Advanced Encryption Standard (AES) Algorithm Part-1 Explained in Hindi

Advanced Encryption Standard (AES) Algorithm Part-1 Explained in Hindi

5 Minutes Engineering

4 года назад

303,579 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@navdeepp5
@navdeepp5 - 02.12.2023 08:45

Sir, what exactly happens in Expand key function?

Ответить
@GildwareTechnologies
@GildwareTechnologies - 28.07.2023 10:44

The Advanced Encryption Standard (AES) is a widely used symmetric key encryption algorithm. It is a block cipher, which means it encrypts data in fixed-size blocks. AES is considered one of the most secure and efficient encryption algorithms, making it a standard choice for securing sensitive data in various applications.

Key Features of AES:
Symmetric Key Encryption: AES uses the same secret key for both encryption and decryption. The key must be kept confidential and shared securely between the communicating parties.

Key Sizes: AES supports three key sizes: 128 bits, 192 bits, and 256 bits. The key size determines the number of rounds in the encryption process and the strength of the encryption.

Block Size: AES operates on fixed-size blocks of 128 bits (16 bytes) during encryption and decryption.

Number of Rounds: The number of rounds in AES depends on the key size. For a 128-bit key, AES performs 10 rounds; for a 192-bit key, it performs 12 rounds, and for a 256-bit key, it performs 14 rounds.

Confusion and Diffusion: AES achieves security through a combination of confusion and diffusion. Confusion involves complex mathematical transformations to obscure the relationship between the plaintext and the ciphertext. Diffusion ensures that each bit of the plaintext affects multiple bits in the ciphertext.

Encryption Process:
The AES encryption process involves the following steps:

Key Expansion: The secret key is expanded to create a set of round keys, one for each round of encryption.

Initial Round: The input data, known as plaintext, is divided into 128-bit blocks. In the first round, each byte of the plaintext is combined with the corresponding byte of the round key using a bitwise XOR operation.

Main Rounds: AES performs a fixed number of main rounds (determined by the key size). Each round consists of four transformations: SubBytes, ShiftRows, MixColumns, and AddRoundKey.

SubBytes: Each byte of the block is replaced by another byte based on a substitution table (S-box).
ShiftRows: The rows of the block are cyclically shifted to the left.
MixColumns: The columns of the block are mixed to add diffusion.
AddRoundKey: Each byte of the block is combined with the corresponding byte of the round key using a bitwise XOR operation.
Final Round: The final round does not include the MixColumns transformation.

Decryption Process:
The decryption process in AES is the reverse of the encryption process. It involves the same steps as encryption, but the transformations are applied in reverse order. The round keys used for decryption are the inverse of the round keys used for encryption.

Security and Performance:
AES is widely considered secure against known attacks when used with an appropriate key size (128-bit, 192-bit, or 256-bit). The security of AES is based on the strength of the encryption key, and its design has undergone extensive analysis by cryptographic experts.

In terms of performance, AES is known for its efficiency and is optimized for both software and hardware implementations. It is suitable for a wide range of applications, including secure communication, data encryption, and file storage.

In conclusion, the Advanced Encryption Standard (AES) is a strong and efficient encryption algorithm widely used for securing data and ensuring confidentiality in various domains, including computer systems, network communication, and cloud services. Its security and performance characteristics make it a key component in modern cryptography.

Ответить
@khushijain6983
@khushijain6983 - 29.05.2023 10:05

Sir, you also make video on data mining subject, your explanation is amazing

Ответить
@alihassanhassan5100
@alihassanhassan5100 - 12.03.2023 09:26

1 word =4 bits sir please it's true or not

Ответить
@leob7458
@leob7458 - 28.02.2023 10:13

Sir aapke vedio saare Kamal ke hi hotel hai

Ответить
@haariskhan961
@haariskhan961 - 21.02.2023 06:37

4hr before exam ill be safe i hope

Ответить
@huzaifamanzoor7223
@huzaifamanzoor7223 - 20.02.2023 13:45

Blkl samajh ni i ajeeb tareqa sa samjha rha ha ya banda.

Ответить
@MUKESHYADAV-ep1fo
@MUKESHYADAV-ep1fo - 30.11.2022 23:09

KAL EXAM HAI , DONOT KNOW PASS HOUNGA BHI

Ответить
@bhuppidhamii
@bhuppidhamii - 14.06.2022 14:12

<3

Ответить
@bhuppidhamii
@bhuppidhamii - 14.06.2022 14:12

dimag m chap jayegaaa

Ответить
@LIVE_LIVELY
@LIVE_LIVELY - 26.05.2022 13:26

RC4 Algorithm also upload...i have exams in June 1st week...please 😢

Ответить
@pratikmandora4013
@pratikmandora4013 - 18.05.2022 15:56

can anyone explain me how 4 words expanded to 44??

Ответить
@emoboy6685
@emoboy6685 - 21.04.2022 16:15

Ghas virus use this encryption method 🙂

Ответить
@adityapanda1856
@adityapanda1856 - 30.03.2022 09:37

Mujhe lagtha mere cllg k fees bhai tujhe dena chaiye

Ответить
@amirijaz8530
@amirijaz8530 - 14.02.2022 14:13

brother u r speaking to fast ... tough to understand...

Ответить
@asadahmedjalbani4676
@asadahmedjalbani4676 - 31.12.2021 21:06

128 bit is size of plaintext. and the round depend upon the size of key. there are 3 types of keys for 128 bit there will 10 rounds, 192 bit key size 12 rounds and for key 256 bit there will be 14 rounds.

Ответить
@tirthpatel20
@tirthpatel20 - 23.12.2021 18:04

Shridhar sir, you're the savior of engineering students... Thank u so much!

Ответить
@anujrawat6304
@anujrawat6304 - 27.10.2021 12:02

Sir please make video of just 5 min, there is only 5 min remaining for my exam. ;) just a joke , great videos

Ответить
@LearnwithJasmeen
@LearnwithJasmeen - 14.09.2021 21:48

your YT Channel is wonderful....
wonderful Presentation.... Really you are doing excellent.... Keep it up ... Best wishes

Ответить
@anshallu3235
@anshallu3235 - 06.07.2021 20:00

Rohit sharma is taking class

Ответить
@NavinKumar-ig4xb
@NavinKumar-ig4xb - 21.05.2021 05:42

Boss video short banane m tum main logic batana bhull gye ho ya to tumne hta diya hai... Yese padhya nhi jata sir jee

Ответить
@adityaparikh3979
@adityaparikh3979 - 11.04.2021 10:42

For AES-128 the key expansion is from 4word to 44word so what is the expansion for AES-192 and AES-256? Please help me

Ответить
@justanotherguy5516
@justanotherguy5516 - 29.03.2021 13:37

Umm, your videos are how I always clear my concepts and they provide the easiest and the best explanation. But I didn't get, how 16byte = 4words. The conversion rate is 2bytes = 1word. Please explain.

Ответить
@iqraakhtar8561
@iqraakhtar8561 - 19.03.2021 14:44

Great explanation.❤️

Ответить
@muhammadfarazasif7701
@muhammadfarazasif7701 - 10.02.2021 17:12

Bhai ap gujrati ho?

Ответить
@samadakbarzai6678
@samadakbarzai6678 - 25.01.2021 21:11

i develop a script to crack aes encryption without brutforce and dictionary attack
i complete the script 60percent but iam stack in something if someone can help me

Ответить
@ridhamh2966
@ridhamh2966 - 20.01.2021 08:52

sir gajab you explained it very well . direct ye pakda tob hi mujhe pata chal gaya

Ответить
@the_pirate
@the_pirate - 13.01.2021 09:24

he talks too fast... took me a while to digest what he was saying.

Ответить
@sagarr.w3085
@sagarr.w3085 - 25.12.2020 16:01

Sir can you plz make a video on inverse AES...

Ответить
@meqasim
@meqasim - 17.12.2020 09:05

saala word kya ha. bhai level ha. love from Pakistan

Ответить
@manishchauhan7450
@manishchauhan7450 - 05.12.2020 20:13

sahi mei sir bacho walla khel h yeh..

Ответить
@hrishikesh6979
@hrishikesh6979 - 07.11.2020 13:42

Bhai BLOWFISH, IDEA,RSA Algorithm,RC5,4🥺 bhi teach kardo na

Ответить
@vedeshkompella9930
@vedeshkompella9930 - 26.10.2020 17:10

he deserve more subscribers

Ответить
@rutvikpatel9071
@rutvikpatel9071 - 13.09.2020 11:06

iss type ka confidence chiyee bas life me.

Ответить
@khateejabegum7833
@khateejabegum7833 - 02.09.2020 13:25

Make a video on security mechanism and security services

Ответить
@khateejabegum7833
@khateejabegum7833 - 02.09.2020 13:11

Very awesome explanation

Ответить
@uditmahajan555
@uditmahajan555 - 11.08.2020 23:32

Amazing video but can you explain how 4 words (in the key matrix) was converted into 44 words?

Thanks (:
Udit

Ответить
@alfahimmohammad
@alfahimmohammad - 29.04.2020 12:35

How are you expanding the key from 4 words to 44 words? By the way great video

Ответить
@aayamneupane1489
@aayamneupane1489 - 18.03.2020 20:39

Madan Bhandari College bata ako ko ko xamm ...?? 😂😂

Ответить
@surajbhandari1540
@surajbhandari1540 - 17.03.2020 19:59

5 minutes engineering but video = 10 min
Divide into to parts :) that's the way

Ответить
@surajbhandari1540
@surajbhandari1540 - 17.03.2020 19:45

5 minutes engineering but video = 10 min
Divide into to parts :) that's the way

Ответить
@riashrivastava6356
@riashrivastava6356 - 04.03.2020 04:01

awesome!!!!

Ответить
@ManojKumar-jg5cf
@ManojKumar-jg5cf - 03.03.2020 09:18

Thanks Sonu bhava

Ответить
@pratikshah332
@pratikshah332 - 03.03.2020 08:41

Thank you sir♥️

Ответить
@aadityadeshpande9080
@aadityadeshpande9080 - 01.03.2020 10:42

Thank you.. You are really a life saver...!!👍

Ответить
@neilanu1702
@neilanu1702 - 01.03.2020 09:16

Thanks a lot sir your videos really help

Ответить
@ashutoshwalimbe6774
@ashutoshwalimbe6774 - 01.03.2020 09:12

Ty for this video ♥️♥️♥️ I wqs waiting for this video ♥️

Ответить