Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Network Security
Chapter 5
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
Origins
designed to be:
AES
Encryption
Process
AES Structure
In other words,
Substitution:
Involves XORs with a round key
AES Structure
3.
4.
5.
6.
7.
8.
9.
10.
Substitute Bytes
Substitute Bytes
Shift Rows
Shift Rows
Mix Columns
each
Mix Columns
AES Arithmetic
uses
e.g.
{02} {87} mod {11b} = (1 0000 1110) mod {11b}
= (1 0000 1110) xor (1 0001 1011) = (0001 0101)
Mix Columns
coefficients
designed
to be as simple as possible
AES Round
AES
Example
Key
Expansion
AES
Example
Encryption
AES
Example
Avalanche
AES Decryption
AES
works
AES Decryption
Implementation Aspects
can
Implementation Aspects
can
designers
Summary
have
considered: