0% found this document useful (0 votes)
11 views13 pages

Crypto Assignment 1

Uploaded by

lithesh.roy07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views13 pages

Crypto Assignment 1

Uploaded by

lithesh.roy07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

BANGALORE INSTITUTE OF TECHNOLOGY

K. R. Road, V. V. Pura, Bengaluru-560004


DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
2024-2025

VI Semester
Subjet:-Engineering Cryptography(18EC744)
Title :- Assignment no 1.
Topic:-AES(Advanced Encryption Standard).

PRESENTED BY:
Karthik G K 1BI21ET015
Gagan D N 1BI22ET404 PRESENTED TO:
Prof. M.Rajeswari
HOD
Department of ETE,BIT

Monday 12 August 2024 Dept of Electronics & Telecomunication 1


Introduction to AES
The Advanced Encryption Standard (AES) is a symmetric block cipher widely
used for data encryption. It's considered a secure and efficient algorithm,
adopted by many organizations and governments worldwide. Advanced
Encryption Standard (AES) is a highly trusted encryption algorithm used to
secure data by converting it into an unreadable format without the proper key.
Developed by the National Institute of Standards and Technology
(NIST), AES encryption uses various key lengths (128, 192, or 256 bits) to
provide strong protection against unauthorized access. This data
security measure is efficient and widely implemented in securing internet
communication, protecting sensitive data, and encrypting files. AES, a
kg
cornerstone of modern cryptography, is recognized globally for its ability to
keep information safe from cyber threats.
Encryption and Decryption Principles

AES employs a series of mathematical operations to transform plaintext into


ciphertext, and vice versa.

1 Encryption
The process of converting plaintext into ciphertext, making it unreadable without the key.

2 Decryption
The process of converting ciphertext back into readable plaintext using the correct key.

3 Key
A secret value used for both encryption and decryption.

4 Ciphertext
The scrambled, unreadable version of plaintext after encryption.
AES Algorithm Specifications
AES operates on 128-bit blocks of data, using a substitution-permutation network. This involves a series of
rounds, each composed of specific transformations.

1 Byte Substitution
Each byte in the block is replaced with a corresponding value from a predefined substitution
box (S-box).

2 Shift Rows
The bytes in each row of the block are shifted cyclically, creating a permutation.

3 Mix Columns
Each column is multiplied with a fixed matrix, performing a linear transformation.

4 Add Round Key


The current round key is XORed with the state, combining the key material.
Key Sizes and Rounds
AES supports three key sizes: 128 bits, 192 bits, and 256 bits, each
corresponding to a different number of rounds.

Key Size Rounds

128 bits 10

192 bits 12

256 bits 14
AES Implementation and Optimization
AES can be implemented in both software and hardware, with optimizations tailored for specific platforms.

Software Implementation Hardware Implementation Optimization Strategies

Libraries and APIs are available for Dedicated hardware implementations Techniques like block ciphers in
various programming languages, can achieve significantly higher parallel, pipelined data processing,
providing high-level abstractions for performance by utilizing specialized and optimized key schedules
AES operations. Optimizations often circuitry and parallelism. contribute to improving AES
focus on loop unrolling, table performance.
lookups, and instruction set
extensions.
AES Security Analysis
Extensive analysis has been conducted on AES, exploring its strength against various
attacks.

Differential Cryptanalysis
Exploits differences in ciphertext to deduce the key.

Linear Cryptanalysis
Finds linear relationships between plaintext, ciphertext, and key bits.

Side Channel Attacks


Exploits physical characteristics of the implementation, such as timing
variations or power consumption.
AES Applications and Use Cases
AES finds widespread use in diverse security applications, protecting sensitive data across various domains.

Disk Encryption
Securing data stored on hard drives and other storage devices.

Network Security
Securing communication protocols like HTTPS and TLS.

Data Storage Security


Protecting databases, filesystems, and cloud storage services.

Wireless Security
Enhancing the security of Wi-Fi networks and mobile devices.
code for AES in java
10
flow chart for that java code
The flowchart visually represents the steps involved in the Java code for AES encryption and decryption.

Key Generation
Generate a secret key using a predefined algorithm or a secure key generation method.

Encryption
Use the generated key and the encryption algorithm to transform the plaintext into ciphertext.

Decryption
Use the same key and decryption algorithm to transform the ciphertext back into plaintext.

Data Input/Output
Conclusion and Future
Developments
AES remains a cornerstone of modern cryptography, offering strong
security and efficiency. Research continues to explore its resilience
against new attacks and develop optimized implementations for evolving
platforms.
THANKYOU

You might also like