0% found this document useful (0 votes)
34 views4 pages

Jordan University of Science and Technology

This document contains a homework assignment on network security from Jordan University of Science and Technology. It includes review questions on power analysis and the ShiftRows operation in AES. It also asks to show the first 8 words of a key expansion for a 128-bit all-zero key and to compare elements of the AES and DES ciphers.

Uploaded by

Prachi Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views4 pages

Jordan University of Science and Technology

This document contains a homework assignment on network security from Jordan University of Science and Technology. It includes review questions on power analysis and the ShiftRows operation in AES. It also asks to show the first 8 words of a key expansion for a 128-bit all-zero key and to compare elements of the AES and DES ciphers.

Uploaded by

Prachi Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Jordan University of Science and

Technology

Networks Security – CPE 542

Homework # 4

Done By
Hanadi O'beidat

ID# 20010171100
Review Question

5.3 What is power analysis?


Power Analysis is a type of security attack. It is a way to extract
information from an electronic system by examining the power supply
current over time. By doing this it is possible to figure out exactly
what some computing systems are doing. It is even possible in some
cases to extract cryptographic keys or other secrets. Each time a computer
executes an instruction, or fetches or stores a data item, transistors switch on
and off. The current consumed by all of the transistors in the computer at any
one instant, is reflected in the total power supply current.
This depends on processing 0's and 1's so the sequence of bits can be
determined.

5.9 How many bytes in State are affected by ShiftRows?


The number of shifts for each row in the State:
Row 1: No shifts.
Row 2: 1 – byte shifts.
Row 3: 2 – bytes shifts.
Row 4: 3 – bytes shifts.

In each row there are 4 bytes so the total number of the affected bytes is 12
bytes.

5.13 What is the difference between SubBytes and SubWord?


SubBytes: Transformation in the Cipher that processes the State using a
nonlinear byte substitution table (S-box) that operates on each of the
State bytes independently.
SubWord: Function used in the Key Expansion routine that takes a four-byte
input word and applies an S-box to each of the four bytes to produce an output
word.

Problems

5.3 Show the first 8 words of the key expansion for 128 – bit key of all zeros?
The first 4 subkeys (w0 – w3) are all zeros shown below:

After After After XOR w[i]=


i temp RotWord() SubWord() Rcon[i/4] with w[i–4] temp XOR
Rcon w[i-4]

4 00000000 00000000 63636363 01000000 63636362 00000000 62636363


5 62636363 00000000 62636363
6 62636363 00000000 62636363
7 62636363 00000000 62636363
w0 = 00000000 w1 = 00000000 w2 = 00000000 w3 = 00000000
w4 = 62636363 w5 = 62636363 w6 = 62636363 w7 = 62636363

5.6 Compare the AES to DES. For each of the following elementst of DES,
indicate the comparable element in AES or explain why it is not needed in
AES.
a. XOR of subkey material with the input to the function f function.
The similar element in AES for XOR of subkey with the input to the
function (that passes different stages before XORing) is the added round
key stage in all the 10 rounds.

b. XOR of the f function output with left side of the block.


There is no similar element in AES for XOR the f function output with left
half side of the block, this is because AES structure is not a feistel
structure. The entire block is processed in parallel (No two halves are
using one half to modify the other half).

c. The f function.
There is no single element that is similar to f function, but the four stages
(Substitution bytes, shift rows, mix columns, added roundly) in each round
do the same as f function.

d. Permutation P.
The similar element for P is the shift rows in each of the 10 rounds.

e. Swapping of halves of the block.


No similar element in AES this is because that AES structure not a feistel
structure and no need to swap halves since work in parallel (No half needs
to modify the other half).

You might also like