Advanced Encryption Standard (AES) : Dr. Saliha Bathool
Advanced Encryption Standard (AES) : Dr. Saliha Bathool
Standard (AES)
Dr. Saliha
Bathool
What is Cryptography?
AB C (meaningful message)->
ZYX(cipher)
What is AES?
● AES is an encryption standard chosen by
the National Institute of Standards and
Technology(NIST), USA to protect
classified information. It has been
accepted world wide as a desirable
●
algorithm to encrypt sensitive data.
It is a block cipher which operates on
block size of 128 bits for both encrypting
●
as well as decrypting.
Each Round performs same operations.
Why AES?
● In 1990's the cracking of DES algorithm became
● possible.
Around 50hrs of bruteforcing allowed to
● crack the message.
NIST started searching for new feasible
● algorithm and proposed its requirement in
1997.
In 2001 Rijndael algorithm designed by Rijment
● and Daemon of Belgium was declared as the
winner of the competition.
It met all Security, Cost and Implementation
criteria.
How Does it works?
● AES basically repeats 4 major functions to
encrypt data.It takes 128 bit block of data and
a key[laymans term password] and gives a
ciphertext as output.The functions are:
I. Sub Bytes
II. Shift Rows
III. Mix
Columns
IV. Add Key
How Does it works?
●
The number of rounds performed by the algorithm strictly
depends on the size of key.
●
The following table gives overview of no. Of rounds
performed with the input of varying key lengths:
E(m,k D(n,k
) ) m(128bit
n(128bit n(128bit
m(128bit
s) E s) s) D s)
k k
Rijndael S-
box
Analysis of Steps
● SubBytes
●
The S-box is a special lookup table
which is constructed by Galois fields.
●
The Generating function used in this
algorithm is GF(2^8)
● i.e. 256 values are possible
● The elements of the sbox are
written in hexadecimal system
Analysis of Steps
● Shift Rows
●
In this step rows of the block are
cylindrically shifted in left direction.
●
The first row is untouched , the
second by one shift, third by two and
fourth by 3.
Analysis of Steps
● Shift
Rows
●
In this step the block is multiplied with a fixed
matrix. The multiplication is field
multiplication in galois field.
For each row there are 16 multiplication, 12
XORs and a 4 byte output.
Analysis of Steps
● Mix
Columns
Analysis of Steps
● Add round
key
Analysis of Steps
●
Add round key
●
In this step each byte is XOR-ed
with corresponding element of
● key's matrix.
Once this step is done the keys are no
longer available for this step. Using the
● same key will weaken the algorithm.
To overcome this problem keys are
expanded.
Analysis of Steps
●
In the last round the mix column
step is skipped.
● It is not documented anywhere why this
is done but recently a paper was
published against this method
highlighting the weakening of cipher text.
Attacks
It is similar to the exhaustive key search attack(brute force
attack - trying all the possible set of keys) but it is adaptive.
It is 4 times better than the exhaustive key search. But it is
infeasible using current technology on block cipher having a
keyspace of 128 bits and above.