Final
Final
IOT NETWORK
SECURITY ISSUE
• Choosing Microcontroller
• Components Required
• Soldering
• Testing for Connectivity & Issues
• PCB Printing
• Coding
Results Expected
AES has a fixed block size of 128 bits and a key size of 128, 192 or 256 bits,
whereas Rijndael can be specified with key and block sizes in any multiple of 32
bits, with a minimum of 128 bits and a maximum of 256 bits. AES operates on a
4×4 array of bytes, termed the state.
a) Sub Bytes - a non-linear substitution step where each byte is replaced with
another according to a lookup table (known as S Box).
b) Shift Rows - a transposition step where each row of the state is shifted
cyclically a certain number of steps.
c) Mix Columns - a mixing operation which operates on the columns of the state,
combining the four bytes in each column using a linear transformation.
d) Add Round Key - each byte of the state is combined with the round key; each
round key is derived from the cipher key using a key schedule.
• AES is 128-bits, so it separates the data into a four-by-four column
of sixteen bytes (there are eight bits in a byte and 16 x 8 = 128).
• If your message was “buy me some potato chips please” the first
block looks like this:
b m o p
u e m o
y e t
s a
k i
• Then each of the new
e a b n
keys might look
something like this
y r o g once Rijndael’s key
schedule has been
used: 14 29 1h s5
s e r 1
• Although they look like
random characters h9 9f st 9f
(and the example is
just made up) each of gt 2h hq 73
these keys is derived
from a structured
ks dj df hb
process when AES
encryption is actually
applied.
Add round key:
b m o p k i
u e m o e a b n
y e t y r o g
s a s e r 1
+
h3
jd zu 7s
s8 7d 26 2n
dj 4b 9d 9c
74 el 2h hg
Substitute bytes:
In this step, each byte is substituted according to a predetermined table
jb
n3 kf n2
9f jj 1h js
74 wh 0d 18
hs 17 d6 px
Shift rows :
jb
n3 kf n2
jj 1h js 9f
0d 18 74 wh
px hs 17 d6
Mix columns : each column has a mathematical equation applied to it in
order to further diffuse it.
Add round key (again)
After the last round key was added, it goes back to the byte substitution
stage, where each value is changed according to a predetermined table.
Once that’s done, it’s back to shift rows and moving each row to the left
by one, two or three spaces. Then it goes through the mix columns
equation again. After that, another round key is added.
With this successfully implemented in the communication interface of
the 2 atmega,s this will be highly secured
Conclusion