Sie sind auf Seite 1von 16

AES (RIJNDAEL)

ALGORITHM
By: Arle, Jan Renn & Hernandez, Luisa Mae
contents

01 AES (Rijndael) Algorithm

02 Applications of AES

03 AES Algorithm Specification


AES (Rijndael)
ALGORITHM
AES Algorithm
• Advanced Encryption Standard
• the AES is secure against all known attacks. Various
aspects of its design incorporate specific features that
help provide security against specific attacks.
• Cracking a 128 bit AES key with a state-of-the-art
supercomputer would take longer than the presumed
age of the universe. As of today, no practicable attack
against AES exists.
RIJNDAEL ALGORITHM
The Rijndael algorithm is a symmetric block cipher that can
process data blocks of 128 bits using cryptographic keys of
128, 192 and 256 bits.
RIJNDAEL ALGORITHM
Rijndael was designed to have the following
Rijndael was named after the two characteristics:
Belgian cryptographers who 1. Resistance against all known attacks.
2. Speed and code compactness on a wide range
developed the algorithm - Dr. Joan of platforms.
Daemen and Dr. Vincent Rijmen. 3. Design Simplicity.
HISTORY OF RIJNDAEL
Requirement: br 2nd January 26th Novemb
and new encrypti
1997. Idea w er 2001, NIS
on algorithm. On
e that would be r
as to develop E T finally stan
A
esistant to all kn C a new encryp dardized an a
own attacks.
15 algorithms
tion algorithm lgorithm kno
DES & TRIPLE What NIST did were accepted
DES was not e B was to set up a wn as Rijnda
D and this was n
ffcient. Has qu contest in whic F
el.
arrowed to 5 in
estionable sec h anyone in th
the second
urity. e world could t
round.
ake part.
DR.
DR. VINCENT
JOAN RIJMEN
DAEMEN
APPLICATIONS OF AES
ALGORITHM
APPLICATIONS
Preferred encryption standard for
government and high security
systems around the world

A B
AES 256 & AES 128
To secure online banking
AES ALGORITHM
SPECIFICATIONS
CIPHER

1st Transformation
SUB BYTES
CIPHER

1st Transformation
SUB BYTES

2nd Transformation
SHIFT ROWS
CIPHER
1st Transformation
SUB BYTES

2nd Transformation
SHIFT ROWS

3rd Transformation
MIX COLUMNS
CIPHER

2nd Transformation 3rd Transformation

SHIFT ROWS MIX COLUMNS

1st Transformation
4th Transformation
SUB BYTES
ADD ROUND KEYS
THANK YOU
FOR
LISTENING!

Das könnte Ihnen auch gefallen