3

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Question 1 :

1:

Since AES is a symmetric block cipher, both encryption and decryption require the same key. It
has a key size of 128, 192, or 256 bits and operates on data blocks of 128 bits. The Rijndael
algorithm, created by Joan Daemen and Vincent Rijmen, is the foundation of AES, which was
adopted as the new encryption standard by the National Institute of Standards and Technology
(NIST) in 2001.

The AES's mechanism:


Round-robin modifications are applied to the data block by AES. There are 10 rounds for 128-bit
keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys, depending on the size of the
key. There are four primary procedures in every round:

Byte Substitution: A matching value from a fixed S-box is substituted for each byte in the state
matrix.
Row Shift: The state matrix's rows are moved cyclically.
Mix Columns: A linear transformation is achieved by multiplying the state matrix's columns by a
fixed matrix.
Add Round Key: The state matrix and the current round key are XORed.

Benefits of AES :
Cryptographic Strength: AES's basic architecture has not been the target of any known practical
attacks, demonstrating its high level of security. Its robust cryptanalysis and solid mathematical
foundation have made it a dependable option for protecting sensitive data.
Performance: AES operates quickly and efficiently, particularly when implemented on hardware.
It is appropriate for real-time applications due to its fast throughput, which is made possible by
its parallelizable processes and efficient algorithms.
Implementation Ease: AES is extensively supported by a broad range of hardware and software
platforms and has extensive documentation. It is simple to incorporate into many applications
thanks to its open-source implementations and standardized architecture.

AES's boundaries:
Key Management: Creating, distributing, and storing secure keys are essential components in
implementing AES. A compromised key might make the encryption useless.
Computational Complexity: While AES is an efficient algorithm, machines with limited
resources may find its computational demands burdensome.
Compatibility: Although AES is a universal standard, compatibility issues may arise since
certain older platforms or systems may not support it by default.

Practical Uses:

AES is frequently utilized in many different applications, such as:

Data Transmission: Protecting wireless networks, HTTPS, and VPNs as means of


communication.
Data storage: Safeguarding private data kept in databases, cloud services, and hard drives.
Software security includes both intellectual property protection and software application
encryption.
Protecting smart cards, embedded systems, and other hardware devices is known as hardware
security.

Renders and Difficulties:

Post-Quantum Cryptography: Efforts are being made to create algorithms that withstand assaults
from quantum computers, which have the ability to breach existing encryption standards such as
AES.
Side-Channel Attacks: These methods retrieve sensitive data by taking advantage of the physical
features of the implementation.
Hardware Acceleration: For performance enhancement, dedicated hardware is being developed
to speed up AES encryption and decryption.
Suggestions:

Strong and adaptable, AES is an encryption technique that may be used in a variety of contexts.
But it's crucial to remember this:

Key management: Put safe procedures for creating, distributing, and storing keys in place.
Hardware Resources: Select suitable implementations according to the processing power at hand.

Make that the target platforms and legacy systems are compatible.

References:

Daemen, J., & Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption Standard.
Springer Science & Business Media.

National Institute of Standards and Technology (NIST). (2001). Announcing the Advanced Encryption
Standard (AES). Federal Register, 66(180), 51172-51173.

Schneier, B. (2017). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.
Question 2 :

1 : With Base64 encoding, this command creates a 32-byte, 256-bit random key, which is then
stored in key.txt.

openssl rand -out key.txt -hex 32

2:
3:

This encrypts the message in plaintext.txt and saves the ciphertext in ciphertext.bin.

enc -aes-256-cbc -salt -in plaintext.txt -out ciphertext.bin -pass file:./key.txt

4:

This decrypts ciphertext.bin back into plaintext and saves it in decrypted.txt.

enc -aes-256-cbc -d -in ciphertext.bin -out decrypted.txt -pass file:./key.txt


5:

Demonstration: The ciphertext is stored in ciphertext.bin, the key in key.txt, and the decrypted message
in decrypted.txt as the screenshots provided in last

6:

The encryption and decryption commands are executed using openssl enc. For further protection, the -
salt option adds a salt, and the -aes-256-cbc sets the encryption technique. The file names that are
specified are -in and -out, while the password or key file is indicated by -pass.

the d flag is used to decrypt process and with out it to encrypt process

7 : Because it guarantees secrecy, symmetric-key encryption is essential for network security. Because
the data is also affected if the key is compromised, safe key management is essential.

8 : using DES

openssl enc -des-cbc -salt -in plaintext.txt -out ciphertext_des.bin -pass file:./key.txt
Decrypt :

In symmetric-key encryption, the key length determines the cryptographic strength and
processing time of the encryption and decryption process.
Cryptography Strength:

The strength of encryption is directly proportional to the key length. Longer keys provide more
combinations, making brute-force assaults more difficult. For example, increasing the key length
from 128 bits to 256 bits exponentially increases the number of viable keys, resulting in
dramatically improved security.
Computation Time:

The computing time for encryption and decryption typically rises with key length. This is
because processing longer keys requires the algorithm to complete more operations. However,
with contemporary hardware, the time difference between key lengths may not be significant in
normal use.

You might also like