Professional Documents
Culture Documents
Advanced Encryption Standard
Advanced Encryption Standard
This Lecture
Why AES? NIST Criteria for potential candidates The AES Cipher AES Functions and Inverse Functions AES Key Expansion Implementation Aspects AES Security and Strength
Why AES?
Symmetric block cipher, published in 2001 Intended to replace DES and 3DES
DES is vulnerable to differential attacks 3DES has slow performances
in1 in5 in9 in13 in2 in6 in10 in14 in3 in7 in11 in15
S10 S11 S12 S13 S20 S21 S22 S23 S30 S31 S32 S33
plaintext
Substitute bytes Round 1 Shift rows Mix columns Add round key
W[36,39]
Substitute bytes
Shift rows Add round key Cipher text
W[40,43]
Round 9
key
ciphertext
Inv. Shift rows Inv. Sub bytes Add round key Inv. Mix Columns
W[36,39]
Inv. Shift rows Round 1 Inv. Sub bytes Add round key Inv. Mix columns
W[4,7]
Round 9
key