AES Step by Step

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

AES Steps

Step By Step

we have des aes blowfish idea ide algorithm and rc5 algorithm

and so, on right

so here in this Session we are going to learn about aes

High level dia


Detailed dia steps
State Array
Now we have to learn Key Array
Above is expanded one

Lets see work flow


For each and every round 4 words

Decryption

Pl

Cipher Text
The above dia is for decryption process

1st one is Substitute Bytes

2nd one is Shift rows (LCS)

3rd one is Mix columns ---this one u don’t have in 10 th round

4th one Add Round Key

Useally what we will perform in Add round key means you will be performing XOR operation
between the plain text and key

In encryption XOR operation perfoms between plain text and key

In decryption th XOR operation perfoms between key and cipher text

Chat GPT ….AES


Sure! Here’s a simple explanation of the AES (Advanced Encryption Standard) algorithm:

Overall Concept of AES

1. Purpose: AES is a way to securely encrypt data, meaning it transforms readable information
(plaintext) into unreadable information (ciphertext) so that only authorized users can read it.

2. Block Size: AES works with fixed-size blocks of data, specifically 128 bits (or 16 bytes) at a
time.

3. Key Sizes: It uses different key lengths for encryption:

o 128 bits

o 192 bits

o 256 bits

The longer the key, the more secure the encryption.

Steps of the AES Algorithm

1. Key Expansion: The encryption key is expanded into multiple round keys, which will be used
in various steps throughout the process.

2. Initial Round:

o AddRoundKey: The first step combines the plaintext with the first round key using a
bitwise XOR operation.

3. Main Rounds (these steps are repeated several times):

o SubBytes: Each byte of the state (the data being processed) is replaced with another
byte using a substitution table (S-box).

o ShiftRows: The rows of the state are shifted to the left by varying amounts.

o MixColumns: The columns of the state are mixed together to enhance diffusion
(spreading the data).

o AddRoundKey: The current state is combined with the next round key.

4. Final Round: The last round is similar, but it skips the MixColumns step. It consists of:

o SubBytes

o ShiftRows

o AddRoundKey

Result

After all the rounds are complete, the final output is the ciphertext, which is a scrambled version of
the original plaintext. Only someone with the correct key can reverse the process to get back the
original data.
Decryption

Decryption in AES is the reverse of encryption. It uses the same steps but in the opposite order and
with the round keys applied in reverse.

Summary

In simple terms, AES is like a secure lock that transforms your data into a form that can’t be easily
read by anyone without the right key. It ensures that your sensitive information stays safe from
unauthorized acces

mam in the function (F) the output of sbox 1 and s box 2 will be added and the resulting output will
be xor with the output of Sbox 3 . at last the output of this xoer operation will be added with the
output of sbox 4 which will finally give us the 32 bits output(y).

You missed how to initialize the the p-array and Elements of S-box in the first place. We have to
initialize the them by the fractional part of pi (π) in hexadecimal number system.

DOUBT:Sister if 8 bit is xored with 8 bit then result would be of length 8 but.. After performing for
operations 3 times on total 32 bits which divided into 4 8 bits the result would be of 8 bit length. Am
I right?! Or wrong

Blow fish step by step


Agagin

You might also like