0% found this document useful (0 votes)
3 views9 pages

Introduction To AES (Advanced Encryption Standard) : Paridhi Shrestha

The Advanced Encryption Standard (AES) is a symmetric encryption algorithm that operates on 128-bit blocks with key lengths of 128, 192, or 256 bits, ensuring secure communication in digital systems. AES employs multiple rounds of substitution, permutation, and mixing to transform plaintext into ciphertext, providing strong resistance against various cryptographic attacks. It is widely used in applications such as secure messaging, file encryption, and digital transactions, and is trusted by government and commercial entities globally.

Uploaded by

sandeshspk46
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views9 pages

Introduction To AES (Advanced Encryption Standard) : Paridhi Shrestha

The Advanced Encryption Standard (AES) is a symmetric encryption algorithm that operates on 128-bit blocks with key lengths of 128, 192, or 256 bits, ensuring secure communication in digital systems. AES employs multiple rounds of substitution, permutation, and mixing to transform plaintext into ciphertext, providing strong resistance against various cryptographic attacks. It is widely used in applications such as secure messaging, file encryption, and digital transactions, and is trusted by government and commercial entities globally.

Uploaded by

sandeshspk46
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Introduction to AES (Advanced Encryption

Standard)

Paridhi Shrestha

January 30, 2025


Introduction to AES

▶ The Advanced Encryption Standard (AES) is a widely used


symmetric encryption algorithm.
▶ Developed to ensure secure communication in modern digital
systems.
▶ Operates on fixed block sizes of 128 bits, with key lengths of
128, 192, or 256 bits.
▶ Utilizes substitution, permutation, mixing, and key addition to
ensure data security.
▶ AES is widely adopted in applications like secure messaging,
file encryption, digital transactions, and VPNs.
▶ Considered secure against all known practical attacks when
properly implemented.
AES Overview and Round Structure

Figure: Overview of AES (left) and the structure of a single round (right).
AES Key Sizes and Rounds

▶ AES supports three key sizes:


▶ AES-128: 128-bit key (10 rounds)
▶ AES-192: 192-bit key (12 rounds)
▶ AES-256: 256-bit key (14 rounds)
▶ Each round involves the operations of SubBytes, ShiftRows,
MixColumns, and AddRoundKey (except for the final round,
which omits MixColumns).
▶ The number of rounds determines the complexity and security
of the algorithm.
Understanding the AES Process
▶ Input: A 16-byte (128-bit) plaintext block is prepared for
encryption.
▶ Key Expansion: The encryption key is expanded to generate
round-specific keys.
▶ Initial Transformation: The plaintext undergoes an XOR
operation with the initial round key.
▶ Rounds (N = 10, 12, or 14):
▶ SubBytes: Each byte is replaced using a substitution box
(S-Box).
▶ ShiftRows: Rows are shifted to create diffusion.
▶ MixColumns: Columns are mixed for additional security
(except in the final round).
▶ AddRoundKey: A unique round key is applied via XOR.
▶ Final Round: Similar to other rounds but omits the
MixColumns step.
▶ Output: A 16-byte (128-bit) ciphertext is produced.
Security Features of AES

▶ AES provides strong security with a high degree of resistance


to brute-force attacks due to large key sizes (128, 192, or 256
bits).
▶ The algorithm is efficient in both hardware and software
implementations.
▶ AES is secure against common cryptographic attacks, such as
differential and linear cryptanalysis.
▶ AES’s key expansion and round structure make it resilient to
attacks such as the meet-in-the-middle or side-channel
attacks.
▶ AES is widely trusted and is used by government agencies and
commercial entities worldwide.
Applications of AES

▶ Data Encryption: Used for encrypting sensitive data in


storage and during transmission.
▶ Secure Communication: Powers technologies like TLS/SSL
and IPsec for secure internet communications.
▶ Digital Transactions: Used in payment systems,
e-commerce, and banking applications for transaction security.
▶ File Encryption: Commonly used in software like TrueCrypt
and BitLocker for encrypting personal files and disk volumes.
▶ Wireless Security: Secures wireless networks using WPA2,
providing confidentiality and integrity.
AES vs. Other Encryption Algorithms

▶ AES vs. DES: AES is more secure and efficient than the
older Data Encryption Standard (DES), which uses a 56-bit
key and is vulnerable to brute-force attacks.
▶ AES vs. RSA: AES is symmetric, meaning it uses the same
key for both encryption and decryption, while RSA is
asymmetric and uses a pair of keys (public and private). AES
is faster, making it suitable for bulk data encryption.
▶ AES vs. Twofish: AES and Twofish are both block ciphers
with similar security levels, but AES has been adopted more
widely due to its efficiency and standardization by NIST.
Key Takeaways

▶ AES transforms plaintext into ciphertext through multiple


rounds of substitution, permutation, and mixing.
▶ Each round uses a unique key derived from the key expansion
process.
▶ AES is secure, efficient, and widely adopted in both
commercial and governmental applications.
▶ The choice of AES key size (128, 192, or 256 bits) influences
the number of rounds and the algorithm’s security level.
▶ AES continues to be a cornerstone of modern cryptographic
systems.

You might also like