AES

You should know First

Polynomial calculation

1.Overview?

DES is unsecure because of short length of key.3-DES is secure with 3*56-bit key, but too slow.

AES is considered good security with 128-bit block size, 128, 192, 256-bit key coordinating with 10,12,14 rounds encryption respectively.


Overview structure of AES

1.Key addition at start.

2.Enter rounds of encryption. Each rounds include Byte Substitution Layer, Confusion Layer( Shift Row and Mix Column) and Key Addition Layer. We should be careful that there is no Mix Column Layer in last round.

3.get ciphertext by overall 10 rounds of step 2 .

2.Block structure????

AES uses substitution-permutation network(rather than Feistel Network) and arranges plaintext block with 4×4 matrix filling it downwards and then right. Each elements is 8-bit string.So we can conclude that the block size is 4×4×8=128 bit.

4*4 matrix?

3.Detailed description for one round?


1.Byte Substitution

Each byte in the current 4×4 state matrix is used as an index to the S-box, obtaining a new byte for that position.

S-box

For example, the input byte is 10010100 which is 94 in hex. We can find the result 22 ?from the S table according to the?coordinate.

We also can illustrate the Substitution in terms of polynomial calculation. The substitution operation for a byte B is defined as follows.

1.First compute the multiplicative inverse?(known to have good non-linearity properties)?of B ?in the AES field(GF(2^8))?, to obtain B'=[x7,...,x0]. In this step, the zero element is mapped to [0,...,0].

2.Then compute a new bit vector B''=[y7,...,y0] with the following transformation in F2(observe that the vector addition is the same as an xor \oplus ):


This transformation avoid any fixed points(input and output is different,so is a derangement),also any opposite fixed point (

)

The result of substitution is B''.

Significance: Operating on every single byte independently. This gives the non-linearity ?and confusion?in AES.


2.Shift Rows

Shift Rows perform cyclic shift on the state matrix just as the figure below.

Significance: This is a kind of Byte permutation(the elements for operation is Byte), which provide diffusion for AES. In this way, each column of the output state of the?ShiftRows?step is composed of bytes from each column of the input state. The importance of this step is to avoid the columns being encrypted independently, in which case AES degenerates into four independent block ciphers.


3.Mix Column

Mixing each column separately.This operation is achieved by multiplying with matrix.

Significance:?The?MixColumns?function takes four bytes as input and outputs four bytes, where each input byte affects all four output bytes. Together with?ShiftRows,?MixColumns?provides?diffusion?in the cipher.


4.Key addition

The key is 128 bits. And we compute 10× 128-bit subkeys for each round. Those keys can also be represented as 4×4 matrix because of the same size(128-bit) as ?plaintext blocks.

Just simple xor \oplus ?with state matrix.

5.Overall



4 Rijndael's Key schedule

Derive round keys K i as follows. Split K into four words W0 , W1 , W2 and W3 of 32 bits each.

SubBytes is an application of the?AES S-box?to each of the four bytes of the word.

最后編輯于
?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請聯(lián)系作者
【社區(qū)內(nèi)容提示】社區(qū)部分內(nèi)容疑似由AI輔助生成,瀏覽時請結(jié)合常識與多方信息審慎甄別。
平臺聲明:文章內(nèi)容(如有圖片或視頻亦包括在內(nèi))由作者上傳并發(fā)布,文章內(nèi)容僅代表作者本人觀點(diǎn),簡書系信息發(fā)布平臺,僅提供信息存儲服務(wù)。

相關(guān)閱讀更多精彩內(nèi)容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi閱讀 7,854評論 0 10
  • 本質(zhì):感情的欲望/愿望/希望/夢想/幻想 看牌感覺,圣杯王子手里拿著兩樣?xùn)|西,一個是圣杯里面的蛇,一個是蓮花,圣杯...
    星野8閱讀 913評論 0 0
  • 第一章 “頭,好痛 我這是在哪兒”倒在一條街道的巷子中的少年喃喃低語道 正說著慢慢走出這條巷子 來到主街...
    奕出塵閱讀 439評論 0 1
  • 今天,放學(xué)的時候,我的眼睛不舒服,就把眼鏡摘下來,揉了揉。這時尹一斐抬起頭,天真地說:“老師,我想看你沒帶眼鏡...
    武林大會閱讀 377評論 0 7
  • 我在門口站著 一只鳥兒飛過 眼里盛滿五月的油桐花 它把目光丟在窗臺上 我用手指梳理長發(fā) 掉了一地昨夜的眠 吟哦幾首...
    王紅林閱讀 169評論 3 2

友情鏈接更多精彩內(nèi)容