[go: up one dir, main page]

0% found this document useful (0 votes)
33 views16 pages

Aes PPT Sem V

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 16

WELCOME

Advanced Encryption
Standard: Principles a n d
Applications in M o d e r n
Security
P r e s e n t e d B y:

G a u r a v Kalsait VU4F2223044
Khandu Sontakke
Ru s h i ke s h Ko l p e VU4F2223041

A a y u s h Khanvilkar VU4F2223037
Pratik Pa w a r
VU4F2223015
In t ro d u c t io n
to A E S
AES (Advanced Encryption Standard) is a symmetric encryption algorithm
used to secure data. It operates on fixed block sizes (128-bit) and supports
key lengths of 128, 192, or 256 bits. AES performs multiple rounds of
encryption using substitution, permutation, and mixing operations. It's
widely used in applications like SSL/TLS and file encryption for strong
security.
History of
AES
AES was established by the National Institute of
Standards and Technology (NIST) in 2001,
replacing the aging Data Encryption Standard
(DES). It originated from the Rijndael cipher,
developed by Belgian cryptographers Vincent
Rijmen and Joan Daemen. AES was chosen after
a multi-year, global competition involving 15
encryption algorithms. It became the encryption
standard for U.S. government data and is now
widely used worldwide.
A E S Structure

AES operates on a 4x4 matrix of bytes called the state, using key
lengths of 128, 192, or 256 bits. Its structure includes multiple
rounds (10, 12, or 14) of transformations like SubBytes,
ShiftRows, MixColumns, and AddRoundKey. Each round increases
security by adding confusion and diffusion to the data.
Ke y Fe a t u re s of A E S
•Symmetric Encryption: Uses the same key for both
encryption and decryption, ensuring fast performance.
•Block Cipher: Operates on fixed 128-bit blocks of data,
regardless of key length.
•Flexible Key Lengths: Supports 128, 192, and 256-bit
keys, offering different levels of security.
E n c ry p t io n
Process

The AES encryption process starts by dividing


data into 128-bit blocks and initializing the state
matrix. It then undergoes multiple rounds (10,
12, or 14) of transformations: SubBytes (byte
substitution), ShiftRows (row shifting),
MixColumns (column mixing), and
AddRoundKey (XOR with the key). The final
ciphertext is produced after all rounds are
completed, ensuring data confidentiality.
D e c ry p t io n
Process

The AES decryption process reverses encryption by starting with the


ciphertext and applying the inverse of each transformation: Inverse
ShiftRows, Inverse SubBytes, Inverse MixColumns, and AddRoundKey
in reverse order. The same key used for encryption is applied, and
after all rounds, the original plaintext is recovered. Decryption
ensures that data can be securely retrieved by authorized users.
Modes of

O p e ra t io n
•ECB (Electronic Codebook): Encrypts each block independently;
simple but vulnerable to pattern attacks.
•CBC (Cipher Block Chaining): Each block is XORed with the
previous ciphertext block before encryption, providing better security.
•CFB (Cipher Feedback): Converts AES into a stream cipher,
encrypting small segments of data.
•OFB (Output Feedback): Similar to CFB but pre-generates
keystream blocks, making it immune to transmission errors.
Applications
in S e c u r i t y
•Data Encryption: Secures sensitive data in databases,
files, and cloud storage.
•Network Security: Protects data in transit via protocols
like SSL/TLS, IPsec, and VPNs.
•Wireless Communication: Secures Wi-Fi connections
through WPA2 and WPA3 encryption standards.
•Disk and File Encryption: Used in systems like
BitLocker, VeraCrypt, and FileVault for full-disk
encryption.
Challenges a n d Limitations
•Key Management: Securely generating, distributing,
and storing encryption keys can be complex and is
critical to maintaining security.
•Implementation Vulnerabilities: Poor
implementation, such as side-channel attacks or
weak random number generation, can expose AES to
attacks despite its theoretical strength.
•Limited Security Against Quantum Attacks: While
AES is resistant to classical attacks, it may be
vulnerable to future quantum computing attacks,
particularly with shorter key lengths (e.g., 128 bits).
•Performance Overhead: AES encryption can
introduce latency in resource-constrained
environments, such as IoT devices, where processing
power and battery life are limited.
Fu t u re o f A E S

•Post-Quantum Cryptography: As quantum computing evolves,


there is a push to develop and standardize cryptographic
algorithms that can withstand quantum attacks. While AES is
currently considered secure, its reliance on symmetric keys may
require longer key lengths (e.g., 256 bits) for enhanced security.
•Integration with Emerging Technologies: AES will likely
continue to be integrated into various technologies, including
blockchain, IoT devices, and cloud computing, to ensure data
security and privacy.
C O N C LU S I O N
AES is a robust and widely adopted encryption
standard, providing strong security for a variety of
applications. Its symmetric structure, flexible key
lengths, and efficiency make it suitable for both
hardware and software implementations. As
technology evolves, AES will continue to play a
critical role in safeguarding data against emerging
threats.
REFERENCES:

R e s e a r c h P a p e r 1:
https://ieeexplore.ieee.org/document/8229881

R e s e a r c h P a p e r 2:
https://ieeexplore.ieee.org/document/9404716

R e s e a r c h P a p e r 3:
https://ieeexplore.ieee.org/document/10140373
Thanks!

Any Questions ?

You might also like