SlideShare a Scribd company logo
1 of 23
AES KEY EXPANSION
AES ENCRYPTION AND DECRYPTION DIAGRAM
AES KEY EXPANSION
The AES algorithm which
takes 128 bits (16 bytes)
key as input, four-word
key as input and produce a
linear array of 44 words.
(In AES 4 Bytes = 1 Word).
Figure describe the steps
of key expansion.
Figure : 1. Four word round 2. AES Encryption Process
AES KEY EXPANSION
A four-word round key is
acceptable for the initial stage.
The initial stage is Add Round
Key and each of the 10 rounds
of cipher. So, total 11 rounds =
44 words. The key is added
into the first four words of the
expanded key.
Figure : 1. Four word round 2. AES Encryption Process
AES KEY EXPANSION
• The function g defines the complex
and that function consist of some sub
function as follow:
• Step-1: This function performs the
one-byte circular left shift.
• Step-2: Using S-box each sub word
performs a byte substitution.
• Step-3: Finally result of Rot word and
step 2 is XORed with the round
constant called as Rcon[Round].
Figure : Function g
AES KEY EXPANSION
• The function g defines the complex
and that function consist of some sub
function as follow:
• Step-1: This function performs the
one-byte circular left shift.
• Step-2: Using S-box each sub word
performs a byte substitution.
• Step-3: Finally result of Rot word and
step 2 is XORed with the round
constant called as Rconst[j].
Figure : STEP-1
W3 Left
Shift
AF 7F
7F 67
67 98
98 AF
W0 w1 w2 w3
0F 47 0C AF
15 D9 B7 7F
71 E8 AD 67
C9 59 D6 98
AES KEY EXPANSION
Figure : STEP-2
Left Shift
7F
67
98
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F
67
98
AF
ROW COLUMN
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F
67
98
AF
ROW COLUMN
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67
98
AF
ROW COLUMN
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67
98
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67 85
98
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67 85
98 46
AF
AES KEY EXPANSION
Figure : STEP-2
Left
Shift
S-box
7F D2
67 85
98 46
AF 79
AES KEY EXPANSION
• The function g defines the complex
and that function consist of some sub
function as follow:
• Step-1: This function performs the
one-byte circular left shift.
• Step-2: Using S-box each sub word
performs a byte substitution.
• Step-3: Finally result of Rot word and
step 2 is XORed with the round
constant called as Rcon[Round].
AES KEY EXPANSION
w0 w1 w2 w3
0F 47 0C AF
15 D9 B7 7F
71 E8 AD 67
C9 59 D6 98
Left Shift
(Step-1)
S-box
(Step-2)
7F D2
67 85
98 46
AF 79
S-box
(Step-2)
D2
85
46
79
Rcon(Round)
01
00
00
00
w0
0F
15
71
C9
W4
DC
90
37
B0
Step-3: Finally result of Rot word
and step 2 is XORed with the
round constant called as
Rcon[Round].
AES KEY EXPANSION
w0 w1 w2 w3 w4 w5 w6 w7
0F 47 0C AF DC 9B
15 D9 B7 7F 90 49
71 E8 AD 67 37 DF
C9 59 D6 98 B0 E9
AES KEY EXPANSION
w0 w1 w2 w3 w4 w5 w6 w7
0F 47 0C AF DC 9B 97
15 D9 B7 7F 90 49 FE
71 E8 AD 67 37 DF 72
C9 59 D6 98 B0 E9 3F
AES KEY EXPANSION
w0 w1 w2 w3 w4 w5 w6 w7
0F 47 0C AF DC 9B 97 38
15 D9 B7 7F 90 49 FE 81
71 E8 AD 67 37 DF 72 15
C9 59 D6 98 B0 E9 3F A7
AES EXAMPLE
AES EXAMPLE
Initial
Round
Round 1
Round 2
Round 3
Round 4
Round 5
Round 6
Round 7
Round 8
AES EXAMPLE
AES EXAMPLE

More Related Content

What's hot

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptographyBarani Tharan
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)DUET
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplicationKumar
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and LexemeA. S. M. Shafi
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipherAntony Alex
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notationsNikhil Sharma
 
Data Structure and Algorithms Hashing
Data Structure and Algorithms HashingData Structure and Algorithms Hashing
Data Structure and Algorithms HashingManishPrajapati78
 
heap Sort Algorithm
heap  Sort Algorithmheap  Sort Algorithm
heap Sort AlgorithmLemia Algmri
 

What's hot (20)

Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
AES Encryption
AES EncryptionAES Encryption
AES Encryption
 
Rc4
Rc4Rc4
Rc4
 
Merge sort algorithm
Merge sort algorithmMerge sort algorithm
Merge sort algorithm
 
Microoperations
MicrooperationsMicrooperations
Microoperations
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Context free grammar
Context free grammar Context free grammar
Context free grammar
 
Quick sort
Quick sortQuick sort
Quick sort
 
Role-of-lexical-analysis
Role-of-lexical-analysisRole-of-lexical-analysis
Role-of-lexical-analysis
 
Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)Secure Hash Algorithm (SHA-512)
Secure Hash Algorithm (SHA-512)
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplication
 
Token, Pattern and Lexeme
Token, Pattern and LexemeToken, Pattern and Lexeme
Token, Pattern and Lexeme
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Transposition cipher
Transposition cipherTransposition cipher
Transposition cipher
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Data Structure and Algorithms Hashing
Data Structure and Algorithms HashingData Structure and Algorithms Hashing
Data Structure and Algorithms Hashing
 
Chap4
Chap4Chap4
Chap4
 
heap Sort Algorithm
heap  Sort Algorithmheap  Sort Algorithm
heap Sort Algorithm
 

Similar to AES KEY EXPANSION .pptx

Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...Karthik Rathinavel
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAkashRanjandas1
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” Nirav Desai
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_reportNikhil Gupta
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
DES Simplified
DES SimplifiedDES Simplified
DES SimplifiedShiraz316
 
07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptx07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptxElisée Ndjabu
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAIOSRJECE
 
Windows debugging sisimon
Windows debugging   sisimonWindows debugging   sisimon
Windows debugging sisimonSisimon Soman
 
ArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea RipleyArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea RipleyRudraBhai3
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd Iaetsd
 
Counting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort AlgorithmsCounting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort AlgorithmsSarvesh Rawat
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 

Similar to AES KEY EXPANSION .pptx (20)

Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
Continuous Low Pass Filter Realization using Cascaded stages of Tow-Thomas Bi...
 
Advanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrhAdvanced encryption standard ug reseacrh
Advanced encryption standard ug reseacrh
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
“Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture” “Optimized AES Algorithm Core Using FeedBack Architecture”
“Optimized AES Algorithm Core Using FeedBack Architecture”
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
2 DES.pdf
2 DES.pdf2 DES.pdf
2 DES.pdf
 
2-bit comparator
2-bit comparator2-bit comparator
2-bit comparator
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
DES Simplified
DES SimplifiedDES Simplified
DES Simplified
 
07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptx07_arithmeticcircuits digital electronics.pptx
07_arithmeticcircuits digital electronics.pptx
 
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGAA Survey on Various Lightweight Cryptographic Algorithms on FPGA
A Survey on Various Lightweight Cryptographic Algorithms on FPGA
 
Windows debugging sisimon
Windows debugging   sisimonWindows debugging   sisimon
Windows debugging sisimon
 
Lec20
Lec20Lec20
Lec20
 
ArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea RipleyArithmeticCircuits.Ivy Nile vs. Rhea Ripley
ArithmeticCircuits.Ivy Nile vs. Rhea Ripley
 
Iaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryptionIaetsd an survey of efficient fpga implementation of advanced encryption
Iaetsd an survey of efficient fpga implementation of advanced encryption
 
Counting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort AlgorithmsCounting Sort and Radix Sort Algorithms
Counting Sort and Radix Sort Algorithms
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 

Recently uploaded

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

AES KEY EXPANSION .pptx

  • 2. AES ENCRYPTION AND DECRYPTION DIAGRAM
  • 3. AES KEY EXPANSION The AES algorithm which takes 128 bits (16 bytes) key as input, four-word key as input and produce a linear array of 44 words. (In AES 4 Bytes = 1 Word). Figure describe the steps of key expansion. Figure : 1. Four word round 2. AES Encryption Process
  • 4. AES KEY EXPANSION A four-word round key is acceptable for the initial stage. The initial stage is Add Round Key and each of the 10 rounds of cipher. So, total 11 rounds = 44 words. The key is added into the first four words of the expanded key. Figure : 1. Four word round 2. AES Encryption Process
  • 5. AES KEY EXPANSION • The function g defines the complex and that function consist of some sub function as follow: • Step-1: This function performs the one-byte circular left shift. • Step-2: Using S-box each sub word performs a byte substitution. • Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rcon[Round]. Figure : Function g
  • 6. AES KEY EXPANSION • The function g defines the complex and that function consist of some sub function as follow: • Step-1: This function performs the one-byte circular left shift. • Step-2: Using S-box each sub word performs a byte substitution. • Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rconst[j]. Figure : STEP-1 W3 Left Shift AF 7F 7F 67 67 98 98 AF W0 w1 w2 w3 0F 47 0C AF 15 D9 B7 7F 71 E8 AD 67 C9 59 D6 98
  • 7. AES KEY EXPANSION Figure : STEP-2 Left Shift 7F 67 98 AF
  • 8. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F 67 98 AF ROW COLUMN
  • 9. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F 67 98 AF ROW COLUMN
  • 10. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 98 AF ROW COLUMN
  • 11. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 98 AF
  • 12. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 85 98 AF
  • 13. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 85 98 46 AF
  • 14. AES KEY EXPANSION Figure : STEP-2 Left Shift S-box 7F D2 67 85 98 46 AF 79
  • 15. AES KEY EXPANSION • The function g defines the complex and that function consist of some sub function as follow: • Step-1: This function performs the one-byte circular left shift. • Step-2: Using S-box each sub word performs a byte substitution. • Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rcon[Round].
  • 16. AES KEY EXPANSION w0 w1 w2 w3 0F 47 0C AF 15 D9 B7 7F 71 E8 AD 67 C9 59 D6 98 Left Shift (Step-1) S-box (Step-2) 7F D2 67 85 98 46 AF 79 S-box (Step-2) D2 85 46 79 Rcon(Round) 01 00 00 00 w0 0F 15 71 C9 W4 DC 90 37 B0 Step-3: Finally result of Rot word and step 2 is XORed with the round constant called as Rcon[Round].
  • 17. AES KEY EXPANSION w0 w1 w2 w3 w4 w5 w6 w7 0F 47 0C AF DC 9B 15 D9 B7 7F 90 49 71 E8 AD 67 37 DF C9 59 D6 98 B0 E9
  • 18. AES KEY EXPANSION w0 w1 w2 w3 w4 w5 w6 w7 0F 47 0C AF DC 9B 97 15 D9 B7 7F 90 49 FE 71 E8 AD 67 37 DF 72 C9 59 D6 98 B0 E9 3F
  • 19. AES KEY EXPANSION w0 w1 w2 w3 w4 w5 w6 w7 0F 47 0C AF DC 9B 97 38 15 D9 B7 7F 90 49 FE 81 71 E8 AD 67 37 DF 72 15 C9 59 D6 98 B0 E9 3F A7
  • 21. AES EXAMPLE Initial Round Round 1 Round 2 Round 3 Round 4 Round 5 Round 6 Round 7 Round 8