Download presentation
Presentation is loading. Please wait.
1
History Applications Attacks Advantages & Disadvantages Conclusion
2
Based on Rijndael algorithm Designed by Vincent Rijmen and Joan Daemen Successor of DES ( Why not Triple-DES )Triple-DES 128-bit key minimum
3
15 different designs 5 final nominees Rijndael (86 positive, 10 negative) Serpent (59 positive, 7 negative) Twofish (31 positive, 21 negative) RC6 (23 positive, 37 negative) MARS (13 positive, 83 negative)
4
A standard by NIST Archive and compression tools Disk encryption Local Area Network security Programming language C : Cryptography API C++: Botan, Crypto++ Java: Java Cryptography Extension (JCE) A standard by NIST Archive and compression tools Disk encryption Local Area Network security Programming language C : Cryptography API C++: Botan, Crypto++ Java: Java Cryptography Extension (JCE) On June 2003, AES 128-bit was approved for SECRET level document, and AES 256-bit approved for “TOP SECRET” level
5
Side channel attack Power analysis Timing analysis Fault analysis Acoustic analysis Radiation analysis (TEMPEST) Exhaustive search (Brute force attack) XSL attack ( Extended Sparse Linearization )
6
Published in 2002 Requiring fewer known plaintext Faster than an exhaustive search No real-world implementation “no one knows for certain if XSL can break Rijndael, and no one knows for certain that XSL cannot break Rijndael either..” Bruce Schneier, Twofish designer
7
Advantages Safe Brute Force (128 Bit = 2 128 attempts) Unbreakable, for now.. Disadvantages Too simple algebraic structure
9
Will be used until there is any indication that the cipher system could be broken. Safe for now..
10
[1] AES : http://en.wikipedia.org/wiki/Advanced_Encryption_Standardhttp://en.wikipedia.org/wiki/Advanced_Encryption_Standard [2] WinZip AES Encryption Information: http://www.winzip.com/aes_info.htmhttp://www.winzip.com/aes_info.htm [3] AES Implementations: http://en.wikipedia.org/wiki/AES_implementationshttp://en.wikipedia.org/wiki/AES_implementations [4] Cryptosystem: http://www.cryptosystem.net/aes/http://www.cryptosystem.net/aes/ [5] AES Animations: http://www.cs.bc.edu/~straubin/cs381- 05/blockciphers/rijndael_ingles2004.swfhttp://www.cs.bc.edu/~straubin/cs381- 05/blockciphers/rijndael_ingles2004.swf [6] XSL Attack: http://en.wikipedia.org/wiki/XSL_attackhttp://en.wikipedia.org/wiki/XSL_attack
11
Thank you for your attention!
12
Very slow in software Unsuitable in limited resources platform Only 64 bits block size Back
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.