6.3 Aes
6.3 Aes
6.3 Aes
STANDARD
ADVANCED ENCRYPTION STANDARD(AES)
Each round key in AES depends on the previous round key. The
dependency, however, is nonlinear because of SubWord
transformation. The addition of the round constants also guarantees
that each round key will be different from the previous one.
The two sets of round keys can be created from two cipher keys that
are different only in one bit.
Key Expansion in AES-192 and AES-256
Key-expansion algorithms in the AES-192 and AES-256 versions
are very similar to the key expansion algorithm in AES-128, with
the following differences:
Plaintext in English: Two One Nine Two (16 ASCII characters, 1 byte each)
w[0] = (54, 68, 61, 74),w[1] = (73, 20, 6D, 79),w[2] = (20, 4B, 75, 6E),w[3] = (67, 20, 46, 75)
• g(w[3]):
• Adding round constant (01, 00, 00, 00) gives: g(w[3]) = (B6, 5A, 9D, 85)
• w[4] = w[0] ⊕ g(w[3]) = (E2, 32, FC, F1): 0101 0100 0110 1000 0110 0001 0111 0100 1011 0110 0101
1010 1001 1101 1000 0101 1110 0010 0011 0010 1111 1100 1111 0001 E2 32 FC F1
• first roundkey: E2 32 FC F1 91 12 91 88 B1 59 E4 E6 D6 79
AES Example - All RoundKeys
• Round 0: 54 68 61 74 73 20 6D 79 20 4B 75 6E 67 20 46 75
• Round 1: E2 32 FC F1 91 12 91 88 B1 59 E4 E6 D6 79 A2 93
• Round 2: 56 08 20 07 C7 1A B1 8F 76 43 55 69 A0 3A F7 FA
• Round 3: D2 60 0D E7 15 7A BC 68 63 39 E9 01 C3 03 1E FB
• Round 4: A1 12 02 C9 B4 68 BE A1 D7 51 57 A0 14 52 49 5B
• Round 5: B1 29 3B 33 05 41 85 92 D2 10 D2 32 C6 42 9B 69
• Round 6: BD 3D C2 B7 B8 7C 47 15 6A 6C 95 27 AC 2E 0E 4E
• Round 7: CC 96 ED 16 74 EA AA 03 1E 86 3F 24 B2 A8 31 6A
• Round 8: 8E 51 EF 21 FA BB 45 22 E4 3D 7A 06 56 95 4B 6C
• Round 9: BF E2 BF 90 45 59 FA B2 A1 64 80 B4 F7 F1 CB D8
• Round 10: 28 FD DE F8 6D A4 24 4A CC C0 A4 FE 3B 31 6F 26
THANK YOU