You are on page 1of 16

GOVERNMENT POLYTECHNIC

KHAMGAON

DEPARTMENT OF COMPUTER ENGINEERING

DCC-( 22414)

MICRO PROJECT ON
AES (Advance Encryption Standard)
GUIDED BY :- SUBMITTED BY :-
 Prof.A.W.Sawarkar 1.Abhishek S. Gawande(19)
2.Vedant V. Gaygol(20)
3.Sushil S. Rahatole(40)
Basic Terminologies of Encryption and
decryption

Basic Terminologies of encryption and decryption:

• Plain text :-Plain text is readable unencrypted message

• Cipher text :- Cipher text is unreadable encrypted message

• Private key :-Private key is used to decode the encrypted data at receivers end

• Public key :-public key is used for encrypt the message at the sender end
What is Encryption and decryption

• Encryption:- It is the process of converting plain text into cipher text

• Decryption:- It is the process of converting cipher text into plain text

Fig: Process of encryption and decryption


Why AES replaced DES encryption?

• AES allows you to choose a 128-bit,192-bit or 256-bit key, but the DES allows you to
choose only 56-bit key
• AES has block size of 128-bits and DES has only 64-bits block size
• DES is less secure as compared to the AES
• The encryption time of AES is faster as compared to the DES
What is AES Algorithm

• Advanced Encryption Standard (AES) algorithm is a symmetric encryption algorithm


used to protect electronic data

• AES operates by converting plaintext (unencrypted data) and a secret key, and
producing cipher text (encrypted data) that can only be decrypted with the same secret
key

• AES is widely used in applications that require secure data transfer, such as online
banking, file encryption, and virtual private networks (VPNs)
How Does it works?

• The number of rounds performed by the algorithm strictly depends on the size of key
• The following table gives overview of number of rounds performed with the input of
varying key lengths:

Key Size (in bits) Rounds


128…………………………………………………………………..10
192…………………………………………………………………..12
256…………………………………………………………………..14

• The larger the number of keys the more secure will be the data
• The time taken by s/w to encrypt will increase with number of rounds
2. Input Array ( 4×4 ) 16 byte/4Word 3. State Array ( 4×4 ) 16 byte/4word

1 Word

Each box
contain 1
byte.

---------
W 0 W 1 W2 W42 W43
AES Algorithm

1.Substitute Bytes

• It has two inputs S-Box and one state array

• In substitute bytes shown in the fig. Assume the one


Particular box has the ( 0101 0100 ) data (I.e. 5 , 4)

• That means it target 5 throw and 4 thcolumn and save


Result in state array like 5×4 is 20

Fig: Substitute Byte


Substitution-Box
• SubBytes
For an element {54} corresponding value is {20}
2. Shift Rows

• In this stage it has only one input (I.e. state array)

• It interchange the rows first row shift as it is (I.e. no change). And other rows
are shifted as shown in fig

Fig: Shift Rows


3. Mix Columns

• In this stage the matrix multiplication Is perform

• It has two inputs first input state matrix and 4×4 state Array

• As shown in the fig. One column from the state array is multiplied to the given
input state matrix and the output stores in the output state array

Fig. Mix columns


4. Add Round key

• In this stage the EX-OR operation is performed on the state array and 4×4 round key

• As shown in the fig. The operation is performed on the state array and stores result into 4×4
state array

• And after performing this all steps the plain text is converted into cipher text

Fig. Add round key


Conclusion

The AES (Advanced Encryption Standard) algorithm is a widely used encryption


algorithm that is considered to be highly secure. It uses symmetric key cryptography to
encrypt and decrypt data, and it operates on blocks of data with a fixed block size of 128
bits. The key size can vary from 128 bits to 256 bits.
it is used to protect sensitive information such as financial transactions, personal
information, and military secrets.
Reference

https://www.simplilearn.com/tutorials/cryptography-tutorial/aes-encryption

https://www.geeksforgeeks.org/advanced-encryption-standard-aes/amp/

https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-Standard

https://en.m.wikipedia.org/wiki/Advanced_Encryption_Standard

http://www.facweb.iitkgp.ac.in/~sourav/AES.pdf
THANK YOU

You might also like