Aes PPT Sem V
Aes PPT Sem V
Aes PPT Sem V
Advanced Encryption
Standard: Principles a n d
Applications in M o d e r n
Security
P r e s e n t e d B y:
G a u r a v Kalsait VU4F2223044
Khandu Sontakke
Ru s h i ke s h Ko l p e VU4F2223041
A a y u s h Khanvilkar VU4F2223037
Pratik Pa w a r
VU4F2223015
In t ro d u c t io n
to A E S
AES (Advanced Encryption Standard) is a symmetric encryption algorithm
used to secure data. It operates on fixed block sizes (128-bit) and supports
key lengths of 128, 192, or 256 bits. AES performs multiple rounds of
encryption using substitution, permutation, and mixing operations. It's
widely used in applications like SSL/TLS and file encryption for strong
security.
History of
AES
AES was established by the National Institute of
Standards and Technology (NIST) in 2001,
replacing the aging Data Encryption Standard
(DES). It originated from the Rijndael cipher,
developed by Belgian cryptographers Vincent
Rijmen and Joan Daemen. AES was chosen after
a multi-year, global competition involving 15
encryption algorithms. It became the encryption
standard for U.S. government data and is now
widely used worldwide.
A E S Structure
AES operates on a 4x4 matrix of bytes called the state, using key
lengths of 128, 192, or 256 bits. Its structure includes multiple
rounds (10, 12, or 14) of transformations like SubBytes,
ShiftRows, MixColumns, and AddRoundKey. Each round increases
security by adding confusion and diffusion to the data.
Ke y Fe a t u re s of A E S
•Symmetric Encryption: Uses the same key for both
encryption and decryption, ensuring fast performance.
•Block Cipher: Operates on fixed 128-bit blocks of data,
regardless of key length.
•Flexible Key Lengths: Supports 128, 192, and 256-bit
keys, offering different levels of security.
E n c ry p t io n
Process
O p e ra t io n
•ECB (Electronic Codebook): Encrypts each block independently;
simple but vulnerable to pattern attacks.
•CBC (Cipher Block Chaining): Each block is XORed with the
previous ciphertext block before encryption, providing better security.
•CFB (Cipher Feedback): Converts AES into a stream cipher,
encrypting small segments of data.
•OFB (Output Feedback): Similar to CFB but pre-generates
keystream blocks, making it immune to transmission errors.
Applications
in S e c u r i t y
•Data Encryption: Secures sensitive data in databases,
files, and cloud storage.
•Network Security: Protects data in transit via protocols
like SSL/TLS, IPsec, and VPNs.
•Wireless Communication: Secures Wi-Fi connections
through WPA2 and WPA3 encryption standards.
•Disk and File Encryption: Used in systems like
BitLocker, VeraCrypt, and FileVault for full-disk
encryption.
Challenges a n d Limitations
•Key Management: Securely generating, distributing,
and storing encryption keys can be complex and is
critical to maintaining security.
•Implementation Vulnerabilities: Poor
implementation, such as side-channel attacks or
weak random number generation, can expose AES to
attacks despite its theoretical strength.
•Limited Security Against Quantum Attacks: While
AES is resistant to classical attacks, it may be
vulnerable to future quantum computing attacks,
particularly with shorter key lengths (e.g., 128 bits).
•Performance Overhead: AES encryption can
introduce latency in resource-constrained
environments, such as IoT devices, where processing
power and battery life are limited.
Fu t u re o f A E S
R e s e a r c h P a p e r 1:
https://ieeexplore.ieee.org/document/8229881
R e s e a r c h P a p e r 2:
https://ieeexplore.ieee.org/document/9404716
R e s e a r c h P a p e r 3:
https://ieeexplore.ieee.org/document/10140373
Thanks!
Any Questions ?