Classical Encryption techniques

Slides:



Advertisements
Similar presentations
Cryptography and Network Security
Advertisements

Formal Verification of Hardware Support For Advanced Encryption Standard Anna Slobodová Centaur Technology This work was done while at Intel.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Advanced Encryption Standard
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
RIJNDAEL Arta Doci University Of Colorado.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Chapter 2 : Direct Link Networks (Continued). So far... Modulation and Encoding Link layer protocols Error Detection -- Parity Check.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Cryptography and Network Security
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Number Theory and Advanced Cryptography 1. Finite Fields and AES
FINITE FIELDS 7/30 陳柏誠.
Cryptography and Network Security
CPSC 3730 Cryptography and Network Security
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Monoids, Groups, Rings, Fields
SYMMETRIC CRYPTOSYSTEMS Symmetric Cryptosystems 20/10/2015 | pag. 2.
Classical Encryption techniques
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Fifth Edition by William Stallings
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
The Advanced Encryption Standard Part 2: Mathematical Background
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Last Updated: Aug 25, Implement AES Use the FIPS 197 spec as your guide o Avoid looking at code on the Internet o Challenge yourself to implement.
CS480 Cryptography and Information Security
Cryptography and Network Security Chapter 5
Cryptography and Information Security
Triple DES.
Cryptography and Network Security
School of Computer Science and Engineering Pusan National University
Cryptography and Network Security Chapter 5
Classical Encryption techniques
Chapter-2 Classical Encryption Techniques.
Simplified IDEA Cryptography and Network Security.
ADVANCED ENCRYPTION STANDARD
Data Security and Encryption (CSE348)
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
Cryptography and Network Security
CS 465 AES Last Updated: Sep 7, 2017.
Fifth Edition by William Stallings
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
The Encryption Standards
Cryptography and Network Security Chapter 5
Advanced Encryption Standard
Block Ciphers: DES and AES
Advanced Encryption Standard
Cryptography and Network Security Chapter 5
Origins AES = current federal standard for symmetric crypto (replacing DES) DES Key size is too small The variants are just patches can use Triple-DES.
Cryptography and Network Security Chapter 5
DES (Data Encryption Standard)
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5
Introduction to Modern Cryptography
Presentation transcript:

Classical Encryption techniques Symmetric Ciphers Classical Encryption techniques

AES - Finite Field Algorithm In AES, all operations are performed on 8-bit bytes the arithmetic operations of addition, multiplication, and division are performed over the finite Field GF(28) There are a total of 2n different polynomials For n=3, 23=8the polynomials in the set are

AES - Finite Field Algorithm Arithmetic follows the ordinary rules of polynomial arithmetic using the basic rules of algebra with the following two refinements. Arithmetic on the coefficients is performed modulo 2. This is the same as the XOR operation If multiplication results in a polynomial of degree greater than n-1, then then the polynomial is reduced modulo some irreducible polynomial m(x) of degree n Ex: finite field GF(23) x3+x2+1 x3+x+1 AES => GF(28) x8+x4+x3+x1+1

AES Encryption Process

AES Encryption Process

AES Data Structure

AES Data Structure

The AddRoundKey stage is, in effect, a form of Vernam cipher and by itself would not be formidable. The other three stages together provide confusion, diffusion, and nonlinearity, but by themselves would provide no security because they do not use the key.We can view the cipher as alternating operations of XOR

Ecryption

AES - Substitution

AES – S-BOX

AES – ShiftRows Transformation

MixColumns Transformation

MixColumns Transformation

AES - AddRoundKey

Inputs for Single AES Round

AES Example

AES Example

Reference books Cryptography and Network Security Principles and Practices William Stallings Network Security PRIVATE Communication in a PUBLIC World Chalie Kaufman, Radia Perlman, Mike Speciner