ADVANCED ENCRYPTION STANDARD:

HOW DOES IT WORK?

Project Paper for

Information Systems Audit and Control

TABLE OF CONTENTS

1. Introduction         3

2. Cryptography         3

3. Algorithms   5

3.1. Asymmetric Key Algorithms  5

3.2. Symmetric Key Algorithms   5

3.3. Stream Chipers – Block Chipers   6

4. Data Encrypting Standard (DES)       6

5. Advanced Encryption Standard (AES)   7

5.1. How AES works      7

5.1.1. The State        8

5.1.2. Encryption Steps 9

5.1.2.1. SubBytes       10

5.1.2.2. ShiftRow       10

5.1.2.3. MixColumn      11

5.1.2.4. AddRoundKey    11

5.2. Strengths of AES   12

5.3. Attacks on AES     12

6. Summary      13

7. Bibliography         13

1.Introduction

Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly the Internet.

Within the context of any application-to-application communication, there are some specific security requirements, including: Authentication: The process of proving one's identity. (The primary forms of host-to-host authentication on the Internet today are name-based or address-based, both of which are notoriously weak.) Privacy/confidentiality: Ensuring that no one can read the message except the intended receiver. Integrity: Assuring the receiver that the received message has not been altered in any way from the original. Non-repudiation: A mechanism to prove that the sender really sent this message.

Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. There are, in general, three types of cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, each of which is described below. In all cases, the initial unencrypted data is referred to as plain-text. It is encrypted into cipher-text, which will in turn (usually) be decrypted into usable plain-text.

2.Cryptography

If we follow the origin of the word Cryptography, crypt-ography, it basically means "burying" information. Practice is to transform the message into a form which is gibberish without the knowledge of the key. Original message, called plain-text, is encrypted under a key and the result is chiper-text. With the use of same key message can be retrieved. Transformation method used can be as simple as shifting the alphabet forward, writing C for A and D for B (Caesar Chiper). Of course this a very simple method and there are more secure and complex ones. Crypthograpic primitives are this tools used in encryption and decryption. Depending on the use and purpose there are several different kinds. Figure-1 below shows a classification of cryptographic primitives.

A message or data that can be read and understood without any special process is considered plain-text or otherwise referred to as clear-text. There are times when we need to protect sensitive messages or computer data, especially if it needs to travel across public networks. For example, an email message sent in plain-text through the Internet to a friend is like sending a postcard through the postal service. The message sent could be read by virtually anyone who cared to take a look. The email scenario might be worse than the postal service due to the speed of worldwide exposure that is possible with email. The postcard-like method may be fine for the casual message but what about sensitive or confidential messages? It is at times like these users may opt to protect their data through the use of a process that invokes encryption and decryption. Encryption is a method of converting plain-text into an unreadable an unintelligible format called cipher-text. The process of converting cipher-text back to a recognizable and readable format is call decryption. Using the process of encryption, a user can store or send sensitive information over public networks in a more secure manner than just sending or storing the data in plain-text. When intended viewers of the data wish to access the encrypted data, they use the process of decryption to convert the cipher-text back to a readable format.

Join now!

Cryptography can be generally defined as the science of designing algorithms/chipers to encrypt and decrypt data enabling the storage and transmission of sensitive data in a secure manner. A crypto-system consists of a cryptographic algorithm, or cipher, which is a mathematical function to encrypt and decrypt data and all of the possible keys and protocols that make it work. Using a key, the cryptographic cipher can be used to convert plain-text to and from cipher-text.

An early example of a crypto-system is the Caesar cipher. The Caesar cipher, considered developed by Julius Caesar when he sent messages to his ...

This is a preview of the whole essay