SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Submitted by:
INFORMATIO
N Security
o Fa!sal Shahzad Khan
o Huzaifa Ehsan
o Muhammad Hassan
Submitted to: Miss Amna Saeed
 What is AES?
AES (Advanced Encryption Standards) is one of the most widely used methods for
encrypting and decrypting sensitive information in 2017.This encryption method uses
what is known as a block cipher algorithm to ensure that data can be stored securely.
The more popular and widely adopted symmetric encryption algorithm likely to be
encountered nowadays is the Advanced Encryption Standard (AES). It is found at least
six time faster than triple DES.
The AES Includes:
 Symmetric key symmetric block cipher
 128-bit data, 128/192/256-bit keys
 Stronger and faster than Triple-DES
 Provide full specification and design details
 Software implementable in C and Java.
 Working of AES
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation
network’. It comprises of a series of linked operations, some of which involve replacing
inputs by specific outputs (substitutions) and others involve shuffling bits around
(permutations).
Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES
treats the 128 bits of a plaintext block as 16 bytes. These 16 bytes are arranged in four
columns and four rows for processing as a matrix −
Unlike DES, the number of rounds in AES is variable and depends on the length of the
key. AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for
256-bit keys. Each of these rounds uses a different 128-bit round key, which is calculated
from the original AES key.
 Encryption with AES
The encryption phase of AES can be broken into three phases: the initial round, the main
rounds, and the final round. All of the phases use the same sub-operations in different
combinations as follows:
Initial Round
AddRoundKey
Main Rounds
SubBytes
ShiftRows
MixColumns
AddRoundKey
Final Round
SubBytes
ShiftRows
AddRoundKey
The main rounds of AES are repeated a set number of times for each variant of AES.
AES-128 uses 9 iterations of the main round, AES-192 uses 11, and AES-256 uses 13.
 Decryption in AES
To decrypt an AES-encrypted ciphertext, it is necessary to undo each stage of the
encryption operation in the reverse order in which they were applied. The three stage of
decryption are as follows:
Inverse Final Round
AddRoundKey
ShiftRows
SubBytes
Inverse Main Round
AddRoundKey
MixColumns
ShiftRows
SubBytes
Inverse Initial Round
AddRoundKey
Of the four operations in AES encryption, only the AddRoundKey operation is its own
inverse (since it is an exclusive-or). To undo AddRoundKey, it is only necessary to
expand the entire AES key schedule (identically to encryption) and then use the
appropriate key in the exclusive-or.
The other three operations require an inverse operation to be defined and used. The first
operation to be undone is ShiftRows. The Inverse ShiftRows operation is identical to the
ShiftRows operation except that rotations are made to the right instead of to the left.
 AES Versions:
There are three variants of AES based on different key sizes (128, 192, and 256 bits).
Above we described the 128-bit version of the AES key schedule.
All three variants of AES use a 128-bit block size, only the key sizes differ. The overall
structure of the encryption stage of AES is identical for all three variants, but the number
of rounds varies for the 128, 192, and 256-bit variants (10, 12, and 14 rounds
respectively). The key schedule is different for each variant.
 AES-128 (128 bits) – 10 rounds
 AES-192 (192 bits) – 12 rounds
 AES-256 (256 bits) – 14 rounds
In all variants AES-256 is secure and fast and best for encryption.
How AES-256 works:
AES is a symmetric key cipher. This means the same secret key is used for both
encryption and decryption, and both the sender and receiver of the data need a copy of
the key. By contrast, asymmetric key systems use a different key for each of the two
processes. Asymmetric keys are best for external file transfers, whereas symmetric keys
are better suited to internal encryption. The advantage of symmetric systems like AES is
their speed. Because a symmetric key algorithm requires less computational power than
an asymmetric one, it’s faster and more efficient to run.
***************

More Related Content

PPTX
Encryption And Decryption Using AES Algorithm
PDF
symmetric key encryption algorithms
PPTX
Advanced encryption standard (aes)
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Introduction to Cryptography
PPT
DES (Data Encryption Standard) pressentation
PPTX
Intro to modern cryptography
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Encryption And Decryption Using AES Algorithm
symmetric key encryption algorithms
Advanced encryption standard (aes)
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Introduction to Cryptography
DES (Data Encryption Standard) pressentation
Intro to modern cryptography
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...

What's hot (20)

PDF
AES-Advanced Encryption Standard
PPTX
Cryptography.ppt
PPT
block ciphers
PPTX
Message digest 5
PPTX
Public Key Cryptography
PPTX
Basic cryptography
PPTX
Symmetric and asymmetric key
PPTX
MD5 ALGORITHM.pptx
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Substitution techniques
PPTX
Encryption
PPTX
Encapsulating security payload in Cryptography and Network Security
PPTX
Cryptography
PPT
Cryptography
PPTX
Elgamal & schnorr digital signature scheme copy
PPTX
PPTX
Cryptographic algorithms
PDF
2. Stream Ciphers
PPTX
Hash function
AES-Advanced Encryption Standard
Cryptography.ppt
block ciphers
Message digest 5
Public Key Cryptography
Basic cryptography
Symmetric and asymmetric key
MD5 ALGORITHM.pptx
Block Ciphers and the Data Encryption Standard
Substitution techniques
Encryption
Encapsulating security payload in Cryptography and Network Security
Cryptography
Cryptography
Elgamal & schnorr digital signature scheme copy
Cryptographic algorithms
2. Stream Ciphers
Hash function
Ad

Similar to What is AES? Advanced Encryption Standards (20)

PPTX
Lecture # 007 AES.pptx
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
PPTX
Topic5 advanced encryption standard (aes)
PPTX
CNS Module 3_AES. in cryptography and network security
PDF
Aes 128 192_256_bits_project_report
PPTX
Adavanced Encryption Standard in Cryptography
PPTX
Information and data security advanced encryption standard (aes)
PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
PPT
AES.ppt
PDF
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
PPT
advance encryption standard chapter 5.ppt
PPTX
694 lecture1aes
PPTX
Software EngineeringModule 2 (Complete).pptx
PDF
Advanced Encryption Standard (AES).pdf
PPT
AES.ppt
PPT
CR 05 - Advanced Encryption Standard.ppt
PDF
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
PPT
Advanced Encryption System - Network and Security.ppt
PPTX
Cryptography
Lecture # 007 AES.pptx
“Optimized AES Algorithm Core Using FeedBack Architecture”
Topic5 advanced encryption standard (aes)
CNS Module 3_AES. in cryptography and network security
Aes 128 192_256_bits_project_report
Adavanced Encryption Standard in Cryptography
Information and data security advanced encryption standard (aes)
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
AES.ppt
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
advance encryption standard chapter 5.ppt
694 lecture1aes
Software EngineeringModule 2 (Complete).pptx
Advanced Encryption Standard (AES).pdf
AES.ppt
CR 05 - Advanced Encryption Standard.ppt
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Unit 2_AES_AES_Structure_Encryption_Example.pdf
Advanced Encryption System - Network and Security.ppt
Cryptography
Ad

More from Faisal Shahzad Khan (10)

PDF
UI/UX Framework Design Thinking ProcessProcess
PDF
ERD for Library management system Database
PDF
Story boarding, Handwritten recognition, Inductive, subductive, abductive met...
PPTX
NodeJS Presentation
DOCX
MS Access Database Project proposal on Airline Reservation System
DOCX
PPTX
Non Verbal Communication
PPTX
Pointers in C/C++ Programming
PPTX
Impact of Technology on Job
DOCX
Water level indicator alarm
UI/UX Framework Design Thinking ProcessProcess
ERD for Library management system Database
Story boarding, Handwritten recognition, Inductive, subductive, abductive met...
NodeJS Presentation
MS Access Database Project proposal on Airline Reservation System
Non Verbal Communication
Pointers in C/C++ Programming
Impact of Technology on Job
Water level indicator alarm

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
A Presentation on Artificial Intelligence
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Machine Learning_overview_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Diabetes mellitus diagnosis method based random forest with bat algorithm
A Presentation on Artificial Intelligence
Programs and apps: productivity, graphics, security and other tools
cloud_computing_Infrastucture_as_cloud_p
Network Security Unit 5.pdf for BCA BBA.
Machine Learning_overview_presentation.pptx
Getting Started with Data Integration: FME Form 101
MIND Revenue Release Quarter 2 2025 Press Release
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25-Week II
Per capita expenditure prediction using model stacking based on satellite ima...
A comparative study of natural language inference in Swahili using monolingua...
SOPHOS-XG Firewall Administrator PPT.pptx
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

What is AES? Advanced Encryption Standards

  • 1. Submitted by: INFORMATIO N Security o Fa!sal Shahzad Khan o Huzaifa Ehsan o Muhammad Hassan Submitted to: Miss Amna Saeed
  • 2.  What is AES? AES (Advanced Encryption Standards) is one of the most widely used methods for encrypting and decrypting sensitive information in 2017.This encryption method uses what is known as a block cipher algorithm to ensure that data can be stored securely. The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It is found at least six time faster than triple DES. The AES Includes:  Symmetric key symmetric block cipher  128-bit data, 128/192/256-bit keys  Stronger and faster than Triple-DES  Provide full specification and design details  Software implementable in C and Java.
  • 3.  Working of AES AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes. These 16 bytes are arranged in four columns and four rows for processing as a matrix − Unlike DES, the number of rounds in AES is variable and depends on the length of the key. AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key.
  • 4.  Encryption with AES The encryption phase of AES can be broken into three phases: the initial round, the main rounds, and the final round. All of the phases use the same sub-operations in different combinations as follows: Initial Round AddRoundKey Main Rounds SubBytes ShiftRows MixColumns AddRoundKey Final Round SubBytes ShiftRows AddRoundKey The main rounds of AES are repeated a set number of times for each variant of AES. AES-128 uses 9 iterations of the main round, AES-192 uses 11, and AES-256 uses 13.
  • 5.  Decryption in AES To decrypt an AES-encrypted ciphertext, it is necessary to undo each stage of the encryption operation in the reverse order in which they were applied. The three stage of decryption are as follows: Inverse Final Round AddRoundKey ShiftRows SubBytes Inverse Main Round AddRoundKey MixColumns ShiftRows SubBytes Inverse Initial Round AddRoundKey Of the four operations in AES encryption, only the AddRoundKey operation is its own inverse (since it is an exclusive-or). To undo AddRoundKey, it is only necessary to expand the entire AES key schedule (identically to encryption) and then use the appropriate key in the exclusive-or. The other three operations require an inverse operation to be defined and used. The first operation to be undone is ShiftRows. The Inverse ShiftRows operation is identical to the ShiftRows operation except that rotations are made to the right instead of to the left.
  • 6.  AES Versions: There are three variants of AES based on different key sizes (128, 192, and 256 bits). Above we described the 128-bit version of the AES key schedule. All three variants of AES use a 128-bit block size, only the key sizes differ. The overall structure of the encryption stage of AES is identical for all three variants, but the number of rounds varies for the 128, 192, and 256-bit variants (10, 12, and 14 rounds respectively). The key schedule is different for each variant.  AES-128 (128 bits) – 10 rounds  AES-192 (192 bits) – 12 rounds  AES-256 (256 bits) – 14 rounds In all variants AES-256 is secure and fast and best for encryption. How AES-256 works: AES is a symmetric key cipher. This means the same secret key is used for both encryption and decryption, and both the sender and receiver of the data need a copy of the key. By contrast, asymmetric key systems use a different key for each of the two processes. Asymmetric keys are best for external file transfers, whereas symmetric keys are better suited to internal encryption. The advantage of symmetric systems like AES is their speed. Because a symmetric key algorithm requires less computational power than an asymmetric one, it’s faster and more efficient to run. ***************