Lect. 8 : Advanced Encryption Standard

Slides:



Advertisements
Similar presentations
Symmetric Encryption Prof. Ravi Sandhu.
Advertisements

Encryption.
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Anupam Saxena Associate Professor Indian Institute of Technology KANPUR
Computer Science Lecture 7 Rijndael – Advanced Encryption Algorithm Professor Wayne Patterson Howard University Fall 2009.
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
Chapter 3  Symmetric Key Cryptosystems 1 Overview  Modern symmetric-key cryptosystems o Data Encryption Standard (DES)  Adopted in 1976  Block size.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Announcements: Quiz grades entered Quiz grades entered Homework 4 updated with more details. Homework 4 updated with more details. Discussion forum is.
History Applications Attacks Advantages & Disadvantages Conclusion.
Advanced Encryption Standard
Cryptography and Network Security
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
Encryption CS 465 January 9, 2006 Tim van der Horst.
1 A simple algebraic representation of Rijndael Niels Ferguson Richard Schroeppel Doug Whiting.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
AES clear a replacement for DES was needed
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
1 CS 255 Lecture 4 Attacks on Block Ciphers Brent Waters.
RIJNDAEL Arta Doci University Of Colorado.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Symmetric Encryption and Message Confidentiality
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
Cryptography and Network Security
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Fifth Edition by William Stallings
Data Security and Encryption (CSE348) 1. Lecture # 9 2.
The Advanced Encryption Standard Part 1: Overview
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Encryption / Decryption on FPGA Midterm Presentation Written by: Daniel Farcovich ID Saar Vigodskey ID Advisor: Mony Orbach Summer.
Zong-Cing Lin 2007/10/31.  Algorithm Description  Why chose Rijndael  Reference.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Triple DES.
AES (Rijndael) Joan Daemen and Vincent Rijmen, “ The Design of
School of Computer Science and Engineering Pusan National University
The Advanced Encryption Standard: Rijndael
Cryptography and Network Security
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
Advanced Encryption Standard
Advanced Encryption Standard
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Private Key Algorithms Feistel Networks AES
Advanced Encryption Standard
Presentation transcript:

Lect. 8 : Advanced Encryption Standard http://csrc.nist.gov/CryptoToolkit/aes/rijndael/

AES Contest AES Contest Calendar 1997 : Call For AES Candidate Algorithms by NIST 128-bit Block cipher 128/192/256-bit keys Worldwide-royalty free More secure than Triple DES More efficient than Triple DES 1998 : 1st Round Candidates – 15 Algorithms Mars, Twofish, RC6, SAFER+, HPC, CAST256, DEAL, Frog, Magenta, Rijndael, DFC, Serpent, Crypton, E2, LOKI97 1999 : 2nd Round Candidates – 5 Algorithms MARS, RC6, Rijndael, Serpent, and Twofish 2000. 10 : Rijndael selected as the finalist 2001. 12: official publication as FIPS PUB 197 * National Institute of Standards and Technology

AES Contest 1st Round Candidates – 15 Algorithms

AES Contest 2nd Round Candidates – 5 Algorithms Cipher Submitter Structure Nonlinear Component MARS IBM Feistel structure Sbox DD-Rotation RC6 RSA Lab. Rotation Rijndael Daemen, Rijmen SPN structure Serpent Anderson, Biham, Knudsen Twofish Schneier et. al

AES Contest Vincent Rijmen AES Contest 2000. 10 : Rijndael selected as the finalist 2001. 12: official publication as FIPS PUB 197 Joan Daemen and Vincent Rijmen, “The Design of Rijndael, AES – The Advanced Encryption Standard”, Springer, 2002, ISBN 3-540-42580-2 Vincent Rijmen

SPN- Structure Block Cipher More constraints on the round function: must be invertible Relatively new architecture than Feistel-structure Faster than Feistel-structure Parallel computation Typically E  D

Advanced Encryption Standard (AES) AES External Format Plaintext block 128 bits Ciphertext block 128 bits AES Key 128, 192, 256 bits

AES Architecture SPN-type block cipher Block size = 128 bits Plaintext AddRoundKey SPN-type block cipher Block size = 128 bits Key size / No. round 128 bits  10 rounds 192 bits  12 rounds 256 bits  14 rounds Round transformation SubBytes ShiftRow MixColumn AddRoundKey Initial Key SubByte ShiftRow Repeat N-1 rounds MixColumn Round key AddRoundKey SubByte ShiftRow Final round Final round key AddRoundKey Ciphertext

Finite Field Every nonzero element has multiplicative inverse. Prime number, Zp Gcd, Extended Euclidean Algorithm Representation of n-bit data Binary Hexadecimal Polynomial GF(p), GF(2n) over irreducible polynomial Ex) GF(23) /x3 + x + 1 Addition and multiplication AES uses GF(28) /f(x)= x8 + x4 + x3 + x +1

The input block is XOR-ed Round Transformation S-box  c(x) b0j a00 a01 a0j a02 a03 b00 b01 b02 b03 a00 a02 a03 b00 b02 b03 a10 a11 a12 a13 b10 b11 b12 b13 a10 a1j a12 a13 b10 b1j b12 b13 aij bij a20 a21 a22 a23 b20 b21 b22 b23 a20 a2j a22 a23 b20 b2j b22 b23 a30 a31 a32 a33 b30 b31 b32 b33 a30 a3j a32 a33 b30 b3j b32 b33 SubBytes MixColumns No shift a00 a01 a02 a03 a00 a01 a02 a03 Cyclic shift by 1 byte a10 a11 The input block is XOR-ed with the round key a12 a13 a11 a12 a13 a10 Cyclic shift by 2 byte a20 a21 a22 a23 a22 a23 a20 a21 AddRoundKey Cyclic shift by 3 byte a30 a31 a32 a33 a33 a30 a31 a32 ShiftRows

AddRoundKey The input block is XOR-ed with the round key

Best Known Attack related-key attack can break 256-bit AES with a complexity of 2119, which is faster than brute force but is still infeasible. 192-bit AES can also be defeated in a similar manner, but at a complexity of 2176. 128-bit AES is not affected by this attack. chosen-plaintext attack can break 8 rounds of 192- and 256-bit AES, and 7 rounds of 128-bit AES, although the workload is impractical at 2128 - 2119. (Ferguson et al., 2000).

Feistel vs. SPN Structures Feistel structure SPN structure 64-bit block 128-bit block 64-bit block 128-bit block DES/3DES BLOWFISH CAST128 RC5 SEED TWOFISH CAST256 RC6 MARS SAFER SAFER+ IDEA AES CRYPTON SERPENT Fewer constraints on the round function More cryptanalytic experience Serial in nature Typically E = D with round keys in reverse order More constraints on the round function: must be invertible Less cryptanalytic experience: relatively new architecture more parallel computation Typically E  D