SlideShare a Scribd company logo
DR. P.U.ANITHA
1
Block Cipher
The Advanced Encryption Standard (AES), also called Rijndael, is a symmetric block cipher
with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. It was
published by NIST (National Institute of Standards and Technology) in 2001. Here, we
assume a key length of 128 bits, which is likely to be the one most commonly
implemented.
DR. P.U.ANITHA
2
AES Block Cipher
The AES Algorithm:
 AES operates on a 4 × 4 column-wise order array of bytes, called the state. For
instance, if there are 16 bytes, these bytes are represented as this two-dimensional
array:
 The key size used for an AES cipher specifies the number of transformation rounds that
convert the plaintext into the ciphertext . The number of rounds are as follows:
10 rounds for 128-bit keys.
12 rounds for 192-bit keys.
14 rounds for 256-bit keys.
 Each round consists of several processing steps, including one that depends on the
encryption key itself. A set of reverse rounds are applied to transform ciphertext back
into the original plaintext using the same encryption key.
DR. P.U.ANITHA
3
AES Block Cipher
The AES Encryption Algorithm:
 The AES algorithm can be broken into three phases: the initial round, the main rounds,
and the final round. All of the phases use the same sub-operations in different
combinations as follows:
Initial Round
AddRoundKey
Main Rounds (1,2…Nr-1)
SubBytes
ShiftRows
MixColumns
AddRoundKey
Final Round (Nr)
SubBytes
ShiftRows
AddRoundKey
Note that in the above figure, KeyExpansion: round keys are derived from the cipher key
using key expansion algorithm. AES requires a separate 128-bit round key block for each
round plus one more.
DR. P.U.ANITHA
4
AES Block Cipher
AddRoundKey: In this operation, the 128 bits of State are bitwise XORed with the 128
bits of the round key. Here is an example where the first matrix is State, and the second
matrix is the round key.
e.g.
=

DR. P.U.ANITHA
5
AES Block Cipher
SubBytes: A nonlinear substitution step where each entry (byte) of the current state
matrix is substituted by a corresponding entry in the AES S-Box. For instance: byte (6E) is
substituted by the entry of the S-Box in row 6 and column E, i.e., by (9F). (The byte input is
broken into two 4-bit halves. The first half determines the row and the second half
determines the column).
e.g.:
state =  S_box(State) =
DR. P.U.ANITHA
6
AES Encryption Cipher
ShiftRows: A transposition step where the four rows of the state are shifted cyclically to
the left by offsets of 0, 1, 2, and 3.
e.g.:
e.g.:

DR. P.U.ANITHA
7
AES Block Cipher
MixColumns: a linear mixing operation which multiplies fixed matrix against current
State Matrix:
Unlike standard matrix multiplication, MixColumns performs matrix multiplication as per
Galois Field (28).
e.g.:
DR. P.U.ANITHA
8
AES Block Cipher
The AES Decryption Algorithm:
 AddRoundKey:
Add Roundkey transformation is identical to the forward add round key transformation,
because the XOR operation is its own inverse.
 Inverse SubBytes:
This operation can be performed using the inverse S-Box. It is read identically to the S-Box
matrix.
 InvShiftRows:
Inverse Shift Rows performs the circular shifts in the opposite direction for each of the last
three rows, with a one-byte circular right shift for the second row, and so on.
 InvMixColumns:
The inverse mix column transformation is defined by the following matrix multiplication in
Galois Field (28):

More Related Content

PPTX
AES.pptx
PPT
AESbnhgfdrtfyuiiukyjtdrertutuyjhgfhgsrtrygh.ppt
DOCX
Aes algorithm notes
PPT
Minor Project- AES Implementation in Verilog
PPT
Advanced Encryption System - Network and Security.ppt
PPT
advance encryption standard chapter 5.ppt
PPTX
Adavanced Encryption Standard in Cryptography
AES.pptx
AESbnhgfdrtfyuiiukyjtdrertutuyjhgfhgsrtrygh.ppt
Aes algorithm notes
Minor Project- AES Implementation in Verilog
Advanced Encryption System - Network and Security.ppt
advance encryption standard chapter 5.ppt
Adavanced Encryption Standard in Cryptography

Similar to 1-aes.pptx (20)

PPT
AES.ppt
PDF
Aes128 bit project_report
PDF
CNS18- AES Crmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPTX
Topic5 advanced encryption standard (aes)
PDF
modified aes algorithm using multiple s-boxes
PDF
Modified aes algorithm using multiple s boxes
PPT
AES.ppt
PPT
CR 05 - Advanced Encryption Standard.ppt
PDF
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
PPTX
694 lecture1aes
PPT
PPT
Network Security Lec4
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
PPTX
Stream Ciphers and Block Ciphers in Security.pptx
PPTX
Aes(Advance Encryption Algorithm)
PDF
Network security cs5
PPTX
Cryptographic algorithms
AES.ppt
Aes128 bit project_report
CNS18- AES Crmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
Topic5 advanced encryption standard (aes)
modified aes algorithm using multiple s-boxes
Modified aes algorithm using multiple s boxes
AES.ppt
CR 05 - Advanced Encryption Standard.ppt
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
694 lecture1aes
Network Security Lec4
“Optimized AES Algorithm Core Using FeedBack Architecture”
Stream Ciphers and Block Ciphers in Security.pptx
Aes(Advance Encryption Algorithm)
Network security cs5
Cryptographic algorithms
Ad

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
Computing-Curriculum for Schools in Ghana
PDF
Classroom Observation Tools for Teachers
PDF
1_English_Language_Set_2.pdf probationary
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
advance database management system book.pdf
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Complications of Minimal Access Surgery at WLH
Digestion and Absorption of Carbohydrates, Proteina and Fats
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Unit 4 Skeletal System.ppt.pptxopresentatiom
Computing-Curriculum for Schools in Ghana
Classroom Observation Tools for Teachers
1_English_Language_Set_2.pdf probationary
Paper A Mock Exam 9_ Attempt review.pdf.
Supply Chain Operations Speaking Notes -ICLT Program
Orientation - ARALprogram of Deped to the Parents.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Weekly quiz Compilation Jan -July 25.pdf
What if we spent less time fighting change, and more time building what’s rig...
advance database management system book.pdf
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Final Presentation General Medicine 03-08-2024.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Ad

1-aes.pptx

  • 1. DR. P.U.ANITHA 1 Block Cipher The Advanced Encryption Standard (AES), also called Rijndael, is a symmetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. It was published by NIST (National Institute of Standards and Technology) in 2001. Here, we assume a key length of 128 bits, which is likely to be the one most commonly implemented.
  • 2. DR. P.U.ANITHA 2 AES Block Cipher The AES Algorithm:  AES operates on a 4 × 4 column-wise order array of bytes, called the state. For instance, if there are 16 bytes, these bytes are represented as this two-dimensional array:  The key size used for an AES cipher specifies the number of transformation rounds that convert the plaintext into the ciphertext . The number of rounds are as follows: 10 rounds for 128-bit keys. 12 rounds for 192-bit keys. 14 rounds for 256-bit keys.  Each round consists of several processing steps, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key.
  • 3. DR. P.U.ANITHA 3 AES Block Cipher The AES Encryption Algorithm:  The AES algorithm can be broken into three phases: the initial round, the main rounds, and the final round. All of the phases use the same sub-operations in different combinations as follows: Initial Round AddRoundKey Main Rounds (1,2…Nr-1) SubBytes ShiftRows MixColumns AddRoundKey Final Round (Nr) SubBytes ShiftRows AddRoundKey Note that in the above figure, KeyExpansion: round keys are derived from the cipher key using key expansion algorithm. AES requires a separate 128-bit round key block for each round plus one more.
  • 4. DR. P.U.ANITHA 4 AES Block Cipher AddRoundKey: In this operation, the 128 bits of State are bitwise XORed with the 128 bits of the round key. Here is an example where the first matrix is State, and the second matrix is the round key. e.g. = 
  • 5. DR. P.U.ANITHA 5 AES Block Cipher SubBytes: A nonlinear substitution step where each entry (byte) of the current state matrix is substituted by a corresponding entry in the AES S-Box. For instance: byte (6E) is substituted by the entry of the S-Box in row 6 and column E, i.e., by (9F). (The byte input is broken into two 4-bit halves. The first half determines the row and the second half determines the column). e.g.: state =  S_box(State) =
  • 6. DR. P.U.ANITHA 6 AES Encryption Cipher ShiftRows: A transposition step where the four rows of the state are shifted cyclically to the left by offsets of 0, 1, 2, and 3. e.g.: e.g.: 
  • 7. DR. P.U.ANITHA 7 AES Block Cipher MixColumns: a linear mixing operation which multiplies fixed matrix against current State Matrix: Unlike standard matrix multiplication, MixColumns performs matrix multiplication as per Galois Field (28). e.g.:
  • 8. DR. P.U.ANITHA 8 AES Block Cipher The AES Decryption Algorithm:  AddRoundKey: Add Roundkey transformation is identical to the forward add round key transformation, because the XOR operation is its own inverse.  Inverse SubBytes: This operation can be performed using the inverse S-Box. It is read identically to the S-Box matrix.  InvShiftRows: Inverse Shift Rows performs the circular shifts in the opposite direction for each of the last three rows, with a one-byte circular right shift for the second row, and so on.  InvMixColumns: The inverse mix column transformation is defined by the following matrix multiplication in Galois Field (28):