Professional Documents
Culture Documents
5-Implement AES Algorithm-06-02-2024
5-Implement AES Algorithm-06-02-2024
(a) S-box
(Table can be found on page 163 in textbook)
Table 6.2
• Key is copied into the first four words of the expanded key
• The remainder of the expanded key is filled in four words at a
time
AES Example
Key
Expansion
(Table is located on page 175
in textbook)
Table 6.4
AES
Example
(Table is located on page 177
in textbook)
Table 6.5
Avalanche
Effect
in AES:
Change in
Plaintext
(Table is located on page 178
in textbook)
Table 6.6
Avalanche
Effect
in AES:
Change
in Key
(Table is located on page 179
in textbook)
Equivalent Inverse Cipher
• AES decryption cipher is
Two separate changes are
not identical to the needed to bring the
encryption cipher decryption structure in line
• The sequence of with the encryption structure
transformations differs
although the form of the The first two stages of the
key schedules is the same decryption round need to be
• Has the disadvantage that interchanged
two separate software or
firmware modules are
needed for applications The second two stages of the
that require both decryption round need to be
encryption and decryption interchanged
Interchanging
InvShiftRows and InvSubBytes
• InvShiftRows affects the sequence of bytes in
State but does not alter byte contents and does
not depend on byte contents to perform its
transformation
• InvSubBytes affects the contents of bytes in
State but does not alter byte sequence and does
not depend on byte sequence to perform its
transformation