You are on page 1of 5

LAB 2

MODERN CRYPTOGRAPHY – DES AND AES


Name: Bùi Tấn Lộc
ID: 18521002
Objective:

- Students understand the encryption process of DES and AES

Requirement:

- Student works individually an submits the pdf file with filename Lab2-ID.pdf

1. DES
Students open Avalanche (DES).cwm in folder C:\Program Files (x86)\CrypTool
2\Templates\Cryptanalysis\Modern. Click on “Enable to change single bit”

1
1.1 Change message, keep key
- Type student name (only 8 characters) into DES plaintext.
- Click on any bit in initial message to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8

# of flipped bits

% of flipped bits

Round 9 10 11 12 13 14 15 16

# of flipped bits

% of flipped bits

1.2 Keep message, change key


- Type student name (only 8 characters) into DES plaintext.
- Click on 13th bit in initial key to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8

# of flipped bits

% of flipped bits

Round 9 10 11 12 13 14 15 16

# of flipped bits

% of flipped bits

2
1.3 Keep message, change key
- Type student name (only 8 characters) into DES plaintext.
- Click on 8th bit in initial key to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8

# of flipped bits

% of flipped bits

Round 9 10 11 12 13 14 15 16

# of flipped bits

% of flipped bits

1.4 Give your conclusion based on the previous change


............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................

3
2. AES
Open the AESVisualisierung.cwm file to inspect the operation of AES and fill
information in the following table:

Content Description

Key size (in bits) 128 bits.

192 bits.

256 bits.

Block size (in bits) 128 bits.

Number of rounds 128 bits – 10 rounds

(depending on key 192 bits – 12 rounds


size) 256 bits – 14 rounds

Summarize the First, the last four bytes of the previous key are taken.
steps of creating Afterward, the last byte is placed at the front
key in each round
Every byte in the state matrix is exchanged with the
(round key)
corresponding byte from S-box

A round constant is added

Adding the first four bytes of the previous key gives you the
first four bytes of the next key

For column x of the new key you XOR column x from the
previous key with column x-1 from the new key.

After that , we can complete Result matrix.

List and describe 4 Sub Byte: First, a byte is transferred from the state matrix to
functions (in order) the transition spot and split up. The corresponding byte in the
in each round S-box is determined and placed into the result matrix.

Shift Row : First, the second row is shifted once to the left.
Then, the third row is shifted twice towards the left, and

4
finally the fourth row is shifted three times to the left. The
overlapping bytes are transferred to the right to form a 4x4
matrix.

Mix Col: One column is taken from the current state and
placed next to the multiplication matrix. Then it is multiplied
with the multiplication matrix to determine the next column
of the next state.

Add key: The round key is added to the current state by


XORing the bytes.

Which function is Mix Column.


not available in
round 10?

You might also like