SlideShare a Scribd company logo
Advanced
Encryption
Standard Algorithm
HD
TABLE OF CONTENT
01 03
Encryption and
Decryption
02 Demo
04
Cryptography AES
CRYPTOGRAPHY
Cryptography is the science
and study of methods of
protecting data in computer
and communication systems
from unauthorized disclosure
and modification.
QUOTE
Here’s a quote from
a famous person
“Cryptography is the ultimate form of
nonviolent direct action”
—Julian Assange
What is
Encryption
and
Decryption?
★ Encryption is the process of translating
plain text data (plaintext) into
something that appears to be random
and meaningless (ciphertext).
★ Decryption is the process of converting
ciphertext back to plaintext.
Why use Encryption ?
Encryption is important because it allows you to
securely protect data that you don't want anyone
else to have access to.
DEFINITION OF CONCEPTS
Private Key
A private key, also known as a
secret key, is a variable in
cryptography that is used with an
algorithm to encrypt and decrypt
code.
Public Key
Everyone else, who wants to
communicate with the Sender is
given a key called the Public Key.
Symmetric Encryption
Symmetric Encryption is when a
secret key is leveraged for both
encryption and decryption
functions.
Asymmetric Encryption
Anyone can encrypt messages
using a public key, but only the
holder of the paired private key can
decrypt such a message.
01
03
02
04
Advanced
Encryption Standard
It is a symmetric block cipher algorithm
chosen by the U.S. government to protect
classified information and is implemented in
software and hardware throughout the world
to encrypt sensitive data.
It was intended to be easy to
implement in hardware and software,
as well as in restricted environments.
CREDITS: This presentation template
was created by Slidesgo, including
icons by Flaticon, and infographics &
images by Freepik
Bit 0 or 1
1 byte = 8 bits
1 word = 4 bytes
1 block = 4 words
State ( 4×4)
16 bytes
Stores intermediate
result.
Rounds Size of keys
10 128
12 192
14 256
It has 10/12/14 rounds.
Where block size 128 bits =
16 byes (4 words).
No. of keys generated = N + 1
INPUT ARRAY (4X4)
4 Words
128 bits
16 bytes
1 byte
STATE ARRAY (4X4)
S0,0
S1,0
S2,0
S3,0
S0,1
S1,1
S2,1
S3,1
S0,2
S1,2
S2,2
S3,2
S0,3
S1,3
S2,3
S3,3
3rd byte of
0th word
W0
W1
W2
W3
KEY
K0
K4
K8
K12
K1
K5
K9
K13
K2
K6
K10
K14
K3
K7
K11
K15
W0
W1
W2
W3
W0
W1
W2 …… W42 W43
Key Expansion Algo
44 words
Structure of each
round at the
encryption site
SUBSTITUTION
AES uses substitution. Substitution
is done for each byte.
Only one table is used for
transformation of bytes that means
if two bytes are same then
transformation is also same.
SUBBYTES
The first transformation, SubBytes,
is used at the encryption site. To
substitute a byte, we interpret the
byte as two hexadecimal digits.
1st hexadecimal digit = Row
2nd hexadecimal digit = Column
Advanced Encryption Standard Algorithm
Permutation
Another transformation found in
a round is shifting, which
permutes the bytes. In the
encryption, the transformation is
called ShiftRows..
Advanced Encryption Standard Algorithm
MIXING
Take each word or column i.e.
4 bytes or 4x1 matrix and
multiply it with the constant
matrix
The output is 4x1 matrix of 4
bytes and is stored in output
or state matrix.
Key Adding
AddRoundKey proceeds one
column at a time.
AddRoundKey adds a round
key word with each state
column matrix; the operation
in AddRoundKey is matrix
addition.
Advanced Encryption Standard Algorithm
Conclusion
● Cryptography
● Encryption and Decryption
● Private key, public key, Symmetric
Encryption, Asymmetric Encryption.
● What is aes?
● General design of aes
PROCESS
Add
roundkey
Subbyte
Shift
rows
mixing
● Cryptography and network
security (fifth edition) by
William Stallings.
● wikipedia
References
ThankYou
Ad

Recommended

What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
 
(Crypto) DES And RSA Algorithms Overview
(Crypto) DES And RSA Algorithms Overview
EL Bachir Nouni
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
Hardik Manocha
 
Data Encryption Standard
Data Encryption Standard
Adri Jovin
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
Ahmed Mohamed Mahmoud
 
cns 2marks
cns 2marks
ilakiyadinesh
 
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Jyothishmathi Institute of Technology and Science Karimnagar
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
Hash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 
RSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Tiny encryption algorithm
Tiny encryption algorithm
Farah M. Altufaili
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
Secure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
AllBits presentation - Security in Theory
AllBits presentation - Security in Theory
AllBits BVBA (freelancer)
 
13 asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
Dharmalingam Ganesan
 
Asymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Rsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
RSA Game using an Oracle
RSA Game using an Oracle
Dharmalingam Ganesan
 
RSA without Padding
RSA without Padding
Dharmalingam Ganesan
 
RSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 

More Related Content

What's hot (20)

Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
Hash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 
RSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Tiny encryption algorithm
Tiny encryption algorithm
Farah M. Altufaili
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
Secure hashing algorithm
Secure hashing algorithm
Karteek Paruchuri
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
AllBits presentation - Security in Theory
AllBits presentation - Security in Theory
AllBits BVBA (freelancer)
 
13 asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
Dharmalingam Ganesan
 
Asymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Rsa rivest shamir adleman
Rsa rivest shamir adleman
Hossain Md Shakhawat
 
RSA Game using an Oracle
RSA Game using an Oracle
Dharmalingam Ganesan
 
RSA without Padding
RSA without Padding
Dharmalingam Ganesan
 
RSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
Hash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 
RSA & MD5 algorithm
RSA & MD5 algorithm
Siva Rushi
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
Udhayyagethan Mano
 
Public Key Cryptography and RSA algorithm
Public Key Cryptography and RSA algorithm
Indra97065
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
Abdul Manaf Vellakodath
 
Double DES & Triple DES
Double DES & Triple DES
Hemant Sharma
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
13 asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
 
Analysis of Short RSA Secret Exponent d
Analysis of Short RSA Secret Exponent d
Dharmalingam Ganesan
 
Modern Block Cipher- Modern Symmetric-Key Cipher
Modern Block Cipher- Modern Symmetric-Key Cipher
Mahbubur Rahman
 

Similar to Advanced Encryption Standard Algorithm (20)

Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
nyasarajan23
 
Cryptography
Cryptography
Shankar Ghorpade
 
Cryptography
Cryptography
Shankar Ghorpade
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Lecture # 007 AES.pptx
Lecture # 007 AES.pptx
MuhammadJavedNaro
 
NS UNIT 1 Advanced Encryption Standard& RSA
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
AES.ppt
AES.ppt
BincySam2
 
Adavanced Encryption Standard in Cryptography
Adavanced Encryption Standard in Cryptography
ridhi807156
 
AES algorithm and easy explanation of AES
AES algorithm and easy explanation of AES
sanskarpawar2003
 
Software EngineeringModule 2 (Complete).pptx
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
EFFECTIVE AES IMPLEMENTATION
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
SJDalore1
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Cryptography
Cryptography
Shivanand Arur
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
619cb9e9-b273-4ed7-9181-937ba84734ab-.pptx
nyasarajan23
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
NS UNIT 1 Advanced Encryption Standard& RSA
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
Adavanced Encryption Standard in Cryptography
Adavanced Encryption Standard in Cryptography
ridhi807156
 
AES algorithm and easy explanation of AES
AES algorithm and easy explanation of AES
sanskarpawar2003
 
Software EngineeringModule 2 (Complete).pptx
Software EngineeringModule 2 (Complete).pptx
20PZSB7038SachinP1
 
EFFECTIVE AES IMPLEMENTATION
EFFECTIVE AES IMPLEMENTATION
IAEME Publication
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
Advanced Encryption Standard (AES).pdf
Advanced Encryption Standard (AES).pdf
SJDalore1
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Ad

Recently uploaded (20)

UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
 
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
Mastering AI Workflows with FME by Mark Döring
Mastering AI Workflows with FME by Mark Döring
Safe Software
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
Ad

Advanced Encryption Standard Algorithm

  • 2. TABLE OF CONTENT 01 03 Encryption and Decryption 02 Demo 04 Cryptography AES
  • 3. CRYPTOGRAPHY Cryptography is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification.
  • 4. QUOTE Here’s a quote from a famous person “Cryptography is the ultimate form of nonviolent direct action” —Julian Assange
  • 5. What is Encryption and Decryption? ★ Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). ★ Decryption is the process of converting ciphertext back to plaintext.
  • 6. Why use Encryption ? Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to.
  • 7. DEFINITION OF CONCEPTS Private Key A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code. Public Key Everyone else, who wants to communicate with the Sender is given a key called the Public Key. Symmetric Encryption Symmetric Encryption is when a secret key is leveraged for both encryption and decryption functions. Asymmetric Encryption Anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. 01 03 02 04
  • 8. Advanced Encryption Standard It is a symmetric block cipher algorithm chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. It was intended to be easy to implement in hardware and software, as well as in restricted environments.
  • 9. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon, and infographics & images by Freepik Bit 0 or 1 1 byte = 8 bits 1 word = 4 bytes 1 block = 4 words State ( 4×4) 16 bytes Stores intermediate result. Rounds Size of keys 10 128 12 192 14 256 It has 10/12/14 rounds. Where block size 128 bits = 16 byes (4 words). No. of keys generated = N + 1
  • 10. INPUT ARRAY (4X4) 4 Words 128 bits 16 bytes 1 byte STATE ARRAY (4X4) S0,0 S1,0 S2,0 S3,0 S0,1 S1,1 S2,1 S3,1 S0,2 S1,2 S2,2 S3,2 S0,3 S1,3 S2,3 S3,3 3rd byte of 0th word W0 W1 W2 W3
  • 12. Structure of each round at the encryption site
  • 13. SUBSTITUTION AES uses substitution. Substitution is done for each byte. Only one table is used for transformation of bytes that means if two bytes are same then transformation is also same. SUBBYTES The first transformation, SubBytes, is used at the encryption site. To substitute a byte, we interpret the byte as two hexadecimal digits. 1st hexadecimal digit = Row 2nd hexadecimal digit = Column
  • 15. Permutation Another transformation found in a round is shifting, which permutes the bytes. In the encryption, the transformation is called ShiftRows..
  • 18. Take each word or column i.e. 4 bytes or 4x1 matrix and multiply it with the constant matrix The output is 4x1 matrix of 4 bytes and is stored in output or state matrix.
  • 19. Key Adding AddRoundKey proceeds one column at a time. AddRoundKey adds a round key word with each state column matrix; the operation in AddRoundKey is matrix addition.
  • 21. Conclusion ● Cryptography ● Encryption and Decryption ● Private key, public key, Symmetric Encryption, Asymmetric Encryption. ● What is aes? ● General design of aes
  • 23. ● Cryptography and network security (fifth edition) by William Stallings. ● wikipedia References