AES (Advance Encryption Standard)

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
The Advanced Encryption Standard (AES) Simplified.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
What is Encryption? - The translation of data into a secret code - To read an encrypted file, you must have access to a secret key or password that enables.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
By Sean Fisk.  Not a new technology  Inherently insecure  In recent years, increased popularity.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Lecture 23 Symmetric Encryption
Ln Lou Modern Cyphers. 0. Security System Key Plain Text Cipher Text Encryption (K × P → C) Decryption (K × C → P)
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Network Security Lecture 3 Secret Key Cryptography
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Encryption / Decryption on FPGA Midterm Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Symmetric-Key Cryptography CS 161: Computer Security Prof. Raluca Ada Popa Sept 13, 2016.
Encryption with Keys and Passwords
Symmetric and Asymmetric Encryption
Provides Confidentiality
Opracowanie językowe dr inż. J. Jarnicki
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Triple DES.
School of Computer Science and Engineering Pusan National University
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
Reactive Android Development
HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA. HEY DOUG HOW ARE YOU? NKE JUAM NUC GXK EUA.
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Unit -1.
Crypto 101 & Password Cracking
M3: Encryption r By Andrew Stringer.
Symmetric Key Block Ciphers
Cryptography Survey.
Cryptography and Security Fall 2009 Steve Lai
PART VII Security.
Rivest, Shamir and Adleman
Chapter 6 Cryptography CISSP Study Guide BIS 4113/6113.
Security.
Cryptography Survey.
RFID Security Tony Arous Vincent Yu.
Simple Encryption- Lesson 5
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
SOFTWARE IMPLEMENTATION OF OCB MODE
Cryptography a Presentation Prepared by Vytautas Kondratas.
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Advanced Encryption Standard
Advanced Encryption Standard
Fluency with Information Technology Lawrence Snyder
Modern Cryptography.
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Symmetric Encryption or conventional / private-key / single-key
Advanced Encryption Standard
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

AES (Advance Encryption Standard) Directed by: Sina Manavi

Out Line : What is AES? AES features: AES vs. DES AES vs. RSA Summary Q & A

What is AES? After Des Cracked, Triple-DES which was slow they announced in competition for calling algorithms and between 15 algorithms on October 2000 Rijndeal which was invented by two Belgians, Joan Daemen, Vincent Rijmen. On 2002 Rijndael became AES. Rijndael is free in commercial and non-commercial use

AES features : designed simple Low memory cost High speed algorithm The key used to decrypt and encrypt is same Cipher text and plain text are same size Fast both in Software and Hardware

AES vs. DES

AES vs. RSA AES is a Symmetric block cipher algorithm ,a supersedes of DES. This cipher is good for encoding and decoding files, documents, and etc. Reliability and high performance made it distinct between other methods. On the other hand if you wish to use AES in communication, because of the Key exchange problem this problem is solved by using a asymmetric algorithm such as RSA. Message is encoded by a private key and the receiver decode it with the public key. Although asymmetric algorithms are slow, we can use them for exchanging the key and encode the data with symmetric algorithm,

Summary DES is really old while AES is relatively new DES is breakable while AES is still unbreakable DES uses a much smaller key size compared to AES DES uses a smaller block size compared to AES DES uses a balanced Feistel structure while AES uses substitution-permutation

Q & A