Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002



Similar documents
The Advanced Encryption Standard (AES)

Implementation of Full -Parallelism AES Encryption and Decryption

Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)

SeChat: An AES Encrypted Chat

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

How To Encrypt With A 64 Bit Block Cipher

A PPENDIX G S IMPLIFIED DES

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Keywords Web Service, security, DES, cryptography.

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Properties of Secure Network Communication

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7

Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5

Cryptography and Network Security

Network Security. Chapter 3 Symmetric Cryptography. Symmetric Encryption. Modes of Encryption. Symmetric Block Ciphers - Modes of Encryption ECB (1)

IJESRT. [Padama, 2(5): May, 2013] ISSN:

The Advanced Encryption Standard: Four Years On

CS 758: Cryptography / Network Security

Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key

CSCE 465 Computer & Network Security

The Encryption Technology of Automatic Teller Machine Networks

The Advanced Encryption Standard (AES)

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

Lecture 8: AES: The Advanced Encryption Standard. Lecture Notes on Computer and Network Security. by Avi Kak

Efficient Software Implementation of AES on 32-bit Platforms

Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

Lecture 4 Data Encryption Standard (DES)

Network Security Part II: Standards

Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays M.S.Arun, V.Saminathan

Message Authentication

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Overview of Symmetric Encryption

Area optimized in storage area network using Novel Mix column Transformation in Masked AES

Cryptography and Network Security Chapter 3

Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

1 Data Encryption Algorithm

Automata Designs for Data Encryption with AES using the Micron Automata Processor

Split Based Encryption in Secure File Transfer

Symmetric Key cryptosystem

AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction

FPGA IMPLEMENTATION OF AN AES PROCESSOR

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays


Rijndael Encryption implementation on different platforms, with emphasis on performance

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE i): A Comparison with DES and RSA

A Study of New Trends in Blowfish Algorithm

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

AES Power Attack Based on Induced Cache Miss and Countermeasure

CSE/EE 461 Lecture 23

ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions

Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay

Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: Web:

AES Cipher Modes with EFM32

Secure Network Communication Based on Text-to-Image Encryption

Lecture 9 - Network Security TDTS (ht1)

How To Understand And Understand The History Of Cryptography

Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Cryptography and Network Security Block Cipher

AESvisual: A Visualization Tool for the AES Cipher

Data Integrity by Aes Algorithm ISSN

Secure File Multi Transfer Protocol Design

Network Security Technology Network Management

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

Table of Contents. Bibliografische Informationen digitalisiert durch

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Network Security. Omer Rana

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

NOORUL ISLAM COLLEGE OF ENGINEERING,KUMARACOIL. ME COMPUTER SCIENCE AND ENGG CS1629 -NETWORK SECURITY

Authentication requirement Authentication function MAC Hash function Security of

EXAM questions for the course TTM Information Security May Part 1

Chapter 23. Database Security. Security Issues. Database Security

ELECTRONIC COMMERCE WORKED EXAMPLES

Chapter 23. Database Security. Security Issues. Database Security

7! Cryptographic Techniques! A Brief Introduction

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

FPGA IMPLEMENTATION OF AES ALGORITHM

6 Data Encryption Standard (DES)

Cryptography and Network Security Chapter 11

Improving Performance of Secure Data Transmission in Communication Networks Using Physical Implementation of AES

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

(C) Global Journal of Engineering Science and Research Management

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Chapter 8. Network Security

SECURITY IN NETWORKS

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Transcription:

Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

1. Feature Overview The Advanced Encryption Standard (AES) feature adds support for the new encryption standard AES, with Cipher Block Chaining (CBC) mode, to IP Security (IPSec). The National Institute of Standards and Technology (NIST) have created AES, which is a new Federal Information Processing Standard (FIPS) publication that describes an encryption method. AES is a privacy transform for IPSec and Internet Key Exchange (IKE) and has been developed to replace the Data Encryption Standard (DES). AES is designed to be more secure than DES: AES offers a larger key size, while ensuring that the only known approach to decrypt a message is for an intruder to try every possible key. AES has a variable key length-the algorithm can specify a 128-bit key (the default), a 192-bit key, or a 256-bit key. The project aims at implementing the AES algorithm, such that whenever we need to share a secret file it can be encrypted using this algorithm and transmitted to the destination and decrypted at the destination side to get the original file. 2. Benefits AES is a cryptographic algorithm that protects sensitive, unclassified information. It has the following characteristics: 1. Resistance against all known attacks 2. Speed and code compactness on a wide range of platforms 3. Design Simplicity 3. AES Structure Following are the characteristics of the AES structure: (i) AES Algorithm processes the entire data block in parallel during each round using substitutions and permutations. (ii) The key that is provided as input is expanded into an array of forty-four 32bit words. Four distinct words serve as a round key for each round. (iii) Four different stages are used, one of permutation and three of substitution Substitute Bytes : Uses an S-box to perform a byte-to-byte substitution of the block Shift Rows : Simple Substitution Mix columns : A substitution that makes use of Arithmetic cover Add round key : A simple bitwise XOR of the current block with a portion of the expanded key

(iv) For both encryption and decryption, the cipher begins with an Add Round Key stage, followed by nine rounds that each includes all four stages, followed by the tenth round of three stages. (v) Only the Add Round Key stage makes use of the key.and thus provides security (vi) Each stage is reversible. (vii) The decryption algorithm makes use of the expanded key in reverse order. (viii) The final round of the encryption and decryption consists of only three stages. This is a consequence of the particular structure of AES and is required to make cipher reversible. 4. Implementation Overview This project is intended to develop a simple utility like WordPad but uses AES algorithm for document exchange in an encrypted manner rather than in plain text. Only authenticated users of the utility or users allowed by the document owner can view that document. Implementing the AES algorithm will consists of the functions that take care of the four stages used in all the rounds of the algorithm as mentioned above. AES technique can be implemented using a key length of 128 bits or 192 bits or 256 bits having 10 rounds, 12 rounds, 14 rounds respectively. We will be dealing with 128 bit key length having 10 rounds since this is the most commonly used technique. An attack against 128-bit key AES requires 2128 operations which will be quite infeasible. Secondly the mathematical structure of AES is very neat which cannot lead to any attacks. 5 Environment The Algorithm and the utility are going to be developed in Java which makes the whole setup platform independent. The figure given below shows the overall structure of AES. The input to the encryption and decryption algorithms is a single 128-bit block. The 128-bit key is depicted as a square matrix of bytes. This key is then expanded into an array of key schedule words; each word is four bytes and the total key schedule is 44 words for the 128-bit key. Following the figure is a brief description of each of the four stages used in AES. This is followed by a brief discussion of key expansion. For each stage we descried forward (encryption) algorithm and inverse (decryption) algorithm, and the rational of the stage.

Block Diagram of AES Algorithm

Substitute Bytes Transformation Forward and Inverse Transformation The forward substitute byte transformation is simple table lookup. AES defines 16 X 16 matrixes of byte values, called an S-box, which contains a permutation of all possible 256 8-bit values. Each individual byte of State is mapped into new byte in the following way: The leftmost 4 bits of the byte are used as a row value and the rightmost 4 bits are used as a column value. These row and column values serve as indexes into the S-box to select a unique 8-bit output value. The inverse substitute byte transformation makes use of the inverse S-box which is constructed by applying the inverse of the transformation of the actual equation followed by taking the multiplicative inverse of GF(2^8). Shift Row Transformation Forward and Inverse Transformations In forward shift row transformation the first row of the State is not altered. For the second row, a 1-byte circular left shift is performed. For the third row, a 2-byte circular left shift is performed. The inverse shift row transformation performs the circular shifts in the opposite direction for each of the last three rows, with a one-byte circular right shift for the second row and so on. Mix Column Transformation Forward and Inverse Transformations The forward mix column transformation operates on each column individually. Each byte of a column is mapped into a new value that is a function of all four bytes in the column. Each element in the product matrix is the sum of products of elements of one row and one column. In this case, the individual additions and multiplications are performed on GF (2^8). During the inverse mix column transformation, the inverse matrix times the forward transformation matrix equals the identity matrix. Add Round Key Transformation Forward and Inverse Transformations In the forward add round key transformation the 128 bits if State are bitwise XORed with the 128 bits of the round key. The operation is viewed as a columnwise operation between the 4 bytes of a State column and one word of the round key; it can also be viewed as a byte-level operation.

The inverse add round key transformation is identical to the forward add round key transformation, because the XOR operation is in its inverse. AES Key Expansion Key Expansion Algorithm The AES key expansion algorithm takes as input a 4-word (16-byte) key and produces a linear array of 44 words (156 bytes). This is sufficient to provide a 4-word round key for the initial Add Round Key stage and each of the 10 rounds of the cipher. The key is copied into the first four words of the expanded key. The remaining of the expanded key is filled in four words at a time. Each added word w[i] depends on the immediately preceding word w[i-1], and the word four positions back, w[i-4]. In three out of four cases, a simple XOR is used. For a word whose position in the w array is a multiple of 4, a more complex function is used.