Chapter 7: Advanced Encryption Standard (AES)
Số trang: 11
Loại file: pdf
Dung lượng: 2.05 MB
Lượt xem: 12
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Objectives of Chapter 7: To review a short history of AES; to define the basic structure of AES; to define the transformations used by AES; to define the key expansion process; to discuss different implementations.
Nội dung trích xuất từ tài liệu:
Chapter 7: Advanced Encryption Standard (AES) Chapter 7 Objectives ❏ To review a short history of AES ❏ To define the basic structure of AES Chapter 7 ❏ To define the transformations used by AES Advanced Encryption Standard ❏ To define the key expansion process (AES) ❏ To discuss different implementations7.1 7.2 7.1.1 History. 7-1 INTRODUCTION In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for The Advanced Encryption Standard (AES) is a symmetric- symmetric- public review and comment. Finally, AES was published as key block cipher published by the National Institute of FIPS 197 in the Federal Register in December 2001. Standards and Technology (NIST) in December 2001 2001.. Topics discussed in this section: 7.1.1 History 7.1.2 Criteria 7.1.3 Rounds 7.1.4 Data Units 7.1.5 Structure of Each Round7.3 7.4 7.1.2 Criteria 7.1.3 Rounds. The criteria defined by NIST for selecting AES fall into AES is a non- non-Feistel cipher that encrypts and decrypts a three areas: areas: data block of 128 bits bits.. It uses 10 10,, 12, 12, or 14 rounds rounds.. The key 1. Security size, which can be 128, 128, 192, 192, or 256 bits, depends on the 2. Cost number of rounds rounds.. 3. Implementation. Implementation. Note AES has defined three versions, with 10, 12, and 14 rounds. Each version uses a different cipher key size (128, 192, or 256), but the round keys are always 128 bits.7.5 7.6 1 7.1.3 Continue 7.1.4 Data Units. Figure 7.2 Data units used in AES Figure 7.1 General design of AES encryption cipher7.7 7.8 7.1.4 Continue 7.1.4 Continue Example 7.1 Continue Figure 7.3 Block-to-state and state-to-block transformation Figure 7.4 Changing plaintext to state7.9 7.10 7.1.5 Structure of Each Round Figure 7.5 Structure of each round at the encryption site 7-2 TRANSFORMATIONS To provide security, AES uses four types of transformations: substitution, permutation, mixing, and transformations: key- key-adding ...
Nội dung trích xuất từ tài liệu:
Chapter 7: Advanced Encryption Standard (AES) Chapter 7 Objectives ❏ To review a short history of AES ❏ To define the basic structure of AES Chapter 7 ❏ To define the transformations used by AES Advanced Encryption Standard ❏ To define the key expansion process (AES) ❏ To discuss different implementations7.1 7.2 7.1.1 History. 7-1 INTRODUCTION In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for The Advanced Encryption Standard (AES) is a symmetric- symmetric- public review and comment. Finally, AES was published as key block cipher published by the National Institute of FIPS 197 in the Federal Register in December 2001. Standards and Technology (NIST) in December 2001 2001.. Topics discussed in this section: 7.1.1 History 7.1.2 Criteria 7.1.3 Rounds 7.1.4 Data Units 7.1.5 Structure of Each Round7.3 7.4 7.1.2 Criteria 7.1.3 Rounds. The criteria defined by NIST for selecting AES fall into AES is a non- non-Feistel cipher that encrypts and decrypts a three areas: areas: data block of 128 bits bits.. It uses 10 10,, 12, 12, or 14 rounds rounds.. The key 1. Security size, which can be 128, 128, 192, 192, or 256 bits, depends on the 2. Cost number of rounds rounds.. 3. Implementation. Implementation. Note AES has defined three versions, with 10, 12, and 14 rounds. Each version uses a different cipher key size (128, 192, or 256), but the round keys are always 128 bits.7.5 7.6 1 7.1.3 Continue 7.1.4 Data Units. Figure 7.2 Data units used in AES Figure 7.1 General design of AES encryption cipher7.7 7.8 7.1.4 Continue 7.1.4 Continue Example 7.1 Continue Figure 7.3 Block-to-state and state-to-block transformation Figure 7.4 Changing plaintext to state7.9 7.10 7.1.5 Structure of Each Round Figure 7.5 Structure of each round at the encryption site 7-2 TRANSFORMATIONS To provide security, AES uses four types of transformations: substitution, permutation, mixing, and transformations: key- key-adding ...
Tìm kiếm theo từ khóa liên quan:
Encryption Standard Basic structure of AES Analyze DES Transposition ciphers An toàn thông tin Bảo mật thông tinGợi ý tài liệu liên quan:
-
Đề cương chi tiết bài giảng môn Đảm bảo và an toàn thông tin
25 trang 269 0 0 -
10 trang 220 1 0
-
5 trang 178 0 0
-
Giáo trình An toàn, an ninh thông tin và mạng lưới
142 trang 165 0 0 -
Kiến thức căn bản về Máy tính - Phùng Văn Đông
52 trang 162 0 0 -
Xây dựng thuật toán, thử nghiệm đánh giá mô hình cứng hóa giao thức IKEv2.0
7 trang 157 0 0 -
Giáo trình An toàn và bảo mật thông tin - Đại học Bách Khoa Hà Nội
110 trang 111 0 0 -
Về một giải pháp cứng hóa phép tính lũy thừa modulo
7 trang 100 0 0 -
Một số thuật toán giấu tin trong ảnh có bảng màu và áp dụng giấu tin mật trong ảnh GIF
5 trang 94 0 0 -
Blockchain – Một số ứng dụng trong trường đại học
12 trang 87 0 0