Crypto Assignment 1
Crypto Assignment 1
VI Semester
Subjet:-Engineering Cryptography(18EC744)
Title :- Assignment no 1.
Topic:-AES(Advanced Encryption Standard).
PRESENTED BY:
Karthik G K 1BI21ET015
Gagan D N 1BI22ET404 PRESENTED TO:
Prof. M.Rajeswari
HOD
Department of ETE,BIT
1 Encryption
The process of converting plaintext into ciphertext, making it unreadable without the key.
2 Decryption
The process of converting ciphertext back into readable plaintext using the correct key.
3 Key
A secret value used for both encryption and decryption.
4 Ciphertext
The scrambled, unreadable version of plaintext after encryption.
AES Algorithm Specifications
AES operates on 128-bit blocks of data, using a substitution-permutation network. This involves a series of
rounds, each composed of specific transformations.
1 Byte Substitution
Each byte in the block is replaced with a corresponding value from a predefined substitution
box (S-box).
2 Shift Rows
The bytes in each row of the block are shifted cyclically, creating a permutation.
3 Mix Columns
Each column is multiplied with a fixed matrix, performing a linear transformation.
128 bits 10
192 bits 12
256 bits 14
AES Implementation and Optimization
AES can be implemented in both software and hardware, with optimizations tailored for specific platforms.
Libraries and APIs are available for Dedicated hardware implementations Techniques like block ciphers in
various programming languages, can achieve significantly higher parallel, pipelined data processing,
providing high-level abstractions for performance by utilizing specialized and optimized key schedules
AES operations. Optimizations often circuitry and parallelism. contribute to improving AES
focus on loop unrolling, table performance.
lookups, and instruction set
extensions.
AES Security Analysis
Extensive analysis has been conducted on AES, exploring its strength against various
attacks.
Differential Cryptanalysis
Exploits differences in ciphertext to deduce the key.
Linear Cryptanalysis
Finds linear relationships between plaintext, ciphertext, and key bits.
Disk Encryption
Securing data stored on hard drives and other storage devices.
Network Security
Securing communication protocols like HTTPS and TLS.
Wireless Security
Enhancing the security of Wi-Fi networks and mobile devices.
code for AES in java
10
flow chart for that java code
The flowchart visually represents the steps involved in the Java code for AES encryption and decryption.
Key Generation
Generate a secret key using a predefined algorithm or a secure key generation method.
Encryption
Use the generated key and the encryption algorithm to transform the plaintext into ciphertext.
Decryption
Use the same key and decryption algorithm to transform the ciphertext back into plaintext.
Data Input/Output
Conclusion and Future
Developments
AES remains a cornerstone of modern cryptography, offering strong
security and efficiency. Research continues to explore its resilience
against new attacks and develop optimized implementations for evolving
platforms.
THANKYOU