AES Background and Mathematics CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
Advertisements

Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Hashing Algorithms: SHA-3 CSCI 5857: Encoding and Encryption.
Announcements: Quiz grades entered Quiz grades entered Homework 4 updated with more details. Homework 4 updated with more details. Discussion forum is.
 Stream ciphers o Encrypt chars/bits one at a time o Assume XOR w the key, need long key to be secure  Keystream generators (pseudo-random key) o Synchronous.
Advanced Encryption Standard
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
Announcements: Ch 3 quiz next week (tentatively Friday). Will include fields (today) Ch 3 quiz next week (tentatively Friday). Will include fields (today)Today:
1 A simple algebraic representation of Rijndael Niels Ferguson Richard Schroeppel Doug Whiting.
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
RIJNDAEL Arta Doci University Of Colorado.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Announcements: DES due Thursday. DES due Thursday. Try not to use late day, so you can study for Ch 3 quiz Friday. Try not to use late day, so you can.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Lecture 23 Symmetric Encryption
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
Cryptography and Network Security
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Number Theory and Advanced Cryptography 1. Finite Fields and AES
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Monoids, Groups, Rings, Fields
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
The Advanced Encryption Standard Part 2: Mathematical Background
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
The Advanced Encryption Standard Part 1: Overview
Understanding Cryptography by Christof Paar and Jan Pelzl Chapter 4 – The Advanced Encryption Standard (AES) ver. October 28, 2009.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
School of Computer Science and Engineering Pusan National University
Data Security and Encryption (CSE348)
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard
Advanced Encryption Standard
Introduction to Modern Cryptography
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Advanced Encryption Standard (AES)
Introduction to Modern Cryptography
Presentation transcript:

AES Background and Mathematics CSCI 5857: Encoding and Encryption

Outline AES goals and history Modular multiplicative inverses Galois Field mathematics Galois Field inverses Uses in AES

AES History 1997: NIST calls for proposals for DES replacement –56-bit DES key not computationally secure –Triple DES very slow –DES S-Boxes poorly understood 1999: Several algorithms chosen as finalists –Rijndael (selected) –Twofish, Serpent, etc. (still used by some systems) 2001: Rijndael published by NIST as Advanced Encryption Standard

Goals of AES Security –Minimum key size: 128 bits (computationally secure now) –Expandable to 192 or 256 bits (will still be computationally secure in future) –Block size: 128 bits (more possible mappings) –Designed for resistance to differential and linear cryptanalysis Cost –Structure optimized for efficiency

Mathematical Goals S-Boxes and other transformations should have mathematical basis –Can insure useful properties (nonlinearity, etc.) –Can re-derive as needed for larger keys –Mapping should appear “random” (no simple patterns between inputs and outputs)

Modular Multiplication a  b mod m = remainder left after (a  b)/m Example: multiplication table mod 7

b is inverse of a mod m if ab mod m = 1 (b = a -1 mod m) Example: 5 = 3 -1 mod 7 since 3 x 5 = 15 = 1 mod 7 Creates nonlinear “pseudorandom” mappings Modular Multiplicative Inverses aa -1 0none

Modular Multiplicative Inverses Problem: Only works if m is a prime number Otherwise, some numbers have no inverse Example: modular inverses mod 8 aa -1 0none

Modular Multiplicative Inverses Goal: use this idea in cases where m = 2 n (that is, m is the size of a typical block) Galois Fields –Represent byte to transform as a polynomial –Compute inverse of that polynomial mod some other “prime” polynomial –Galois Field with m = 2 8 used to create S-Boxes for AES, mapping 256 possible byte inputs to 256 possible byte outputs

Galois Field Mathematics Step 1: Represent binary numbers with n bits as polynomial of degree n Example: n = 3 GF(2 3 ) 000 0x 2 + 0x x 2 + 0x x 2 + 1x + 0x 011 0x 2 + 1x + 1x x 2 + 0x + 0x2x x 2 + 0x + 1x x 2 + 1x + 0x 2 + x 111 1x 2 + 1x + 1x 2 + x + 1

Galois Field Mathematics x 2 + x x + 1 x 2 + 2x + 2 = x 2 + 0x + 0 = x 2 since 2 mod 2 = 0 x2x2 - (x + 1) x 2 - x – 1 = x 2 + x + 1 since -1 mod 2 = 1 All coefficients are binary (1 or 0) Addition/subtraction in mod 2 = XOR function Examples:

Galois Field Mathematics Step 2: Find a “prime” polynomial P n of degree n –Not a multiple of any two other polynomials (other than 1 and itself) Example for GF(2 3 ): P 3 = x 3 + x + 1 Used in AES for GF(2 8 ): P 8 = x 8 + x 4 + x 3 + x + 1

Galois Field Mathematics Step 3: Compute multiplication table for all pairs of polynomials P i x P j mod P n –Will need to compute mod if order of P i x P j is k  n –Simple (inefficient) way: compute P i x P j – x k-n P n Example for GF(2 3 ):

Galois Field Example Example: Multiplying 110 and  x 2 + x 011  x + 1 (x 2 + x)(x + 1) = x 3 + 2x 2 + x = x 3 + x 2 mod 2 = 0 (x 3 + x) mod (x 3 + x + 1) = x 3 + x - x 3 + x = 1 -1 mod 2 = 1

Galois Field Inverses Inverse b -1 of a binary number b in GF(2 n ) b -1 x b = 1 in GF(2 n ) Example: GF(2 3 ) b b -1 none

Galois Fields in AES AES mathematics based on GF(2 8 ) Prime polynomial = x 8 + x 4 + x 3 + x + 1 SubBytes stage –Basis of S-Boxes MixColumns Stage –Uses matrix multiplication in GF(2 8 ) Round Key Generation –Adds extra “random” bits to each round key