SLIDE 27
- D. Mukhopadhyay Crypto & Network
Security IIT Kharagpur 27
Network Security IIT Kharagpur
AES on the table!
, ,
Let the input of the round transformation be denoted by , and the output of SubBytes by . [ ],0 4 and 0 Let the output of ShiftRows be denoted by , and the
i j RD i j b
a b b S a i j N c ∴ = ≤ < ≤ <
1 2 3
0, 0, 1, 1, 2, 2, 3, 3, 0, 0, 1, 1, 2, 2, 3, 3,
. = ,0 j<N 02 03 01 01 01 02 03 01 and, ,0 j<N 01 01 02 03 03 02 01 01
j C j j C j b j j C j j C j j j j j j j j
d b c b c c b c b d c d c d c d c
+ + + +
⎡ ⎤ ⎡ ⎤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ∴ ≤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ ⎦ ⎣ ⎦ ⎡ ⎤ ⎡ ⎤ ⎡ ⎤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ = ≤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ ⎦ ⎣ ⎦ ⎣ ⎦ The above addition in the indices are done modulo N .
b b
Network Security IIT Kharagpur
AES on the table!
1 2 3
0, 0, 1, 1, 2, 2, 3, 3, 0, 1, 2, 3,
Combining the above equations we have, [ ] 02 03 01 01 [ ] 01 02 03 01 ,0 j<N 01 01 02 03 [ ] 03 02 01 01 [ ]
RD j C j RD j C j b j RD j C j RD j C j j j
S a d S a d d S a d S a d d d d
+ + + +
⎡ ⎤ ⎡ ⎤ ⎡ ⎤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ = ≤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ ⎦ ⎣ ⎦ ⎣ ⎦ ⇒
0, 1, 2, 3,
02 03 01 02 [ ] [ ] 01 01 03 01 01 01 03 01 [ ] [ ],0 j<N 02 03 01 02
RD j C RD j C j RD j C RD j C b
S a S a S a S a
+ + + +
⎡ ⎤ ⎡ ⎤ ⎡ ⎤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ = ⊕ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ ⎦ ⎣ ⎦ ⎣ ⎦ ⎡ ⎤ ⎡ ⎤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⊕ ⊕ ≤ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎣ ⎦ ⎣ ⎦