SlideShare a Scribd company logo
ADITYA ENGINEERING COLLEGE (A)
COURSE:CRYPTOGRAPHY AND NETWORK SECURITY
TOPIC:Advanced Encryption Standard Algorithm
By
P.Sri Latha
Sr. Assistant Professor
Dept of Computer Science & Engineering
Aditya Engineering College(A)
Surampalem.
Aditya Engineering College (A)
Cryptography & Network
Security
At the end of this class student will be able to:
Implement Advanced Encryption Standard Algorithm for transfering
data securely over a network.
Thursday, March 28, 2024
P.Srilatha
Learning Outcomes
Aditya Engineering College (A)
Cryptography & Network
Security
The Advanced Encryption Standard (AES) was published by the National
Institute of Standards and Technology (NIST) in 2001.
AES is a block cipher intended to replace DES for commercial applications.
It uses a 128-bit block size and a key size of 128, 192, or 256 bits.
AES does not use a Feistel structure. Instead, each full round consists of
four separate functions:
1. byte substitution
2. permutation
3. arithmetic operations over a finite field
4. XOR with a key.
Thursday, March 28, 2024
P.Srilatha
Advanced Encryption Standard (AES)
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
AES Parameters
Key size(words/bytes/bits) 4/16/128 6/24/192 8/32/256
Plaintext block Size
(words/bytes/bits) 4/16/128 4/16/192 4/16/256
Number of rounds 10 12 14
Round Key size (words/bytes/bits) 4/16/128 4/16/192 4/16/256
Expanded key size (words/bytes) 44/176 52/208 60/240
Aditya Engineering College (A)
Cryptography & Network
Security
The algorithm begins with an Add round key stage followed by 9
rounds of four stages and a tenth round of 3 stages.
The four stages are as follows:
1. Substitute bytes
2. Shift rows
3. Mix Columns
4. Add Round Key
The tenth round simply omits the Mix Columns stage.
Thursday, March 28, 2024
P.Srilatha
AES-Working of Single Round
Aditya Engineering College (A)
Cryptography & Network
Security
The first 9 rounds of the decryption algorithm consist of the
following:
1. Inverse Shift rows
2. Inverse Substitute bytes
3. Add Round Key
4. Inverse Mix Columns
Again, the tenth round simply leaves out the Inverse Mix Columns
stage.
Thursday, March 28, 2024
P.Srilatha
AES-Working of Single Round
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
AES Structure
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
This stage (known as SubBytes) is simply a table lookup using a 16×16
matrix of byte values called an s-box.
For this particular round each byte is mapped into a new byte in the
following way: the leftmost nibble of the byte is used to specify a
particular row of the s-box and the rightmost nibble specifies a
column.
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
The matrix that gets operated upon throughout the encryption is
known as state matrix.
For example, the byte {95} (curly brackets represent hex values )
selects row 9 column 5 which turns out to contain the value {2A}.
This is then used to update the state matrix.
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes-S Boxes
Aditya Engineering College (A)
Cryptography & Network
Security
The Inverse substitute byte transformation makes use of an inverse
s-box.
In this case what is desired is to select the value {2A} and get the
value {95}.
The s-box is designed to be resistant to known cryptanalytic attacks.
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-1: Substitution Bytes-S Boxes
Aditya Engineering College (A)
Cryptography & Network
Security
Shift row transformation are two types.
1. Forward Shift row transformation which is used in encryption.
2. Inverse Shift row transformation which is used in decryption.
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
FORWARD SHIFT ROW TRANSFORMATION:
The first row of State matrix is not altered.
For the second row, a 1-byte circular left shift is performed.
For the third row, a 2-byte circular left shift is performed.
For the fourth row, a 3-byte circular left shift is performed.
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
INVERSE SHIFT ROWS:
Performs the circular shifts in the opposite direction for each of the
last three rows, with a one-byte circular right shift for the second row
and so on.
Thursday, March 28, 2024
P.Srilatha
Stage-2: Shift Rows Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Mix columns transformation are two types.
1. Forward Mix columns transformation which is used in encryption.
2. Inverse Mix columns transformation which is used in decryption.
Thursday, March 28, 2024
P.Srilatha
Stage-3: Mix Columns Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
Forward Mix columns transformation called mix columns, operates
on each column individually.
Each byte of a column is mapped into a new value that is a function
of all 4 bytes in that column.
The transformation can be defined by the following matrix
multiplication on state.
Thursday, March 28, 2024
P.Srilatha
Stage-3: Mix Columns Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
The inverse mix column transformation, called InvMixColumns, is
defined by the following matrix multiplication:
Thursday, March 28, 2024
P.Srilatha
Stage-3: Mix Columns Transformation
Aditya Engineering College (A)
Cryptography & Network
Security
In the forward add round key transformation, called AddRoundKey,
the 128 bits of State are bitwise XORed with the 128 bits of the round
key.
Thursday, March 28, 2024
P.Srilatha
Stage-4:Add Roundkey Transformation
State array
(mix columns o/p)
Round key Output state array
Aditya Engineering College (A)
Cryptography & Network
Security
The 128-bit key value can be expanded into 44 words i.e.
44 X 32 = 1408 bits . In each round 4 words will be used i.e. (4x32=128
bits)
In Addroundkey first 4 words w0,w1,w2,w3 are used. In first
round,w4,w5,w6,w7 are used and so on…
The 128 bit key is expanded as follows:
First 128 bit key is arranged as a 4x4 matrix each value size is 8-bits
The 32 bits (k0,k1,k2,k3) is considered as w0.
The 32 bits (k4,k5,k6,k7) is considered as w1.
Thursday, March 28, 2024
P.Srilatha
AES Key Expansion
Aditya Engineering College (A)
Cryptography & Network
Security
The 32 bits (k8,k9,k10,k11) is considered as w2.
The 32 bits (k12,k13,k14,k15) is considered as w3.
Next 4 words w4,w5,w6,w7 are followed as
w4=w0 ⊕ w3
w5=w1 ⊕ w4
w6=w2 ⊕w5
w7=w3 ⊕w6
Thursday, March 28, 2024
P.Srilatha
AES Key Expansion
Aditya Engineering College (A)
Cryptography & Network
Security
Thursday, March 28, 2024
P.Srilatha
AES Key Expansion
Aditya Engineering College (A)
Cryptography & Network
Security
Learning Outcomes
AES Algorithm
Parameters of AES
AES- Working of single round
AES Structure
Stage-1: Substitution Bytes
Stage-2: Shift Rows Transformation
Stage-3: Mix Columns Transformation
Stage-4: Add Rond Key Transformation
AES Key Expansion
Thursday, March 28, 2024
P.Srilatha
Summary

More Related Content

Similar to Unit-II AES Algorithm which is used machine learning (20)

PPT
AES Cryptosystem
هيثم فرج
 
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
KanchanPatil34
 
PDF
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
PDF
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
PPT
Aes
Surya Kiran
 
PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
PPTX
Image encryption using aes key expansion
Sreeda Perikamana
 
PPT
Advanced Encryption System - Network and Security.ppt
VimalAadhithan
 
PPTX
AES.pptx
RizwanBasha12
 
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
PPTX
Cyber security
BHARAT CHAURASIA
 
PPTX
Cryptography
Mannat Gill
 
PPTX
Ch06 Cryptography Cryptography Cryptography Cryptography
AhmedSaeed115917
 
PPTX
A Hybrid Approach to Advanced ES Design.pptx
vasudeva873639
 
PPTX
Stream Ciphers and Block Ciphers in Security.pptx
Vivekananda Gn
 
PPTX
694 lecture1aes
Ankur Human
 
PPT
AES.ppt
BincySam2
 
PPTX
Cryptographic algorithms
Anamika Singh
 
PPTX
Cryptographic algorithms
Anamika Singh
 
AES Cryptosystem
هيثم فرج
 
Unit 2_AES_AES_Structure_Encryption_Example.pdf
KanchanPatil34
 
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd Iaetsd
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Dhaval Kaneria
 
Image encryption using aes key expansion
Sreeda Perikamana
 
Advanced Encryption System - Network and Security.ppt
VimalAadhithan
 
AES.pptx
RizwanBasha12
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Cyber security
BHARAT CHAURASIA
 
Cryptography
Mannat Gill
 
Ch06 Cryptography Cryptography Cryptography Cryptography
AhmedSaeed115917
 
A Hybrid Approach to Advanced ES Design.pptx
vasudeva873639
 
Stream Ciphers and Block Ciphers in Security.pptx
Vivekananda Gn
 
694 lecture1aes
Ankur Human
 
AES.ppt
BincySam2
 
Cryptographic algorithms
Anamika Singh
 
Cryptographic algorithms
Anamika Singh
 

More from michaelaaron25322 (14)

PPT
computer-system-architecture-morris-mano-220720124304-fefd641d.ppt
michaelaaron25322
 
PPTX
Python programming language introduction unit
michaelaaron25322
 
PPTX
memory Organization in computer organization
michaelaaron25322
 
PPTX
EST is a software architectural style that was created to guide the design an...
michaelaaron25322
 
PPTX
Spring data jpa are used to develop spring applications
michaelaaron25322
 
PPTX
Python programming language introduction unit
michaelaaron25322
 
PPTX
Typescript language extension of java script
michaelaaron25322
 
PPT
UNIT2_NaiveBayes algorithms used in machine learning
michaelaaron25322
 
PPTX
Spring Data JPA USE FOR CREATING DATA JPA
michaelaaron25322
 
PPTX
Computer organization algorithms like addition and subtraction and multiplica...
michaelaaron25322
 
PPTX
mean stack
michaelaaron25322
 
PPT
karnaughmaprev1-130728135103-phpapp01.ppt
michaelaaron25322
 
PPT
booleanalgebra-140914001141-phpapp01 (1).ppt
michaelaaron25322
 
PPTX
mst_unit1.pptx
michaelaaron25322
 
computer-system-architecture-morris-mano-220720124304-fefd641d.ppt
michaelaaron25322
 
Python programming language introduction unit
michaelaaron25322
 
memory Organization in computer organization
michaelaaron25322
 
EST is a software architectural style that was created to guide the design an...
michaelaaron25322
 
Spring data jpa are used to develop spring applications
michaelaaron25322
 
Python programming language introduction unit
michaelaaron25322
 
Typescript language extension of java script
michaelaaron25322
 
UNIT2_NaiveBayes algorithms used in machine learning
michaelaaron25322
 
Spring Data JPA USE FOR CREATING DATA JPA
michaelaaron25322
 
Computer organization algorithms like addition and subtraction and multiplica...
michaelaaron25322
 
mean stack
michaelaaron25322
 
karnaughmaprev1-130728135103-phpapp01.ppt
michaelaaron25322
 
booleanalgebra-140914001141-phpapp01 (1).ppt
michaelaaron25322
 
mst_unit1.pptx
michaelaaron25322
 
Ad

Recently uploaded (20)

PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
PPTX
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PDF
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PDF
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PDF
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
PPT
inherently safer design for engineering.ppt
DhavalShah616893
 
PPTX
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
PDF
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
PPTX
NEUROMOROPHIC nu iajwojeieheueueueu.pptx
knkoodalingam39
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PPTX
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PDF
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Additional Information in midterm CPE024 (1).pdf
abolisojoy
 
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Thermal runway and thermal stability.pptx
godow93766
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
A presentation on the Urban Heat Island Effect
studyfor7hrs
 
inherently safer design for engineering.ppt
DhavalShah616893
 
EC3551-Transmission lines Demo class .pptx
Mahalakshmiprasannag
 
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
NEUROMOROPHIC nu iajwojeieheueueueu.pptx
knkoodalingam39
 
site survey architecture student B.arch.
sri02032006
 
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
Ad

Unit-II AES Algorithm which is used machine learning

  • 1. ADITYA ENGINEERING COLLEGE (A) COURSE:CRYPTOGRAPHY AND NETWORK SECURITY TOPIC:Advanced Encryption Standard Algorithm By P.Sri Latha Sr. Assistant Professor Dept of Computer Science & Engineering Aditya Engineering College(A) Surampalem.
  • 2. Aditya Engineering College (A) Cryptography & Network Security At the end of this class student will be able to: Implement Advanced Encryption Standard Algorithm for transfering data securely over a network. Thursday, March 28, 2024 P.Srilatha Learning Outcomes
  • 3. Aditya Engineering College (A) Cryptography & Network Security The Advanced Encryption Standard (AES) was published by the National Institute of Standards and Technology (NIST) in 2001. AES is a block cipher intended to replace DES for commercial applications. It uses a 128-bit block size and a key size of 128, 192, or 256 bits. AES does not use a Feistel structure. Instead, each full round consists of four separate functions: 1. byte substitution 2. permutation 3. arithmetic operations over a finite field 4. XOR with a key. Thursday, March 28, 2024 P.Srilatha Advanced Encryption Standard (AES)
  • 4. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha AES Parameters Key size(words/bytes/bits) 4/16/128 6/24/192 8/32/256 Plaintext block Size (words/bytes/bits) 4/16/128 4/16/192 4/16/256 Number of rounds 10 12 14 Round Key size (words/bytes/bits) 4/16/128 4/16/192 4/16/256 Expanded key size (words/bytes) 44/176 52/208 60/240
  • 5. Aditya Engineering College (A) Cryptography & Network Security The algorithm begins with an Add round key stage followed by 9 rounds of four stages and a tenth round of 3 stages. The four stages are as follows: 1. Substitute bytes 2. Shift rows 3. Mix Columns 4. Add Round Key The tenth round simply omits the Mix Columns stage. Thursday, March 28, 2024 P.Srilatha AES-Working of Single Round
  • 6. Aditya Engineering College (A) Cryptography & Network Security The first 9 rounds of the decryption algorithm consist of the following: 1. Inverse Shift rows 2. Inverse Substitute bytes 3. Add Round Key 4. Inverse Mix Columns Again, the tenth round simply leaves out the Inverse Mix Columns stage. Thursday, March 28, 2024 P.Srilatha AES-Working of Single Round
  • 7. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha AES Structure
  • 8. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 9. Aditya Engineering College (A) Cryptography & Network Security This stage (known as SubBytes) is simply a table lookup using a 16×16 matrix of byte values called an s-box. For this particular round each byte is mapped into a new byte in the following way: the leftmost nibble of the byte is used to specify a particular row of the s-box and the rightmost nibble specifies a column. Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 10. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 11. Aditya Engineering College (A) Cryptography & Network Security The matrix that gets operated upon throughout the encryption is known as state matrix. For example, the byte {95} (curly brackets represent hex values ) selects row 9 column 5 which turns out to contain the value {2A}. This is then used to update the state matrix. Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 12. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes-S Boxes
  • 13. Aditya Engineering College (A) Cryptography & Network Security The Inverse substitute byte transformation makes use of an inverse s-box. In this case what is desired is to select the value {2A} and get the value {95}. The s-box is designed to be resistant to known cryptanalytic attacks. Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes
  • 14. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-1: Substitution Bytes-S Boxes
  • 15. Aditya Engineering College (A) Cryptography & Network Security Shift row transformation are two types. 1. Forward Shift row transformation which is used in encryption. 2. Inverse Shift row transformation which is used in decryption. Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 16. Aditya Engineering College (A) Cryptography & Network Security FORWARD SHIFT ROW TRANSFORMATION: The first row of State matrix is not altered. For the second row, a 1-byte circular left shift is performed. For the third row, a 2-byte circular left shift is performed. For the fourth row, a 3-byte circular left shift is performed. Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 17. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 18. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 19. Aditya Engineering College (A) Cryptography & Network Security INVERSE SHIFT ROWS: Performs the circular shifts in the opposite direction for each of the last three rows, with a one-byte circular right shift for the second row and so on. Thursday, March 28, 2024 P.Srilatha Stage-2: Shift Rows Transformation
  • 20. Aditya Engineering College (A) Cryptography & Network Security Mix columns transformation are two types. 1. Forward Mix columns transformation which is used in encryption. 2. Inverse Mix columns transformation which is used in decryption. Thursday, March 28, 2024 P.Srilatha Stage-3: Mix Columns Transformation
  • 21. Aditya Engineering College (A) Cryptography & Network Security Forward Mix columns transformation called mix columns, operates on each column individually. Each byte of a column is mapped into a new value that is a function of all 4 bytes in that column. The transformation can be defined by the following matrix multiplication on state. Thursday, March 28, 2024 P.Srilatha Stage-3: Mix Columns Transformation
  • 22. Aditya Engineering College (A) Cryptography & Network Security The inverse mix column transformation, called InvMixColumns, is defined by the following matrix multiplication: Thursday, March 28, 2024 P.Srilatha Stage-3: Mix Columns Transformation
  • 23. Aditya Engineering College (A) Cryptography & Network Security In the forward add round key transformation, called AddRoundKey, the 128 bits of State are bitwise XORed with the 128 bits of the round key. Thursday, March 28, 2024 P.Srilatha Stage-4:Add Roundkey Transformation State array (mix columns o/p) Round key Output state array
  • 24. Aditya Engineering College (A) Cryptography & Network Security The 128-bit key value can be expanded into 44 words i.e. 44 X 32 = 1408 bits . In each round 4 words will be used i.e. (4x32=128 bits) In Addroundkey first 4 words w0,w1,w2,w3 are used. In first round,w4,w5,w6,w7 are used and so on… The 128 bit key is expanded as follows: First 128 bit key is arranged as a 4x4 matrix each value size is 8-bits The 32 bits (k0,k1,k2,k3) is considered as w0. The 32 bits (k4,k5,k6,k7) is considered as w1. Thursday, March 28, 2024 P.Srilatha AES Key Expansion
  • 25. Aditya Engineering College (A) Cryptography & Network Security The 32 bits (k8,k9,k10,k11) is considered as w2. The 32 bits (k12,k13,k14,k15) is considered as w3. Next 4 words w4,w5,w6,w7 are followed as w4=w0 ⊕ w3 w5=w1 ⊕ w4 w6=w2 ⊕w5 w7=w3 ⊕w6 Thursday, March 28, 2024 P.Srilatha AES Key Expansion
  • 26. Aditya Engineering College (A) Cryptography & Network Security Thursday, March 28, 2024 P.Srilatha AES Key Expansion
  • 27. Aditya Engineering College (A) Cryptography & Network Security Learning Outcomes AES Algorithm Parameters of AES AES- Working of single round AES Structure Stage-1: Substitution Bytes Stage-2: Shift Rows Transformation Stage-3: Mix Columns Transformation Stage-4: Add Rond Key Transformation AES Key Expansion Thursday, March 28, 2024 P.Srilatha Summary