The Advanced Encryption Standard Part 2: Mathematical Background

Slides:



Advertisements
Similar presentations
Computer Science Lecture 7 Rijndael – Advanced Encryption Algorithm Professor Wayne Patterson Howard University Fall 2009.
Advertisements

Mathematics of Cryptography Part II: Algebraic Structures
Formal Verification of Hardware Support For Advanced Encryption Standard Anna Slobodová Centaur Technology This work was done while at Intel.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 5
Computer Science CSC 405By Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 2. Basic Cryptography (Part II)
Announcements: Quiz grades entered Quiz grades entered Homework 4 updated with more details. Homework 4 updated with more details. Discussion forum is.
 Stream ciphers o Encrypt chars/bits one at a time o Assume XOR w the key, need long key to be secure  Keystream generators (pseudo-random key) o Synchronous.
Advanced Encryption Standard
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
Announcements: Ch 3 quiz next week (tentatively Friday). Will include fields (today) Ch 3 quiz next week (tentatively Friday). Will include fields (today)Today:
1 A simple algebraic representation of Rijndael Niels Ferguson Richard Schroeppel Doug Whiting.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 2 Data Encryption algorithms Part II.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
RIJNDAEL Arta Doci University Of Colorado.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard.
Cryptography & Number Theory
Announcements: DES due Thursday. DES due Thursday. Try not to use late day, so you can study for Ch 3 quiz Friday. Try not to use late day, so you can.
ICS 454 Principles of Cryptography Advanced Encryption Standard (AES) (AES) Sultan Almuhammadi.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Announcements: Quizzes graded, but not in gradebook. (Current grade gives 0 on the parts you shouldn’t have done .) Quizzes graded, but not in gradebook.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Mathematics of Cryptography Part I: Modular Arithmetic
Cryptography and Network Security
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Number Theory and Advanced Cryptography 1. Finite Fields and AES
FINITE FIELDS 7/30 陳柏誠.
Cryptography and Network Security
CSCI 5857: Encoding and Encryption
CPSC 3730 Cryptography and Network Security
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Monoids, Groups, Rings, Fields
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 4 – Finite Fields
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
AES: Rijndael 林志信 王偉全. Outline Introduction Mathematical background Specification Motivation for design choice Conclusion Discussion.
Lecture 23 Symmetric Encryption
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Fifth Edition by William Stallings
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
15-499Page :Algorithms and Applications Cryptography II – Number theory (groups and fields)
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Implementation of Public Key Encryption Algorithms
The Advanced Encryption Standard Part 1: Overview
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Elgamal Public Key Encryption CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CS480 Cryptography and Information Security
Attacks on Public Key Encryption Algorithms
Classical Encryption techniques
Data Security and Encryption (CSE348)
Advanced Encryption Standard (Symmetric key Algorithm)
CS 465 AES Last Updated: Sep 7, 2017.
The Encryption Standards
Advanced Encryption Standard
Advanced Encryption Standard
Introduction to Modern Cryptography
Advanced Encryption Standard (AES)
Introduction to Modern Cryptography
Presentation transcript:

The Advanced Encryption Standard Part 2: Mathematical Background CSCI 5857: Encoding and Encryption

Outline Modular multiplicative inverses Galois Field mathematics Galois Field inverses Uses in AES

Mathematical Goals S-Boxes and other transformations should have mathematical basis Can insure useful properties (nonlinearity, etc.) Can re-derive as needed for larger keys Mapping should appear “random” (no simple patterns between inputs and outputs)

Modular Multiplication a  b mod m = remainder left after (a  b)/m Example: multiplication table mod 7

Modular Multiplicative Inverses b is inverse of a mod m if ab mod m = 1 (b = a -1 mod m) Example: 5 = 3-1 mod 7 since 3 x 5 = 15 = 1 mod 7 Creates nonlinear “pseudorandom” mappings a a -1 none 1 2 4 3 5 6

Lack of Multiplicative Inverses Problem: Only works if m is a prime number Otherwise, some numbers have no inverse Example: modular inverses mod 8 a a -1 none 1 2 3 4 5 6 7

Galois Fields for Inverses Goal: use this idea in cases where m = 2n (that is, m is the size of a typical block) Galois Fields Represent byte to transform as a polynomial Compute inverse of that polynomial mod some other “prime” polynomial Galois Field with m = 28 used to create S-Boxes for AES , mapping 256 possible byte inputs to 256 possible byte outputs

Galois Field Mathematics Step 1: Represent binary numbers with n bits as polynomial of degree n Example: n = 3 GF(23) Binary Polynomial 000 0x2 + 0x + 0 001 0x2 + 0x + 1 1 010 0x2 + 1x + 0 x 011 0x2 + 1x + 1 x + 1 100 1x2 + 0x + 0 x2 101 1x2 + 0x + 1 x2 + 1 110 1x2 + 1x + 0 x2 + x 111 1x2 + 1x + 1 x2 + x + 1

Galois Field Mathematics (1) All coefficients are binary (1 or 0) Addition/subtraction in mod 2 = XOR function Examples: x2 + x + 1 + x + 1 x2 + 2x + 2 = x2 + 0x + 0 = x2 since 2 mod 2 = 0 x2 - (x + 1) x2 - x – 1 = x2 + x + 1 since -1 mod 2 = 1

Galois Field Mathematics (2) Step 2: Find a “prime” polynomial Pn of degree n Not a multiple of any two other polynomials (other than 1 and itself) Example for GF(23): P3 = x3 + x + 1 Used in AES for GF(28): P8 = x8 + x4 + x3 + x + 1

Galois Field Mathematics (3) Step 3: Compute multiplication table for all pairs of polynomials Pi x Pj mod Pn Will need to compute mod if order of Pi x Pj is k  n Simple (inefficient) way: compute Pi x Pj – xk-nPn Example for GF(23):

Galois Field Example Example: Multiplying 110 and 101 110  x2 + x 011  x + 1 (x2 + x)(x + 1) = x3 + 2x2 + x = x3 + x 2 mod 2 = 0 (x3 + x) mod (x3 + x + 1) = x3 + x - x3 + x + 1 - 1 = 1 -1 mod 2 = 1

Galois Field Inverses Inverse b-1 of a binary number b in GF(2n) b-1 x b = 1 in GF(2n) Example: GF(23) b 000 001 010 011 100 101 110 111 b-1 none

Galois Fields in AES SubBytes stage MixColumns Stage AES mathematics based on GF(28) Prime polynomial = x8 + x4 + x3 + x + 1 SubBytes stage Basis of S-Boxes MixColumns Stage Uses matrix multiplication in GF(28) Round Key Generation Adds extra “random” bits to each round key

What’s Next Let me know if you have any questions Continue on to the next lecture on AES: Mathematical Backgorund