SlideShare a Scribd company logo
Information and data security advanced encryption standard (aes)
Origins
• The Advanced Encryption Standard (AES) is the
block cipher algorithm chosen by the National
Institute of Standards and Technology
(NIST) It supersedes the Data Encryption
Standard (DES).
• Rijndael is an iterated block cipher. Therefore, the
encryption or decryption of a block of data is
accomplished by the iteration.
Cont. Origins
• Rijndael was evaluated based on its security, its
cost and its algorithm and implementation
characteristics. The primary focus of the analysis
was on the cipher's security, but the choice of
Rijndael was based on its simple algorithm and
implementation characteristics. There were
several candidate algorithms but Rijndael was
selected because based on the analyses, it had the
best combination of security, performance,
efficiency, ease of implementation and flexibility.
The AES Cipher - Rijndael
• designed by Belgium academics Dr.Joan
Daemen and Dr.Vincent Rijmen.
• designed to be:
• resistant against known attacks
• speed and code compactness on many CPUs
• design simplicity
• AES is block cipher with ablock length of 128
bits.
• AES allows for three different key lengths:
128 , 192 ,or 256 bits.
V. Rijmen
J. Daemen
AES
Encryption
Process
AES Structure
• data block of 4 columns of 4 bytes is state
• key length: 10 rounds for a 16-byte key, 12 rounds for a
24-byte key, and 14 rounds for a 32-byte key.
• state undergoes:
• byte substitution (S-box used on every byte).
• shift rows (permute bytes between groups/columns).
• mix columns (subs using matrix multiply of groups).
• add round key (XOR state with key material).
Data Unit
AES Structure
Some Comments on AES
1. an iterative rather than feistel cipher.
2. key expanded into array of 32-bit words.
3. 4 different stages are used.
4. has a simple structure.
5. only AddRoundKey uses key.
6. AddRoundKey a form of Vernam cipher.
7. each stage is easily reversible.
8. decryption uses keys in reverse order.
9. decryption does recover plaintext.
10.final round has only 3 stages
Substitute Bytes
• a simple substitution of each byte.
• uses one table of 16x16 bytes called an s-box.
• each byte of state is replaced by byte indexed by
row (left 4-bits) & column (right 4-bits).
• eg. byte {95} is replaced by byte in row 9 column 5.
• which has value {2A}.
• S-box constructed using defined transformation
of values in GF(28).
• designed to be resistant to all known attacks.
Substitute Bytes
Example of S-box
Inverse s-box
Shift Rows
• a circular byte shift in each row
• 1st row is unchanged
• 2nd row does 1 byte circular shift to left
• 3rd row does 2 byte circular shift to left
• 4th row does 3 byte circular shift to left
• decrypt does shifts to right
• this step permutes bytes between the
columns
Shift Rows
Mix Columns
• each column is processed separately
• each byte is replaced by a value dependent
on all 4 bytes in the column
Constant matrix Old matrix New matrix
Mix Columns
Mix Columns Example
AES Arithmetic
• uses arithmetic in the finite field GF(28)
• with irreducible polynomial
m(x) = 𝑥8+ 𝑥4 + 𝑥3 + 𝑥 + 1
which is (100011011) or {11b}
• e.g.
{02} • {87}=
(1 0000 1110) xor (1 0001 1011) = (0001 0101)
Add Round Key
• The strength of this algorithm at this stage.
• XOR state with 128-bits of the round key.
• inverse for decryption identical.
• designed to be as simple as possible.
• requires other stages for complexity / security.
AES Key Expansion
• takes 128-bit (16-byte) key and expands into
array of 44, 32-bit words.
• start by copying key into first 4 words.
• then loop creating words that depend on values
in previous & 4 places back.
• in 3 of 4 cases just XOR these together.
• 1st word in 4 has rotate + S-box + XOR round constant on previous,
before XOR 4th back.
AES Key Expansion
Shift 1byte
to bottom
AES Key Expansion
Key Expansion Rationale
• designed to resist known attacks
• design criteria included:
• knowing part key insufficient to find many more.
• invertible transformation.
• fast on wide range of processor.
• use round constants to eliminate symmetries.
• diffuse key bits into round keys.
• enough non-linearity to hinder analysis.
• simplicity of description.
AES Decryption
• AES decryption is not identical to encryption
since steps done in reverse.
• but can define an equivalent inverse cipher with
steps as for encryption.
• but using inverses of each step.
• with a different key schedule.
• works since result is unchanged when:
• swap byte substitution & shift rows.
• swap mix columns & add round key.
AES
Decryption
Uses AES
Since AES is an encryption algorithm therefore has many
uses , which includes protecting the user via the Internet for
up to protect and ensure the data in the banks and
laboratories as that for -AES uses in the military , that is
within the AES useful in all these applications is the lack of a
way effective for breaking it , as some months programs and
protocols based on AES resistance to electronic attacks ,
including :
• AES is used in programs (WINZIP) in the event that the user request
evidence after encryption compressed.
• used in the TLS protocol , a protocol to establish a secure connection.
• him as well as use in the IPsec protocol , a protocol to ensure safety in
connections that are powered by IP via the Internet.

More Related Content

What's hot (20)

PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PPT
Diffie-hellman algorithm
Computer_ at_home
 
PPTX
Symmetric encryption
DR RICHMOND ADEBIAYE
 
PPTX
Cryptographic Algorithms: DES and RSA
aritraranjan
 
PDF
Data encryption techniques and standard
Dr Sarika Jadhav
 
PPT
Des lecture
ANIKET UTTAM
 
PPT
Message Authentication Code & HMAC
Krishna Gehlot
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
PPTX
Encryption algorithms
trilokchandra prakash
 
PPTX
Cryptography
Jens Patel
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PPTX
Idea(international data encryption algorithm)
SAurabh PRajapati
 
PDF
Cs8792 cns - unit iv
ArthyR3
 
PPTX
AES KEY EXPANSION .pptx
AhmudulHassan
 
PDF
SHA 1 Algorithm
Shiva RamDam
 
PPTX
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
PPTX
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
PPT
Ipv4
asimnawaz54
 
PPT
AES Cryptosystem
هيثم فرج
 
PPTX
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Diffie-hellman algorithm
Computer_ at_home
 
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Data encryption techniques and standard
Dr Sarika Jadhav
 
Des lecture
ANIKET UTTAM
 
Message Authentication Code & HMAC
Krishna Gehlot
 
AES-Advanced Encryption Standard
Prince Rachit
 
Encryption algorithms
trilokchandra prakash
 
Cryptography
Jens Patel
 
Data Encryption Standard (DES)
Haris Ahmed
 
Idea(international data encryption algorithm)
SAurabh PRajapati
 
Cs8792 cns - unit iv
ArthyR3
 
AES KEY EXPANSION .pptx
AhmudulHassan
 
SHA 1 Algorithm
Shiva RamDam
 
Symmetric Encryption Techniques
Dr. Kapil Gupta
 
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
AES Cryptosystem
هيثم فرج
 
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 

Similar to Information and data security advanced encryption standard (aes) (20)

PPT
AES.ppt
BincySam2
 
PPT
advance encryption standard chapter 5.ppt
roueida mohammed
 
PPTX
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
PPTX
694 lecture1aes
Ankur Human
 
PPTX
Cryptography
Mannat Gill
 
PPT
AES.ppt
ssuser6602e0
 
PPT
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
PPT
Advanced Encryption System - Network and Security.ppt
VimalAadhithan
 
PPT
Chapter 5 module 3
daneshwarihatti
 
PDF
Advanced Encryption Standard (AES).pdf
SJDalore1
 
PPTX
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
PPTX
1-aes.pptx
anithachristopher3
 
PPTX
AES algorithm and easy explanation of AES
sanskarpawar2003
 
PPTX
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
PPT
Unit -2.ppt
DHANABALSUBRAMANIAN
 
PDF
Aes 128 192_256_bits_project_report
sakhi rehman
 
PPTX
Topic5 advanced encryption standard (aes)
MdFazleRabbi18
 
PPTX
AES.pptx
RizwanBasha12
 
PPTX
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
AES.ppt
BincySam2
 
advance encryption standard chapter 5.ppt
roueida mohammed
 
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
694 lecture1aes
Ankur Human
 
Cryptography
Mannat Gill
 
AES.ppt
ssuser6602e0
 
CR 05 - Advanced Encryption Standard.ppt
ssuseraaf866
 
Advanced Encryption System - Network and Security.ppt
VimalAadhithan
 
Chapter 5 module 3
daneshwarihatti
 
Advanced Encryption Standard (AES).pdf
SJDalore1
 
CNS Module 3_AES. in cryptography and network security
bodamaddy
 
1-aes.pptx
anithachristopher3
 
AES algorithm and easy explanation of AES
sanskarpawar2003
 
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
Unit -2.ppt
DHANABALSUBRAMANIAN
 
Aes 128 192_256_bits_project_report
sakhi rehman
 
Topic5 advanced encryption standard (aes)
MdFazleRabbi18
 
AES.pptx
RizwanBasha12
 
Information and network security 24 advanced encryption standard aes
Vaibhav Khanna
 
Ad

More from Mazin Alwaaly (20)

PPTX
Pattern recognition voice biometrics
Mazin Alwaaly
 
PPTX
Pattern recognition palm print authentication system
Mazin Alwaaly
 
PPTX
Pattern recognition on line signature
Mazin Alwaaly
 
PPTX
Pattern recognition multi biometrics using face and ear
Mazin Alwaaly
 
PPTX
Pattern recognition IRIS recognition
Mazin Alwaaly
 
PPT
Pattern recognition hand vascular pattern recognition
Mazin Alwaaly
 
PPTX
Pattern recognition Hand Geometry
Mazin Alwaaly
 
PPTX
Pattern recognition forensic dental identification
Mazin Alwaaly
 
PPT
Pattern recognition fingerprints
Mazin Alwaaly
 
PPTX
Pattern recognition facial recognition
Mazin Alwaaly
 
PPTX
Pattern recognition ear as a biometric
Mazin Alwaaly
 
PPTX
Pattern recognition 3d face recognition
Mazin Alwaaly
 
PPTX
Multimedia multimedia over wireless and mobile networks
Mazin Alwaaly
 
PPT
Multimedia network services and protocols for multimedia communications
Mazin Alwaaly
 
PPTX
Multimedia content based retrieval in digital libraries
Mazin Alwaaly
 
PPTX
Multimedia lossy compression algorithms
Mazin Alwaaly
 
PPTX
Multimedia lossless compression algorithms
Mazin Alwaaly
 
PPTX
Multimedia basic video compression techniques
Mazin Alwaaly
 
PPT
Multimedia image compression standards
Mazin Alwaaly
 
PPTX
Multimedia fundamental concepts in video
Mazin Alwaaly
 
Pattern recognition voice biometrics
Mazin Alwaaly
 
Pattern recognition palm print authentication system
Mazin Alwaaly
 
Pattern recognition on line signature
Mazin Alwaaly
 
Pattern recognition multi biometrics using face and ear
Mazin Alwaaly
 
Pattern recognition IRIS recognition
Mazin Alwaaly
 
Pattern recognition hand vascular pattern recognition
Mazin Alwaaly
 
Pattern recognition Hand Geometry
Mazin Alwaaly
 
Pattern recognition forensic dental identification
Mazin Alwaaly
 
Pattern recognition fingerprints
Mazin Alwaaly
 
Pattern recognition facial recognition
Mazin Alwaaly
 
Pattern recognition ear as a biometric
Mazin Alwaaly
 
Pattern recognition 3d face recognition
Mazin Alwaaly
 
Multimedia multimedia over wireless and mobile networks
Mazin Alwaaly
 
Multimedia network services and protocols for multimedia communications
Mazin Alwaaly
 
Multimedia content based retrieval in digital libraries
Mazin Alwaaly
 
Multimedia lossy compression algorithms
Mazin Alwaaly
 
Multimedia lossless compression algorithms
Mazin Alwaaly
 
Multimedia basic video compression techniques
Mazin Alwaaly
 
Multimedia image compression standards
Mazin Alwaaly
 
Multimedia fundamental concepts in video
Mazin Alwaaly
 
Ad

Recently uploaded (20)

PDF
A proposed mechanism for the formation of protocell-like structures on Titan
Sérgio Sacani
 
PDF
Control and coordination Class 10 Chapter 6
LataHolkar
 
PPTX
Posture & Equilibrium_________locomotion
muralinath2
 
PDF
LiDO: Discovery of a 10:1 Resonator with a Novel Libration State
Sérgio Sacani
 
PPTX
RESEARCH METHODOLOGY DR PUTRI Ms.EPI.pptx
nilarafidabm
 
PDF
NSF-DOE Vera C. Rubin Observatory Observations of Interstellar Comet 3I/ATLAS...
Sérgio Sacani
 
PPTX
Pengenalan Sel dan organisasi kehidupanpptx
SuntiEkaprawesti1
 
PDF
The Kardashev Scale From Planetary to Cosmic Civilizations
Saikat Basu
 
PPTX
Graduation Project 2025 mohamed Tarek PT
midotarekss12
 
PPTX
magnetic effect of current updated. grade 12pptx
1013111
 
PPTX
Biology-BIO241-lec1 of human science.pptx
omarmora65
 
PDF
High-definition imaging of a filamentary connection between a close quasar pa...
Sérgio Sacani
 
PPTX
Evolution of diet breadth in herbivorus insects.pptx
Mr. Suresh R. Jambagi
 
PDF
Is the Interstellar Object 3I/ATLAS Alien Technology?
Sérgio Sacani
 
PPTX
MOUNTAINS...........................................
AnaRosePagdato1
 
DOCX
SCIENCE 5_DLL_Q1_W4.docx GRADE 5 DAILY LESSON LOG
OperatingRoomRoom
 
PDF
New Physics and Quantum AI: Pioneering the Next Frontier
Saikat Basu
 
PPTX
Pirimidinas_2025_Curso Ácidos nucleicos. Cinvestav
lalvarezmex
 
PDF
Refractory solid condensation detected in an embedded protoplanetary disk
Sérgio Sacani
 
PDF
The role of the Lorentz force in sunspot equilibrium
Sérgio Sacani
 
A proposed mechanism for the formation of protocell-like structures on Titan
Sérgio Sacani
 
Control and coordination Class 10 Chapter 6
LataHolkar
 
Posture & Equilibrium_________locomotion
muralinath2
 
LiDO: Discovery of a 10:1 Resonator with a Novel Libration State
Sérgio Sacani
 
RESEARCH METHODOLOGY DR PUTRI Ms.EPI.pptx
nilarafidabm
 
NSF-DOE Vera C. Rubin Observatory Observations of Interstellar Comet 3I/ATLAS...
Sérgio Sacani
 
Pengenalan Sel dan organisasi kehidupanpptx
SuntiEkaprawesti1
 
The Kardashev Scale From Planetary to Cosmic Civilizations
Saikat Basu
 
Graduation Project 2025 mohamed Tarek PT
midotarekss12
 
magnetic effect of current updated. grade 12pptx
1013111
 
Biology-BIO241-lec1 of human science.pptx
omarmora65
 
High-definition imaging of a filamentary connection between a close quasar pa...
Sérgio Sacani
 
Evolution of diet breadth in herbivorus insects.pptx
Mr. Suresh R. Jambagi
 
Is the Interstellar Object 3I/ATLAS Alien Technology?
Sérgio Sacani
 
MOUNTAINS...........................................
AnaRosePagdato1
 
SCIENCE 5_DLL_Q1_W4.docx GRADE 5 DAILY LESSON LOG
OperatingRoomRoom
 
New Physics and Quantum AI: Pioneering the Next Frontier
Saikat Basu
 
Pirimidinas_2025_Curso Ácidos nucleicos. Cinvestav
lalvarezmex
 
Refractory solid condensation detected in an embedded protoplanetary disk
Sérgio Sacani
 
The role of the Lorentz force in sunspot equilibrium
Sérgio Sacani
 

Information and data security advanced encryption standard (aes)

  • 2. Origins • The Advanced Encryption Standard (AES) is the block cipher algorithm chosen by the National Institute of Standards and Technology (NIST) It supersedes the Data Encryption Standard (DES). • Rijndael is an iterated block cipher. Therefore, the encryption or decryption of a block of data is accomplished by the iteration.
  • 3. Cont. Origins • Rijndael was evaluated based on its security, its cost and its algorithm and implementation characteristics. The primary focus of the analysis was on the cipher's security, but the choice of Rijndael was based on its simple algorithm and implementation characteristics. There were several candidate algorithms but Rijndael was selected because based on the analyses, it had the best combination of security, performance, efficiency, ease of implementation and flexibility.
  • 4. The AES Cipher - Rijndael • designed by Belgium academics Dr.Joan Daemen and Dr.Vincent Rijmen. • designed to be: • resistant against known attacks • speed and code compactness on many CPUs • design simplicity • AES is block cipher with ablock length of 128 bits. • AES allows for three different key lengths: 128 , 192 ,or 256 bits. V. Rijmen J. Daemen
  • 6. AES Structure • data block of 4 columns of 4 bytes is state • key length: 10 rounds for a 16-byte key, 12 rounds for a 24-byte key, and 14 rounds for a 32-byte key. • state undergoes: • byte substitution (S-box used on every byte). • shift rows (permute bytes between groups/columns). • mix columns (subs using matrix multiply of groups). • add round key (XOR state with key material).
  • 9. Some Comments on AES 1. an iterative rather than feistel cipher. 2. key expanded into array of 32-bit words. 3. 4 different stages are used. 4. has a simple structure. 5. only AddRoundKey uses key. 6. AddRoundKey a form of Vernam cipher. 7. each stage is easily reversible. 8. decryption uses keys in reverse order. 9. decryption does recover plaintext. 10.final round has only 3 stages
  • 10. Substitute Bytes • a simple substitution of each byte. • uses one table of 16x16 bytes called an s-box. • each byte of state is replaced by byte indexed by row (left 4-bits) & column (right 4-bits). • eg. byte {95} is replaced by byte in row 9 column 5. • which has value {2A}. • S-box constructed using defined transformation of values in GF(28). • designed to be resistant to all known attacks.
  • 14. Shift Rows • a circular byte shift in each row • 1st row is unchanged • 2nd row does 1 byte circular shift to left • 3rd row does 2 byte circular shift to left • 4th row does 3 byte circular shift to left • decrypt does shifts to right • this step permutes bytes between the columns
  • 16. Mix Columns • each column is processed separately • each byte is replaced by a value dependent on all 4 bytes in the column Constant matrix Old matrix New matrix
  • 19. AES Arithmetic • uses arithmetic in the finite field GF(28) • with irreducible polynomial m(x) = 𝑥8+ 𝑥4 + 𝑥3 + 𝑥 + 1 which is (100011011) or {11b} • e.g. {02} • {87}= (1 0000 1110) xor (1 0001 1011) = (0001 0101)
  • 20. Add Round Key • The strength of this algorithm at this stage. • XOR state with 128-bits of the round key. • inverse for decryption identical. • designed to be as simple as possible. • requires other stages for complexity / security.
  • 21. AES Key Expansion • takes 128-bit (16-byte) key and expands into array of 44, 32-bit words. • start by copying key into first 4 words. • then loop creating words that depend on values in previous & 4 places back. • in 3 of 4 cases just XOR these together. • 1st word in 4 has rotate + S-box + XOR round constant on previous, before XOR 4th back.
  • 22. AES Key Expansion Shift 1byte to bottom
  • 24. Key Expansion Rationale • designed to resist known attacks • design criteria included: • knowing part key insufficient to find many more. • invertible transformation. • fast on wide range of processor. • use round constants to eliminate symmetries. • diffuse key bits into round keys. • enough non-linearity to hinder analysis. • simplicity of description.
  • 25. AES Decryption • AES decryption is not identical to encryption since steps done in reverse. • but can define an equivalent inverse cipher with steps as for encryption. • but using inverses of each step. • with a different key schedule. • works since result is unchanged when: • swap byte substitution & shift rows. • swap mix columns & add round key.
  • 27. Uses AES Since AES is an encryption algorithm therefore has many uses , which includes protecting the user via the Internet for up to protect and ensure the data in the banks and laboratories as that for -AES uses in the military , that is within the AES useful in all these applications is the lack of a way effective for breaking it , as some months programs and protocols based on AES resistance to electronic attacks , including : • AES is used in programs (WINZIP) in the event that the user request evidence after encryption compressed. • used in the TLS protocol , a protocol to establish a secure connection. • him as well as use in the IPsec protocol , a protocol to ensure safety in connections that are powered by IP via the Internet.