Chapter5 AES Part2
Chapter5 AES Part2
2/28
Content of this Chapter
3/28
Some Basic Facts
4/28
AES: Overview
5/28
AES: Overview
6/28
Content of this Chapter
7/28
Internal Structure of AES
A0 A4 A8 A12
A1 A5 A9 A13
A2 A6 A10 A14
A3 A7 A11 A15
B0 B4 B8 B12
Input matrix
B1 B5 B9 B13
B2 B6 B10 B14
B3 B7 B11 B15
C0 02 03 01 B0
01
1 01 02
C 0103 B
5
C2 01 01 02 03 B10
C
3 03 01 01 02 15B
where 01, 02 and 03 are given in hexadecimal notation
• Inputs:
• 16-byte state matrix C
• 16-byte subkey ki
• Output: C ki
• Subkeys are derived recursively from the original 128/192/256-bit input key
• Key whitening: Subkey is used both at the input and output of AES
# subkeys = # rounds + 1
• There are different key schedules for the different key sizes
Key Schedule
B 0 0E 0B 0D 09 C0
B1 09 0E 0B 0D C1
B2 0D 0B C2
09
3 0E 3
where 09, 0B, 0D and 0E are given in hexadecimal notation
B 0B 0D
09 0E C
• Again, all arithmetic is done in the Galois field GF(28) (for more information see
Chapter 4.3 in Understanding Cryptography)
Decryption
B0 B4 B8 B12
Input matrix
B1 B5 B9 B13
B2 B6 B10 B14
B3 B7 B11 B15
• Brute-force attack: Due to the key length of 128, 192 or 256 bits,
a brute-force attack is not possible
• Side-channel attacks:
• Several side-channel attacks have been published
• Note that side-channel attacks do not attack the underlying
algorithm but the implementation of it
Differences Between AES & DES
• AES is a modern block cipher which supports three key lengths of 128, 192 and 256 bit. It
provides excellent long-term security against brute-force attacks.
• AES has been studied intensively since the late 1990s and no attacks have been found that are better
than brute-force.
• AES is not based on Feistel networks. Its basic operations use Galois field arithmetic and provide
strong diffusion and confusion.
• AES is part of numerous open standards such as IPsec or TLS, in addition to being the
mandatory encryption algorithm for US government applications. It seems likely that the cipher
will be the dominant encryption algorithm for many years to come.
• AES is efficient in software and hardware.