Комментарии:
Sir, what exactly happens in Expand key function?
ОтветитьThe Advanced Encryption Standard (AES) is a widely used symmetric key encryption algorithm. It is a block cipher, which means it encrypts data in fixed-size blocks. AES is considered one of the most secure and efficient encryption algorithms, making it a standard choice for securing sensitive data in various applications.
Key Features of AES:
Symmetric Key Encryption: AES uses the same secret key for both encryption and decryption. The key must be kept confidential and shared securely between the communicating parties.
Key Sizes: AES supports three key sizes: 128 bits, 192 bits, and 256 bits. The key size determines the number of rounds in the encryption process and the strength of the encryption.
Block Size: AES operates on fixed-size blocks of 128 bits (16 bytes) during encryption and decryption.
Number of Rounds: The number of rounds in AES depends on the key size. For a 128-bit key, AES performs 10 rounds; for a 192-bit key, it performs 12 rounds, and for a 256-bit key, it performs 14 rounds.
Confusion and Diffusion: AES achieves security through a combination of confusion and diffusion. Confusion involves complex mathematical transformations to obscure the relationship between the plaintext and the ciphertext. Diffusion ensures that each bit of the plaintext affects multiple bits in the ciphertext.
Encryption Process:
The AES encryption process involves the following steps:
Key Expansion: The secret key is expanded to create a set of round keys, one for each round of encryption.
Initial Round: The input data, known as plaintext, is divided into 128-bit blocks. In the first round, each byte of the plaintext is combined with the corresponding byte of the round key using a bitwise XOR operation.
Main Rounds: AES performs a fixed number of main rounds (determined by the key size). Each round consists of four transformations: SubBytes, ShiftRows, MixColumns, and AddRoundKey.
SubBytes: Each byte of the block is replaced by another byte based on a substitution table (S-box).
ShiftRows: The rows of the block are cyclically shifted to the left.
MixColumns: The columns of the block are mixed to add diffusion.
AddRoundKey: Each byte of the block is combined with the corresponding byte of the round key using a bitwise XOR operation.
Final Round: The final round does not include the MixColumns transformation.
Decryption Process:
The decryption process in AES is the reverse of the encryption process. It involves the same steps as encryption, but the transformations are applied in reverse order. The round keys used for decryption are the inverse of the round keys used for encryption.
Security and Performance:
AES is widely considered secure against known attacks when used with an appropriate key size (128-bit, 192-bit, or 256-bit). The security of AES is based on the strength of the encryption key, and its design has undergone extensive analysis by cryptographic experts.
In terms of performance, AES is known for its efficiency and is optimized for both software and hardware implementations. It is suitable for a wide range of applications, including secure communication, data encryption, and file storage.
In conclusion, the Advanced Encryption Standard (AES) is a strong and efficient encryption algorithm widely used for securing data and ensuring confidentiality in various domains, including computer systems, network communication, and cloud services. Its security and performance characteristics make it a key component in modern cryptography.
Sir, you also make video on data mining subject, your explanation is amazing
Ответить1 word =4 bits sir please it's true or not
ОтветитьSir aapke vedio saare Kamal ke hi hotel hai
Ответить4hr before exam ill be safe i hope
ОтветитьBlkl samajh ni i ajeeb tareqa sa samjha rha ha ya banda.
ОтветитьKAL EXAM HAI , DONOT KNOW PASS HOUNGA BHI
Ответить<3
Ответитьdimag m chap jayegaaa
ОтветитьRC4 Algorithm also upload...i have exams in June 1st week...please 😢
Ответитьcan anyone explain me how 4 words expanded to 44??
ОтветитьGhas virus use this encryption method 🙂
ОтветитьMujhe lagtha mere cllg k fees bhai tujhe dena chaiye
Ответитьbrother u r speaking to fast ... tough to understand...
Ответить128 bit is size of plaintext. and the round depend upon the size of key. there are 3 types of keys for 128 bit there will 10 rounds, 192 bit key size 12 rounds and for key 256 bit there will be 14 rounds.
ОтветитьShridhar sir, you're the savior of engineering students... Thank u so much!
ОтветитьSir please make video of just 5 min, there is only 5 min remaining for my exam. ;) just a joke , great videos
Ответитьyour YT Channel is wonderful....
wonderful Presentation.... Really you are doing excellent.... Keep it up ... Best wishes
Rohit sharma is taking class
ОтветитьBoss video short banane m tum main logic batana bhull gye ho ya to tumne hta diya hai... Yese padhya nhi jata sir jee
ОтветитьFor AES-128 the key expansion is from 4word to 44word so what is the expansion for AES-192 and AES-256? Please help me
ОтветитьUmm, your videos are how I always clear my concepts and they provide the easiest and the best explanation. But I didn't get, how 16byte = 4words. The conversion rate is 2bytes = 1word. Please explain.
ОтветитьGreat explanation.❤️
ОтветитьBhai ap gujrati ho?
Ответитьi develop a script to crack aes encryption without brutforce and dictionary attack
i complete the script 60percent but iam stack in something if someone can help me
sir gajab you explained it very well . direct ye pakda tob hi mujhe pata chal gaya
Ответитьhe talks too fast... took me a while to digest what he was saying.
ОтветитьSir can you plz make a video on inverse AES...
Ответитьsaala word kya ha. bhai level ha. love from Pakistan
Ответитьsahi mei sir bacho walla khel h yeh..
ОтветитьBhai BLOWFISH, IDEA,RSA Algorithm,RC5,4🥺 bhi teach kardo na
Ответитьhe deserve more subscribers
Ответитьiss type ka confidence chiyee bas life me.
ОтветитьMake a video on security mechanism and security services
ОтветитьVery awesome explanation
ОтветитьAmazing video but can you explain how 4 words (in the key matrix) was converted into 44 words?
Thanks (:
Udit
How are you expanding the key from 4 words to 44 words? By the way great video
ОтветитьMadan Bhandari College bata ako ko ko xamm ...?? 😂😂
Ответить5 minutes engineering but video = 10 min
Divide into to parts :) that's the way
5 minutes engineering but video = 10 min
Divide into to parts :) that's the way
awesome!!!!
ОтветитьThanks Sonu bhava
ОтветитьThank you sir♥️
ОтветитьThank you.. You are really a life saver...!!👍
ОтветитьThanks a lot sir your videos really help
ОтветитьTy for this video ♥️♥️♥️ I wqs waiting for this video ♥️
Ответить