0% found this document useful (0 votes)
40 views1 page

CH5 Fa22

This document contains an assignment with 5 questions regarding AES (Advanced Encryption Standard) encryption. The questions ask the student to: 1) perform an inverse operation in GF(28) and verify an AES S-Box entry; 2) show the first eight words of AES key expansion; 3) show the results of each step of the first AES round for a given plaintext and key; 4) compute the MixColumns transformation for a byte sequence; and 5) write a program to automate questions 3 and 4.

Uploaded by

. .
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views1 page

CH5 Fa22

This document contains an assignment with 5 questions regarding AES (Advanced Encryption Standard) encryption. The questions ask the student to: 1) perform an inverse operation in GF(28) and verify an AES S-Box entry; 2) show the first eight words of AES key expansion; 3) show the results of each step of the first AES round for a given plaintext and key; 4) compute the MixColumns transformation for a byte sequence; and 5) write a program to automate questions 3 and 4.

Uploaded by

. .
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

EECE 455/632 – Cryptography and Network Security

Assignment

CHAPTER 5 - AES
Question #1
a) What is the inverse of {57} in GF(28)?
b) Verify the entry for {57} in the AES S-Box

Question #2
Show the first eight words of the AES (128 bits) key expansion for a key consisting of all
ones.

Question #3
Given the Plaintext in Hex: {000102030405060708090A0B0C0D0E0F}
And given the Key in Hex below (40 = 0100 0000):
{4040404040404040404040404040404040404040404040404040404040404040}
For the first round of AES:
a) Show the original contents of State, displayed as a 4x4 Matrix
b) Show the value of State after initial ADD ROUND KEY
c) Show the value of State after initial SUBSTITUE BYTES
d) Show the value of State after initial SHIFT ROWS
e) Show the value of State after initial MIX COLUMNS

Question #4
Compute the outcome of the AES Mix-Columns transformation for the sequence of input
bytes: 56 44 92 08.

Question #5
Write a computer program that computes the answers to questions 3) and 4), that is, given
a plaintext (in Hex) and a key (in hex) show all the results of the first round of AES (128)
and the key expansion (displayed in hex) for the 11 sub-keys.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy