AES Algorithm Final PPT
AES Algorithm Final PPT
KHAMGAON
DCC-( 22414)
MICRO PROJECT ON
AES (Advance Encryption Standard)
GUIDED BY :- SUBMITTED BY :-
Prof.A.W.Sawarkar 1.Abhishek S. Gawande(19)
2.Vedant V. Gaygol(20)
3.Sushil S. Rahatole(40)
Basic Terminologies of Encryption and
decryption
• Private key :-Private key is used to decode the encrypted data at receivers end
• Public key :-public key is used for encrypt the message at the sender end
What is Encryption and decryption
• AES allows you to choose a 128-bit,192-bit or 256-bit key, but the DES allows you to
choose only 56-bit key
• AES has block size of 128-bits and DES has only 64-bits block size
• DES is less secure as compared to the AES
• The encryption time of AES is faster as compared to the DES
What is AES Algorithm
• AES operates by converting plaintext (unencrypted data) and a secret key, and
producing cipher text (encrypted data) that can only be decrypted with the same secret
key
• AES is widely used in applications that require secure data transfer, such as online
banking, file encryption, and virtual private networks (VPNs)
How Does it works?
• The number of rounds performed by the algorithm strictly depends on the size of key
• The following table gives overview of number of rounds performed with the input of
varying key lengths:
• The larger the number of keys the more secure will be the data
• The time taken by s/w to encrypt will increase with number of rounds
2. Input Array ( 4×4 ) 16 byte/4Word 3. State Array ( 4×4 ) 16 byte/4word
1 Word
Each box
contain 1
byte.
---------
W 0 W 1 W2 W42 W43
AES Algorithm
1.Substitute Bytes
• It interchange the rows first row shift as it is (I.e. no change). And other rows
are shifted as shown in fig
• It has two inputs first input state matrix and 4×4 state Array
• As shown in the fig. One column from the state array is multiplied to the given
input state matrix and the output stores in the output state array
• In this stage the EX-OR operation is performed on the state array and 4×4 round key
• As shown in the fig. The operation is performed on the state array and stores result into 4×4
state array
• And after performing this all steps the plain text is converted into cipher text
https://www.simplilearn.com/tutorials/cryptography-tutorial/aes-encryption
https://www.geeksforgeeks.org/advanced-encryption-standard-aes/amp/
https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard
https://en.m.wikipedia.org/wiki/Advanced_Encryption_Standard
http://www.facweb.iitkgp.ac.in/~sourav/AES.pdf
THANK YOU