Mod 2 AES
Mod 2 AES
Security
Unit - 2
• The plain text and the cipher text are the same
size.
Advanced Encryption Standard (AES)
Key Features of AES
➢ Key Lengths: It supports key lengths of 128, 192, and 256 bits.
For use in AES encryption, a single initial key can be expanded into a series of
round keys using the AES (Advanced Encryption Standard) key expansion
technique.
These round keys are needed for each round of AES encryption and decryption.
The AES key expansion method receives a four-word (16-byte) key and returns a
linear array of 44 words (176 bytes).
This is sufficient to provide both the initial AddRoundKey step and a four-word
round key for each of the cipher's ten rounds.
Key
Expansion
Round Key in AES
How algorithm works?
● Initial Key − The algorithm makes use of an initial key. Depending on the level of security needed, this key's length
can range from 128 to 256 bits.
● Round Constants − The approach makes use of a set of round constants, which are predefined values used in the
key expansion process.
● Word Size − The key divides words into individual blocks. A word typically has 32 bits in it.
For example, four 32-bit words are created from a 128-bit key.
● Key Schedule − The term "key schedule" refers to a set of round keys generated using the key expansion process.
The initial round key and the extra round keys that were derived from it are both included in this schedule.
How algorithm works?
● Expansion Rounds − The algorithm performs several tasks in each expansion round,
such as −
a. RotWord − This function rotates the bytes in a word.
b. SubWord − Applyes a substitution operation using a predetermined S-box.
c. Rcon − XORs the word using a round constant.
● Round Keys − Each round key is used in the corresponding round of AES encryption
or decryption.
Overall, the key expansion method increases security and prevents cryptographic attacks
by ensuring that each AES encryption and decryption round has a unique round key.
Round Constant in AES - 128
AES Decryption :
The stages in the rounds can be easily undone as these stages have an opposite to it
which
when performed reverts the changes.Each 128 blocks goes through the 10,12 or 14
rounds
depending on the key size.
The stages of each round in decryption is as follows :