Lecture 11
Lecture 11
PUBLIC KEY
CRYPTOGRAPHY
Prof. Saurabh Kulkarni
Department of Artificial Intelligence & Data Science
AGENDA FOR THE DAY
• Recap of the last lecture
• AES encryption in detail
• Modes of block cipher operations
• Summary/ Conclusion
AES ALGORITHM DETAILS:
SUBSTITUTE BYTES TRANSFORMATION
• The forward substitute byte transformation, called
SubBytes, is a simple table lookup
• AES defines a 16*16 matrix of byte values, called an S-
box that contains permutation of all possible 256 8-bit
values
• Each individual byte of State is mapped into a new byte
in the following way: The leftmost 4 bits of the byte are
used as a row value and the rightmost 4 bits are used as
a column value
• These row and column values serve as indexes into the S-
box to select a unique 8-bit output value
SUBBYTE EXAMPLE