Key Expansion Key size = 192 bits = 6 x 32 bits = 6 words (Nk=6)

Slides:



Advertisements
Similar presentations
A Clear Text Explanation of the AES Cipher Does a Rijndael By Any Other Name Still Smell As Sweet? October 9 th, Houston Perl Mongers Robert Stone.
Advertisements

An implementation of IEEE802.11a WLAN system using Subword Parallelism and its Quantization Error Evaluation Zaipeng Xie Muwu Hou Daphne J Franklin.
Lecture #9 EGR 277 – Digital Logic
 A  p q B  C D  r F G E t I J H s u K    P.
MD5 Generation Auto-Generated Slides To Visualize MD5 Hash Generation by Chris Fremgen.
MD5 Generation Auto-Generated Slides To Visualize MD5 Hash Generation by Chris Fremgen.
MD5 Generation Auto-Generated Slides To Visualize MD5 Hash Generation by Chris Fremgen.
MD5 Generation Auto-Generated Slides To Visualize MD5 Hash Generation by Chris Fremgen.
This Lecture: AES Key Expansion Equivalent Inverse Cipher Rijndael performance summary.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Binomial Theorem. Go to slide 11 Introduction Notice.
Overview of the Circuit Multiplier Subtractor Comparator Multiplexer.
Chapter 28 Activity Diagrams Model processes: –Business processes –Workflow –Data flow –Complex algorithms.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
PYTHON PROGRAMMING Week 10 – Wednesday. TERMS – CHAPTER 1 Write down definitions for these terms:  Computation  Computability  Computing  Artificial.
 Programmed for educational purposes  Efficiency sacrificed for clarity/explanation.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
brazonarizcorazóndedo rodillaorejacabezapierna rota estómagoojomanospelo piecerebropulmonesboca.
Scientific Notation. Simplify: Scientific Notation Expressed as a number between 0 and 10 times a power of positive - a very large number 10 negative.
HOMEWORK 08D Block diagrams Problem 1: Problem 2:
AES (Advanced Encryption Standard) By- Sharmistha Roy M.Tech, CSE 1 st semester NIT, Agartala.
SUNY Oneonta Data Structures and Algorithms Visualization Group MD5 Generation Auto-Generated Slides To Visualize MD5 Hash Generation by Chris Fremgen.
Section 1.4 Angles & Their Measures 1/13. Parts of the Angle Possible Names 1 Angle Symbol 2/13.
Do Now Find the domain & range:. Answers to Homework
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 5B Block Diagrams HASH Example.
Lecture 3 RTL Design Methodology Transition from Pseudocode & Interface to a Corresponding Block Diagram.
Warm Up Simplify the expressions: 1.z -2 x y -2 2.(x 3 ) -2 3.g -5 h x b 4.
1 Low Cost Design of Advanced Encryption Standard (AES) Processor Ming-Chih Chen Department of Electronic Engineering National Kaohsiung First University.
Plot Diagram.
Merkle-Hellman
CS480 Cryptography and Information Security
RTL Design Methodology Transition from Pseudocode & Interface
ROUNDING 54 ______ 26 ______ 39 ______ 13 ______ 99 ______ 07 ______
Cryptography and Network Security
Secret Key Systems (block encoding)
Network Security.
4.6 – Formalizing Relations and Functions
The Advanced Encryption Standard: Rijndael
Part 10 Q46 to Q50 of National 5 Prelim
Parallel Analysis of the Rijndael Block Cipher
CS 465 AES Last Updated: Sep 7, 2017.
Some of this slide set is from Section 2,
محاسبات عددی و برنامه نویسی
نجاح وفشل المنشآت الصغيرة
XLite 9210B Datalogger & Controller
Expanded Notation , , , , , , Name: _________________________________
Binary Lesson 6 Classful Subnetting
ECE 545 Lecture 11 Design of Controllers Finite State Machines and Algorithmic State Machine (ASM) Charts.
Would be good homework on the inverse day!!!
RTL Design Methodology Transition from Pseudocode & Interface
The Encryption Standards
Network Security.
Homework Questions? *Skills check tomorrow*
DES (Data Encryption Standards)
Block Ciphers: DES and AES
RTL Design Methodology Transition from Pseudocode & Interface
Do Now: Simplify the expression.
Skills Check Multiplying and Binomial Expansion
RTL Design Methodology Transition from Pseudocode & Interface
= x 2 = = 20 4 x 5 = = 16 4 x 4 = = 18 6 x 3 = = 12 2 x 6 = 12.
Going round in circles… Going round in circles…
DES (Data Encryption Standard)
Warm-Up #21 (Tuesday, 10/20) Given 3x + y = 3, if y = 3 find the value of x 4x + 2x – 2 = 42 solve for x.
Extendable hashing M.B.Chandak.
Dan McCreary October, 2008 Version 0.2
Inequalities TRUE FALSE.
8Y Wednesday Trails to the West
Solve Quadratic Equations by the Quadratic Formula
Presentation transcript:

Key Expansion Key size = 192 bits = 6 x 32 bits = 6 words (Nk=6) Round key size = 128 bits ki – 32-bit words k0 k1 k2 k3 k4 k5 Key K k0 k1 k2 k3 k4 k5 k6 k7 k8 k9 k10 k11 k12 k13 k14 k15 k16 …. Round Key 0 K0 Round Key 1 K1 Round Key 2 K2 Round Key 3 K3 …. 4 words

Key Expansion (1) ki = ki-Nk  ki-1 Nk=6 …. k0 k1 k2 k3 k4 k5 k6 k7 k8

Key Expansion (2) ki = ki-Nk  f(ki-1) Nk=6 …. RotWord RotWord(a,b,c,d)=(b,c,d,a) SubWord SubWord(a,b,c,d)=(S[a],S[b],S[c],S[d]) Rcon[i/Nk] f Rcon[j] = (e[j], 00,00,00) ki = ki-Nk  f(ki-1)

Pseudocode for Key Expansion Using Notation from the Homework Specification for i=0 to Nk-1 do ki = wi end for for i=Nk to (r+1)*4-1 do if i mod Nk = 0 do ki = ki-Nk ⊕ SubWord(RotWord(ki-1)) ⊕ Rconi/Nk elsif Nk=8 and i mod Nk = 4 do ki = ki-Nk ⊕ SubWord(ki-1) else ki = ki-Nk ⊕ ki-1 end if

Block Diagram Notation: Sub = SubWord Rot = RotWord

Pseudocode for Key Expansion Using Notation from the Key Expansion Examples