Row is carried out in four parts:  First row is not shifted  Second row is shifted one (byte) position to the left  Third row is shifted two positions to the left  Fourth row is shifted three positions to the left In the end, a new matrix is formed based on the same 16 bytes.
  • 13. III)) MIX-COLUMNS This operation is the most difficult, both to explain and perform. Each column of the state array is processed separately to produce a new column. The new column replaces the old one. The processing involves a matrix multiplication.
  • 14. IV) XOR-ROUND KEY  After the Mix-Columns operation, the Xor-Round Key is very simple indeed and hardly needs its own name. This operation simply takes the existing state array, XORs the value of the appropriate round key, and replaces the state array with the result.
  • 15. AES SECURITY  Security experts maintain that AES is secure when implemented properly. However, AES encryption keys need to be protected. Even the most extensive cryptographic systems can be vulnerable if a hacker gains access to the encryption key.  Use of strong passwords, password managers, multifactor authentication (MFA), firewalls and antivirus software is critical to enterprise security. Employees should also be trained in ways to prevent social engineering and phishing attacks.