CSchap 4
CSchap 4
❑ Introduction
❑ 3DES
❑ Finite field arithmetic
❑ AES
▪General structure
▪Detailed structure
▪AES transformations
▪Key expansion algorithm
▪Etc.
❑ Summary
• Processes the entire data block as a single matrix during each round using substitutions and
permutation
• The key that is provided as input , is expanded into an array of forty-four 32-bit words, w[i]
Four different stages are used:
• Substitute bytes – uses an S-box to perform a byte-by-byte substitution of the block
• ShiftRows – a simple permutation
• MixColumns – a substitution that makes use of arithmetic over GF(28)
• AddRoundKey – a simple bitwise XOR of the current block with a portion of the expanded key
A.
•
Samhat
Final round of both encryption and decryption consists of only three stages
Lebanese University – Faculty of Engineering III, Semester IX
AES Encryption
Round
Example
in AES: Change
in Plaintext
in AES: Change
in Key
If we view the
key as a
The
sequence of
transformation
words, then
s These two
both
AddRoundKey operations are
AddRoundKey
and linear with
and
InvMixColumns respect to the
InvMixColumns
do not alter the column input
operate on
sequence of
State one
bytes in State
column at a
time
A. Samhat Lebanese University – Faculty of Engineering III, Semester IX
AES Decryption
❑ 3DES • AES
transformation
❑ Finite field functions
arithmetic •Substitute bytes
❑ AES structure •ShiftRows
▪General structure •MixColumns
▪Detailed structure •AddRoundKey
❑ AES key • AES implementation
expansion •Equivalent
▪Key expansion inverse cipher
algorithm •Implementation
▪Rationale aspects
A. Samhat Lebanese University – Faculty of Engineering III, Semester IX
A. Samhat Lebanese University – Faculty of Engineering III, Semester IX
A. Samhat Lebanese University – Faculty of Engineering III, Semester IX