Advanced Encryption Standard
Evaluation Criteria for AES
The AES Cipher
Review Questions
What was the original set of criteria used by NIST to evaluate candidate AES ciphers?
In general they said: 1. Security strength equal to or greater than 3DES 2. Significantly improved efficiency 3. Symmetric block cipher with a block length of 128 bits. 4. Support key lengths of 128, 192, and 256 bits. The specific evaluation criteria: 1. Security: This referes to the effort required to cryptanalyze an algorithm. 2. Cost: Practical, Efficient enough to use on high bandwidth links and high speed applications. 3. Algorithm and Implementation Characteristics: flexibility, suitability for a variety of hardware and software implementations, simplicity
What was the final set?
General Security: Software Implementations: Speed Hardware Implementations: small hardware size to keep cost down. Attacks on Implementations: timing attacks and power attacks. Encryption versus decryption: Are they the same... Key agility: ability to change keys quickly and efficiently Other versatility and fexibility: Parameter flexibility (other key and block sizes, change in the number of rounds), Implementation Flexibility (optimizing cipher elements for particular environments). Potential for instruction-level parallelism:The ability to exploit ILP in processors.
What is the power analysis?
Observing the power used to detect a multiply or add operation or to see if ones or zeros are being written.
What is the difference between Rijndael and AES?
Rijndael took different blocks sizes of 128, 192, 256. AES only takes 128.
What is the purpose of the state array?
How is the S-Box constructed?
Briefly describe Sub Bytes.
Briefly describe Shift Rows.
How many bytes in State are affected by Shift Rows?
Briefly describe Mix Columns.
Briefly describe Add Round Key.
Breifly describe the key expansion algorithm.
What is the difference between Sub Bytes and Sub Word?
What is the difference between Shift Rows and Rot Word?
What is the difference between teh AES decryption algorithm and the equivalent inverse cipher?