SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
The Advanced Encryption Standard (AES) Simplified.
Block Ciphers and the Data Encryption Standard
Data Encryption Standard (DES)
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
AES clear a replacement for DES was needed
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Lecture 23 Symmetric Encryption
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Network Security Lecture 3 Secret Key Cryptography
Data Security and Encryption (CSE348) 1. Lecture # 9 2.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Cryptography and Network Security Chapter 5
Triple DES.
Cryptography and Network Security
School of Computer Science and Engineering Pusan National University
Cryptography and Network Security Chapter 5
Unit -1.
Cryptography and Network Security
Cryptography and Network Security
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Lecture 6 Overview.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
Cryptography and Network Security Chapter 5
Advanced Encryption Standard
Block Ciphers: DES and AES
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
Advanced Encryption Standard
Cryptography and Network Security Chapter 5
Origins AES = current federal standard for symmetric crypto (replacing DES) DES Key size is too small The variants are just patches can use Triple-DES.
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5
Presentation transcript:

SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI SMX Algorithm: A Novel Approach to Avalanche Effect on Advanced Encryption Standard AES RESEARCH PRESENTATION SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI

AES DES Failed, trust broken, 3DES was a temporary solution. NIST in 1997 issues a call for proposals for a new Advanced Encryption Standard. Requirements: Security better or equal to 3DES, Improved efficiency. Mustbe a symetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. Evaluation criteria: include security, computational efficiency, memory requirements, hardware and software suitability, and flexibility. In first round, 15 proposals were accepted, out of which in 2nd round 5 algorithms were shortlisted and out of them Rijndeal was proposed as AES developed by cryptographers from Belgium, i.e Dr. Joan Daemen and Dr.Vincent Rijmen.

AES AES uses block length of 128bits and a key length that can be 128, 192 or 256 bits. Substitute Bytes: Uses S-box to perform byte by byte substitution of block. Shift Rows: Simple permutation row by row. Mix columns: Substitution that alters each byte in column as a function of all of bytes in column. Add Round Keys: Simple bitwise XOR of current block with a portion of expanded key. For both encryption and decryption, the cipher begins with an Add Round Key stage, followed by Nine rounds that each includes all four stages, Followed by a tenth round of three stages. Only the Add Round Key stage makes use of the key. For this reason, the cipher begins and ends with an Add Round Key stage. Advantage: Each stage is easily reversible.

AES STRUCTURE

AES STRUCTURE

AES STRUCTURE

problem statement Use of static S-Box IN aes NO RANDOMNESS IN THE OUTPUT Prone to attacks

PROPOSED METHODOLOGY Dynamic S-Box : 16 byte KEY 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Sum =KEY[0]+KEY[1]+…..+KEY[15] Index=Sum %16 Dynamic Sbox=Static Sbox xor KEY[Index]

Encryption ALGORITHM OF PROPOSED smx aes • Chose a master key for AES. • Compute sum of each round key and mod with 16 to get the index of the round key. •for i= 1 to 10 sum[i]=RoundKey[0]+RoundKey[1]+........+RoundKey[15]. • index=sum[i]%16. • Compute New SMXS-Box, where each cell is equal to XOR with index of the key. New SMXSbox=InvSboxAES⊕RoundKey[index]. • Continue as described in the AES algorithm.

DECRYPTION ALGORITHM OF PROPOSED smx aes • Chose a initial key for AES. • Compute sum of each round key and mod with 16 to get the index of the round key. • for i= 1 to 10 sum[i]=RoundKey[0]+RoundKey[1]+........+RoundKey[15]. • index=sum[i]%16. • Compute New SMXS-Box, where each cell is equal to XOR with index of the key. New SMXSbox=InvSboxAES⊕RoundKey[index]. • Computing inverse INV New SMXSbox = INV(InvSboxAES⊕ RoundKey[index]). • Continue as described in the AES algorithm.

Avalanche effect = (number of flipped bits * 100 total number of bits) Avalanche effect, is the measure of the number of bits flipped in the ciphertext when one bit of the plaintext is changed. The measure of the output bits should be changed 50% with respect to the input bits. Avalanche effect = (number of flipped bits * 100 total number of bits)

AVALANCHE EFFECT of normal aes

AVALANCHE EFFECT of dynamic aes

AVALANCHE EFFECT of proposed smx aes

COMPARISON OF NORMAL AES, DYNAMIC AES, AND PROPOSED smx AES based on plaintext 20 % gain in comparison of dynamic AES and 35 % gain in comparison of normal AES.

COMPARISON OF DYNAMIC AES AND PROPOSED AES based on plaintext The range of variations in dynamic AES is 17.19 where as in proposed SMX AES is 13.29, a gain of 3.9 points.

COMPARISON OF DYNAMIC AES AND PROPOSED AES based on master key

Simulation time of all three algorithms Encryption time gain in SMX AES in comparison of dynamic AES is 0.00264615 seconds. Decryption time gain in SMX AES in comparison of dynamic AES is 0.000893 seconds. 0.02036 0.02062 0.02234 0.02122 0.01969 0.02033

conclusion SMX AES shows that there is 20% gain in comparison of dynamic AES and 35 % gain in comparison of normal AES. The range of variations in dynamic AES is 17.19 where as in proposed SMX AES is 13.29, a clear gain of 3.9 points in SMX AES. The most significant time gain test results show that encryption time gain in SMX AES in comparison of dynamic AES is 0.00264615 seconds. Similarly, decryption time gain in SMX AES in comparison of dynamic AES is 0.000893 seconds.