3..advanced Encryption Standard (AES)
3..advanced Encryption Standard (AES)
•AES performs operations on bytes of data rather than in bits. Since the block
size is 128 bits, the cipher processes 128 bits (or 16 bytes) of the input data
at a time.
A Key Schedule algorithm calculates all the round keys from the key. So the initial key is used to create
many different round keys which will be used in the corresponding round of the encryption.
Encryption
•Inverse MixColumns
•ShiftRows
•Inverse SubByte
The decryption process is the encryption process done in reverse so I will explain the steps with
notable differences.
Inverse MixColumns
•This step is similar to the Mix Columns step in encryption but differs in the
matrix used to carry out the operation.
•Inverse S-box is used as a lookup table and using which the bytes are
substituted during decryption.
• File and Disk Encryption: AES is used to encrypt files and folders on
computers, external storage devices, and cloud storage. It protects sensitive data
stored on devices or during data transfer to prevent unauthorized access.
Limitations of AES