tp2 151101134027 Lva1 App6892
tp2 151101134027 Lva1 App6892
tp2 151101134027 Lva1 App6892
(AES)
I. Sub Bytes
II.Shift Rows
III.Mix Columns
IV.Add Key
How Does it works?
The number of rounds performed by the algorithm strictly depends on
the size of key.
The following table gives overview of no. Of rounds performed with
the input of varying key lengths:
E(m,k) D(n,k)
n(128bits) n(128bits) m(128bits)
m(128bits)
E D
k k
Rijndael S-box
Analysis of Steps
SubBytes
The S-box is a special lookup table which is
constructed by Galois fields.
The Generating function used in this algorithm
is GF(2^8)
i.e. 256 values are possible
The elements of the sbox are written in
hexadecimal system
Analysis of Steps
Shift Rows
In this step rows of the block are cylindrically
shifted in left direction.
The first row is untouched , the second by one
shift, third by two and fourth by 3.
Analysis of Steps
Shift Rows
There are more advanced attack on AES-256 bits like the Related Key
Attack, which involves several distinct keys linked together by a
common relation which reduces the keyspace to 99.5 bits which is
also infeasible.