Advanced Encryption Standard
-
Upload
ignatius-gonsalves -
Category
Software
-
view
121 -
download
0
Transcript of Advanced Encryption Standard
![Page 1: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/1.jpg)
Advanced Encryption Standard-Ignatius Gonsalves
1. What is AES?2. What is DES?3. Why AES is better than DES?4. Behind the scenes5. Present use of AES
![Page 2: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/2.jpg)
What Is AES?
• Also known as Rijndael•Developed by Joan Daemen and Vincent Rijmen• A Successor of Data Encryption Standard (DES)
![Page 3: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/3.jpg)
What is DES?Data Encryption Standard
Bit length = 56 bitsDesigned 35 years agoPurpose - Secure government communications
A series of challenges were sponsored……
![Page 4: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/4.jpg)
Challenge 1• 1997• 84 days• “ The secret
message is: Many hands make light work”
Challenge 2• 1998• 3 Days• “Time for
those 128-256 bit keys”
Challenge 3• 1999• 22 hrs 15 mins• “See you in
Rome !”
Deep Crack Computer
![Page 5: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/5.jpg)
AES vs DES
DES AESDevelopedKey LengthCipher TypeBlock SizeSecurity
1977 200056 bits 128,192 & 256 bits
Symmetric Block Cipher64 bits 128 bitsInadequate Secure
![Page 6: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/6.jpg)
Behind the scenes
AES
Private Data Ex: Credit card no.
Secret Key
Ciphered Text
![Page 7: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/7.jpg)
AES
Ciphered Text
Secret Key
Private Data
![Page 8: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/8.jpg)
Lets have an in-depth info……..
Byte Substitution
Shift Rows
Mix Columns
Add Round Keys
Encryption
![Page 9: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/9.jpg)
Byte Substitutio
n
• Data is converted into a matrix
Shift Rows• Rows are
shifted to left
Mix Column
Add Round Key
Columns are transformedBy a special
function
Bytes of matrix are x-or’ed to key
![Page 10: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/10.jpg)
Present use Archive and
compression tools
File Encryption
Disk Partitions
![Page 11: Advanced Encryption Standard](https://reader035.fdocuments.net/reader035/viewer/2022062823/587990ac1a28ab95318b5a2b/html5/thumbnails/11.jpg)
Thank You