Aesss
Aesss
This Lecture
Why AES?
NIST Criteria for potential candidates
The AES Cipher
AES Functions and Inverse Functions
AES Key Expansion
Implementation Aspects
AES Security and Strength
Why AES?
Symmetric block cipher, published in 2001
Intended to replace DES and 3DES
DES is vulnerable to differential attacks
3DES has slow performances
General Security
Software Implementations
Hardware Implementations
Restricted-Space Environments
Attacks on Implementations
Encryption vs. Decryption
Key Agility
Potential for Instruction-Level Parallelism
Other versatility and Flexibility
NIST selected Rijndael as the proposed AES algorithm
4/16/128 6/24/192
10
12
8/32/256
14
44/176
60/240
52/208
k0
k4 k8
k12
k1
k2
k3
k5 k9 k13
k6 k10 k14
k7 k11 k15
w0 w1 w2
w42 w43
State array
Output
o0
o4 o8
o12
o1
o2
o3
o5 o9 o13
o6 o10 o14
o7 o11 o15
plaintext
Shift rows
Shift rows
Shift rows
Mix columns
Cipher
text
Mix columns
Add Round key
W[4,7]
key
Round 9
Substitute bytes
Round 1
Substitute bytes
W[36,39]
Substitute bytes
W[40,43]
ciphertext
key
Round 9
Round 1
plaintext
W[0,3]