Académique Documents
Professionnel Documents
Culture Documents
ADVANCED ENCRYPTION
◆ AES is a block cipher intended to replace DES for
commercial applications. It uses a 128-bit block size and a
STANDARDADVANCED ENCRYPTION
key size of 128, 192, or 256 bits.
◆ AES does not use a Feistel structure. Instead, each full
STANDARD
round consists of four separate functions: byte
substitution, permutation, arithmetic operations over a
finite field, and XOR with a key.
General
Structure
AES Data Structures
A A
E E
S S
E D
n e
c c
r r
y y
p p
t t
i i
o o
n n
Four different stages are used, one of permutation
and three of substitution:
• Substitute bytes: Uses an S-box to perform a
byte-by-byte substitution of the block
• ShiftRows: A simple permutation
• MixColumns: A substitution that makes use of
arithmetic over
• AddRoundKey: A simple bitwise XOR of the
current block with a portion of the expanded
key
1. Substitute bytes transformation
2. Shift Rows transformation
Encryption Encryption
Decryption Decryption
Block Cipher Modes of Operation
/* Initial Permutation of S */
j = 0;
for i = 0 to 255 do
j = (j + S[i] + T[i]) mod 256;
Swap (S[i], S[j]);
Stream Generation
/* Stream Generation */
i, j = 0;
while (true)
i = (i + 1) mod 256;
j = (j + S[i]) mod 256;
Swap (S[i], S[j]);
t = (S[i] + S[j]) mod 256;
k = S[t];
Encryption and decryption
PUBLIC-KEY CRYPTOGRAPHY
AND RSA
• Asymmetric encryption is a form of cryptosystem in which encryption
and decryption are performed using the different keys—one a public
key and one a private key. It is also known as public-key encryption.
• Asymmetric encryption transforms plaintext into ciphertext using a
one of two keys and an encryption algorithm. Using the paired key and
a decryption algorithm, the plaintext is recovered from the ciphertext.
• Asymmetric encryption can be used for confidentiality, authentication,
• or both.
• The most widely used public-key cryptosystem is RSA. The difficulty of
attacking RSA is based on the difficulty of finding the prime factors of a
composite number.
THE RSA ALGORITHM
Traffic Confidentiality