1 AES Proposal : Rijndael Joan Daeman Vincent Rijmen.

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
The Advanced Encryption Standard (AES) Simplified.
Sukesh Jain – Media Informatics
Advanced Encryption Standard
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
This Lecture: AES Key Expansion Equivalent Inverse Cipher Rijndael performance summary.
1 A simple algebraic representation of Rijndael Niels Ferguson Richard Schroeppel Doug Whiting.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
AES clear a replacement for DES was needed
Advanced Encryption Standard. This Lecture Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
RIJNDAEL Arta Doci University Of Colorado.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
1  A clear a replacement for DES was needed have theoretical attacks that can break it have theoretical attacks that can break it have demonstrated exhaustive.
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
DARPA AES Finalist Algorithm: The Rijndael Block Cipher Mel Tsai University of California at Berkeley.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
AES (Advanced Encryption Standard) By- Sharmistha Roy M.Tech, CSE 1 st semester NIT, Agartala.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
The Advanced Encryption Standard Part 1: Overview
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Project characterization Encryption/Decryption on embedded system Supervisor: Ina Rivkin students: Chen Ponchek Liel Shoshan Winter semester 2014 Part.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Cryptography and Network Security Chapter 5
CS480 Cryptography and Information Security
Triple DES.
Cryptography and Network Security Chapter 5
The Advanced Encryption Standard: Rijndael
Data Security and Encryption (CSE348)
Cryptography and Network Security
Cryptography and Network Security Chapter 5
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
Cryptography and Network Security
Cryptography and Network Security Chapter 5
Cryptography and Network Security Chapter 5
The Encryption Standards
Cryptography and Network Security Chapter 5
Advanced Encryption Standard
Advanced Encryption Standard
Origins AES = current federal standard for symmetric crypto (replacing DES) DES Key size is too small The variants are just patches can use Triple-DES.
Cryptography and Network Security Chapter 5
Advanced Encryption Standard
Cryptography and Network Security Chapter 5
Presentation transcript:

1 AES Proposal : Rijndael Joan Daeman Vincent Rijmen

2 Outline zIntroduction zRijndael zRound Function zKey Schedule zEncryption & Decryption zRijndael on Modern Processors

3 Introduction zAdvanced Encryption Standard (AES) yA crypto algorithm for the twenty-first century y the algorithm must implement symmetric key cryptography as a block cipher and (at a minimum) support block sizes of 128- bits and key sizes of 128, 192, and 256 bits. yThe AES finalist candidate algorithms are MARS, RC6, Rijndael, Serpent, and Twofish. yOn October 2, 2000, Rijndael was select by the National Institute of Standards and Technology (NIST) for the proposed AES. zRijndael yRijmen & Daemen

4 Rijndael ziterated block cipher zThe block length and the key length can be independently specified to 128, 192 or 256 bits. (16, 24, or 32 bytes) zState : the intermediate cipher result zState and Key bytes arranged in rectangular array zNb : # of columns of the array (Nb : 4,6,8) Nk : # of the columns of the Cipher Key (Nk : 4,6,8)

5 zNr : # of rounds zNr = Max(Nb,Nk) + 6 z Rijndael

6 Round Function zRound function : uniform, parallel, and composed of 4 steps zEach step has its own particular function yByteSub : nonlinearity yShiftRow : inter-column diffusion yMixcolumn : inter-byte diffusion with column yRound key addition z

7 zThe final round of the cipher is slightly different. ywith the MixColumn step removed z Round Function

8 Round Step 1 : ByteSub zThe ByteSub Transformation is a non-linear byte substitution zS-box yReplace each byte with its reciprocal in the same GF(2 8 ) yA bitwise modulo-two matrix multiply is used. yThe hexadecimal number 63( ) is XORed with the result

9 Round Step 1 : ByteSub

10 zS-box Round Step 1 : ByteSub

11 zInverse S-box (InvByteSub) Round Step 1 : ByteSub

12 zRow 0 is not shifted, Row 1 is shifted over C1 bytes, Row 2 over C2 bytes and Row 3 over C3 bytes. zThe inverse of ShiftRow is a cyclic shift of the 3 bottom rows over (Nb-C1), (Nb-C2), and (Nb-C3) bytes  the byte at position j in row i moves to position (j+Nb-Ci) mod Nb no shift cyclic shift by C1(1) cyclic shift by C2(2) cyclic shift by C3(3) Round Step 2 : ShiftRow

13 zThe columns of the State are considered as polynomials over GF(2 8 ) and multiplied modulo (x 4 +1) with a fixed polynomial c(x) c(x)=‘03’x 3 +‘01’x 2 +‘01’x+‘02’ zAssume we have two polynomials over GF(2 8 ) a(x)=a 3 x 3 +a 2 x 2 +a 1 x+a 0 and b(x)=b 3 x 3 +b 2 x 2 +b 1 x+b 0 c(x)=a(x)b(x) Round Step 3 : Mixcolumn

14 zBy reducing c(x) modulo a polynomial of degree 4, the result can be reduced a polynomial of degree below 4. (M(x) = x 4 +1) x i mod (x 4 +1) = x i mod 4 zd(x) = a(x)  b(x) = d 3 x 3 +d 2 x 2 +d 1 x+d 0 Round Step 3 : Mixcolumn

15 zBytes in column are linearly combined zInvMixColumn yEvery column is transformed by multiplying it with a specific polynomial d(x) d(x)=‘0B’x 3 +‘0D’x 2 +‘09’x+‘0E’ yc(x)  d(x) = ‘01’ mod M(x) Round Step 3 : Mixcolumn

16 zThe Round Key is derived from the Cipher Key. zThe Round Key length is equal to the block length Nb. zAddRoundKey is its own inverse. Round Step 4 : Round Key Addition

17 Key Schedule zThe total number of Round Key bits is equal to the block length multiplied by the number of rounds plus 1. yEx : Nb= 4 (128 bits), Nr=10  Round Key bits = 128*11=1408 bits zThe Cipher Key is expanded into Expanded Key zRound Keys are taken from the Expanded Key ythe first Round Key consists of the first Nb words the second one of the following Nb words, and so on. zThe Expanded Key is a linear array of 4-byte words and is denoted by W[Nb*(Nr+1)]. zThe key expansion function depends on the value of Nk yNk ≦ 6 yNk > 6

18 zKey Expansion yNk ≦ 6 x Key Schedule  The first Nk words contain the Cipher Key

19 z Key Schedule  RotByte(W[i])  ( a,b,c,d )  ( b,c,d,a )  SubByte(W[i])  Rijndael S-box to the byte at the corresponding position in the input word  Round constants  Rcon[i] = ( RC[i], ‘00’, ‘00’, ‘00’)  RC[1]=1  RC[i]= x  (RC[i-1]) = x i-1  RC[i]  GF(2 8 )

20 Key Schedule zNk > 6 y

21 zRound Key Selection yRound Key i is given by the Round Key buffer words W[Nb*i] to W[Nb*(i+1)] yEx : Nb=4 Key Schedule

22 Encryption

23 Decryption

24 Decryption

25  The ByteSub step and the ShiftRow step can change their order without affecting the cipher.  A BSMA BSMA BSMA …….. BSMA BSA A SBMA SBMA SBMA ………SBMA SBA  ASB AMSB AMSB …….. AMSB AMSB A  y = [x  c]  k x’ = [y  d]  k’  x’ = {{[x  c]  k}  d }  k’ = [x  c  d ]  [k  d ]  k’  if k’ = k  d  x’ = x Decryption xy y x’

26 Rijndael on Modern Processors

27 Rijndael on Modern Processors  Define tables T 0 to T 3 :  4 tables with byte  total : 4KByte

28 Rijndael on Modern Processors

29 Rijndael in Hardware