Hello there,
I wanted to talk today about AES encryption. I have been recently challenged to use it to secure a set of data that's dynamically generated on device. Thought it's not easy to get it in place, we managed to implement the basic algorithm/use it to encode our sensitive data.
I selected from many sources in the web some info that I wanted to share them with you.
I wanted to talk today about AES encryption. I have been recently challenged to use it to secure a set of data that's dynamically generated on device. Thought it's not easy to get it in place, we managed to implement the basic algorithm/use it to encode our sensitive data.
I selected from many sources in the web some info that I wanted to share them with you.
- What's AES?
AES is short for Advanced Encryption Standard.
AES is a symmetric encryption algorithm processing data in block of 128 bits. A bit can take the values zero and one, in effect a binary digit with two possible values as opposed to decimal digits, which can take one of 10 values.
Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same size.
AES is symmetric since the same key is used for encryption and the reverse transformation, decryption. The only secret necessary to keep for security is the key.
AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting algorithms are named AES-128, AES-192 and AES-256 respectively to indicate the length in bits of the key.
Each additional bit in the key effectively doubles the strength of the algorithm, when defined as the time necessary for an attacker to stage a brute force attack, i.e. an exhaustive search of all possible key combinations in order to find the right one.
- Therefore, the first four bytes of a 128-bit input block occupy the first column in the 4 × 4 matrix of bytes. The next four bytes occupy the second column, and so on.
* 16-bit Plaintext, P: 1101 0111 0010 1000
* 16-bit Key, K: 0100 1010 1111 0101
The first step is to generate the sub-keys. This is called Key Generation or Key Expansion:The input key, K, is split into 2 words, w0 and w1:
w0 = 0100 1010
w1 = 1111 0101
The first sub-key, Key0, is in fact just the input key: Key0 = w0w1 = K
The other sub-keys are generated as follows:
w2 = w0 XOR 10000000 XOR SubNib(RotNib(w1))
(Note: RotNib() is “rotate the nibbles”, which is equivalent to swapping the nibbles)
= 0100 1010 XOR 10000000 XOR SubNib(0101 1111)
w4 = w2 XOR 0011 0000 XOR SubNib(RotNib(w3)) = 1101 1101 XOR 0011 0000 XOR SubNib(1000 0010) = 1110 1101 XOR 0110 1010 = 1000 0111
w5 = w4 XOR w3 = 1000 0111 XOR 0010 1000
= 1010 1111
Now the sub-keys are:
Key0 = w0w1 = 0100 1010 1111 0101
Key1 = w2w3 = 1101 1101 0010 1000
Key2 = w4w5 = 1000 0111 1010 1111
Step 2.1:
Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same size.
AES is symmetric since the same key is used for encryption and the reverse transformation, decryption. The only secret necessary to keep for security is the key.
AES may configured to use different key-lengths, the standard defines 3 lengths and the resulting algorithms are named AES-128, AES-192 and AES-256 respectively to indicate the length in bits of the key.
Each additional bit in the key effectively doubles the strength of the algorithm, when defined as the time necessary for an attacker to stage a brute force attack, i.e. an exhaustive search of all possible key combinations in order to find the right one.
- Features
- AES is a block cipher with a block length of 128 bits.
- AES allows for three different key lengths: 128, 192, or 256 bits.
- Encryption consists of 10 rounds of processing for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys.
- Except for the last round in each case, all other rounds are identical.
- Each round of processing includes one single-byte based substitution step, a row-wise permutation step, a column-wise mixing
step, and the addition of the round key. The order in which these four steps are executed is different for encryption and decryption.
- To appreciate the processing steps used in a single round, it is best to think of a 128-bit block as consisting of a 4 × 4 matrix of bytes, arranged as follows:
byte0 byte4 byte8 byte12
byte1 byte5 byte9 byte13
byte2 byte6 byte10 byte14
byte3 byte7 byte11 byte15
- The 4 × 4 matrix of bytes is referred to as the state array.
- AES also has the notion of a word. A word consists of four bytes, that is 32 bits. Therefore, each column of the state array is a word, as is each row.
- Each round of processing works on the input state array and produces an output state array.
- The output state array produced by the last round is rearranged into a 128-bit output block.
- Example
Lets assume the inputs for the encryption are:
* 16-bit Key, K: 0100 1010 1111 0101
Step 1: Key Generation
The first step is to generate the sub-keys. This is called Key Generation or Key Expansion:The input key, K, is split into 2 words, w0 and w1:
w0 = 0100 1010
w1 = 1111 0101
The first sub-key, Key0, is in fact just the input key: Key0 = w0w1 = K
The other sub-keys are generated as follows:
w2 = w0 XOR 10000000 XOR SubNib(RotNib(w1))
(Note: RotNib() is “rotate the nibbles”, which is equivalent to swapping the nibbles)
= 0100 1010 XOR 10000000 XOR SubNib(0101 1111)
(Note: SubNib() is “apply S-Box substitution on nibbles using encryption S-Box”)
= 1100 1010 XOR SubNib(0101 1111) = 1100 1010 XOR 0001 0111 = 1101 1101
w3 = w2 XOR w1 = 1101 1101 XOR 1111 0101
= 0010 1000
= 1100 1010 XOR SubNib(0101 1111) = 1100 1010 XOR 0001 0111 = 1101 1101
w3 = w2 XOR w1 = 1101 1101 XOR 1111 0101
= 0010 1000
w4 = w2 XOR 0011 0000 XOR SubNib(RotNib(w3)) = 1101 1101 XOR 0011 0000 XOR SubNib(1000 0010) = 1110 1101 XOR 0110 1010 = 1000 0111
w5 = w4 XOR w3 = 1000 0111 XOR 0010 1000
= 1010 1111
Now the sub-keys are:
Key0 = w0w1 = 0100 1010 1111 0101
Key1 = w2w3 = 1101 1101 0010 1000
Key2 = w4w5 = 1000 0111 1010 1111
Step 2: Encryption
Now let’s do the encryption. There is an initial operation (Add Round Key), followed by the main Round, followed by the final Round.
(Note, the main difference in the real DES is that the main Round is repeated many times).
Remember, the output of each operation is used as the input to the next operation, always operating on 16-bits.
The 16-bits can be viewed as a state matrix of nibbles.
Step 2.1:
Add Round 0 Key
Plaintext XOR Key1 = 1101 0111 0010 1000 XOR 0100 1010 1111 0101 = 1001 1101 1101 1101
Step 2.2: Round 1
Nibble Substitution (S-boxes): Each nibble in the input is used in the Encryption S-Box to generate an output nibble.
Input = 1001 1101 1101 1101
Output = 0010 1110 1110 1110
Shift Row: Swap 2nd nibble and 4th nibble (note, in this example, its not so easy to see since 2nd and 4th nibbles are the same!)
= 0010 1110 1110 1110
Mix Columns: Apply the matrix multiplication with the constant matrix, M, the addition operation is simply an XOR, and for the multiplication operation you can use a lookup table.
Me =
1 4
4 1
S= 0010 1110
1110 1110
= S00’ S01’
S10’ S11’
Output = 1111 0110 0011 0011
Add Round 1 Key
= 1111 0110 0011 0011 XOR 1101 1101 0010 1000
= 0010 1011 0001 1011
Step 2.3 FinalRound
Nibble Substitution (S-boxes) = 1010 0011 0100 0011
Shift Row (2nd and 4th) = 1010 0011 0100 0011
Add Round 2 Key:
1010 0011 0100 0011 XOR
1000 0111 1010 1111 = 0010 0100 1110 1100
Now we have the final ciphertext. Ciphertext = 0010 0100 1110 1100
- Available implementations
There are many implementations of AES encryptions available out there, e.g.:
- OpenSSL
and others.
- Conclusion
There is currently no evidence that AES has any weaknesses making any attack other than exhaustive search, i.e. brute force, possible.
Even AES-128 offers a sufficiently large number of possible keys, making an exhaustive search impractical for many decades, provided no technological breakthrough causes the computational power available to increase dramatically and that theoretical research does not find a short cut to bypass the need for exhaustive search.
Hope you enjoy the Post
Regards
Anis