0% found this document useful (0 votes)
32 views2 pages

Network Security AES

AES
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

Network Security AES

AES
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

A dvamce Encryphon Stoncdarc:

e Pdvanued Enerypl00 Stancorcd (AES) was pu.blshecl bythe national Inatt

tue of Stanelords and reohnolog (WIST) tn 2001. AEStS OSy mmetric bieCk

Cphen that is tnteroleol o replaee Des ag tae approveol Stanclaro


Horca wide rrange ot applicat2onsAES o bloCk cipher 'ntenoect
reeploee DES fon Co mmercoial applteatzong 9 t ugega t2&- bi't bloca Sf26
Feiste
a Key size of 198,19a on 2s6 bits. Ats does not ue e o
StrLctrne Instend, each full rrounod concists of four separtate
tunct2cns byte substthution, peremutotton acthmeerc opercotions
oven a fintte fied, a d xOR t h a ke

AES Sttructurre

the cphen tates a platntext bleeistze of 128 btts,on 16 bytes


The
he algerithm rs referned to as Aes -128, AES -19 3 0 AES -

256
depending on ehe k e kegth he input tothe encryptao 9 ardl decru

pttop algorthmss asirqle 128 bt blockIn PIPS PUB I99thte b (o ee

s de picted as a yxy uoure matrOx of by tes ThS


bleck s copteo
o-the Stode OxITay which s meciie
eaoh stag Gf encryptorn
on olecrryptie n AFen nefina stage
Stoge is Copieo to an ocetput
matrx These operatbng are depicted tn-Srmilêrrly thekey
olecipteol aga Squore matrux of byter Th key isthen expanokto
to a artray key schtchile works Eoeh worLod t fdun bytepan
the total Key schecule s9y worols fo
the 2 bt key Eceh
word ts fouur bytes ard t e totol
ke scheolule y worrds fon
the 128 btt key The
Cvphen consists ofN rounds herneEhe
numbe of rrounols olepenols on fhe
key (erqth : 10 rTourcs fo o
Page-2
6 yte tcey, 1 vound fon c39- bytecey ano 14 rounols erra

o3-byte key The frst N-1 rcounds onatst of foun dstenct trang
termaen funlonsi sub Bytes, Shott Rour, mex colum ns anol ncckoun
cley The fMal rrocend contauns only thrree trrournsfdrmatao N a

therte s a tnctDal stngle ttranafermodro) (Accl Rounoduey) beisee


he ftst rronol uhech caun be consiolerteol Rouol 0. Eaoh rrane
Homoton Caees one on mote Mx matrieer as tmput ono

rrodueer a x y matriy as Gutput TheKey eypanjie funetto n

enerates N+1 rround e eoeh of whten t'so elistfnot Mxy

matriEach rounol Key.senve y one of the tnputs o the Ao


Rounel Ke transfomatton n eaeh rrounod

Detauleo struectune
N

eceh resuhol ane)


lnel tCal?ng the seouenee of tttansforzmakron tn
olaffernens
the corznesponoleno decrypt2en funct2e. f e r
Showmq
CTe ogeolone of peemutet2e) ano three of Swbstztute
stooes
a Substttute bytep- Useg a n S-bCx fo perefoem c byte - by- b y t e

Substrtt2on ofthe bleCK


Shift Rows - Asmple perzmutectio)
m x Columns A Substtutzo) tnout makeg e Of artthmetae
Oven 6F( 2
AccRoundkey-ASmple bttwrte xOR of the cururmend bloew4
a pornton of the expandedl key

The stf(uetuune ts qute Smplefo both encrypt2en and olee


yptonthe ciphen begns w#han AcklRourd key stege foltowe b
lnsne rat inds ncut eoeh tnoluo/e a l fouur
steq fot(ouweol by aterth
TTOunel of these stoges Only the Addkounckey Stee makep sute Use
of n ekey forn ths reoson the ctphen begin Cunol encl wth aan
AoldRound Stooe TheadeRoundliey Sterge is tn effecttve, a form
Of Vernam cphen and by tfef weulol not be fere m'oleuble .the
othen thrree stages togethen Pro vioc Co sToD olPfuPIO D ono
noeineourtty

You might also like