LAB 2
MODERN CRYPTOGRAPHY – DES AND AES
Name: Bùi Tấn Lộc
ID: 18521002
Objective:
- Students understand the encryption process of DES and AES
Requirement:
- Student works individually an submits the pdf file with filename [Link]
1. DES
Students open Avalanche (DES).cwm in folder C:\Program Files (x86)\CrypTool
2\Templates\Cryptanalysis\Modern. Click on “Enable to change single bit”
1
1.1 Change message, keep key
- Type student name (only 8 characters) into DES plaintext.
- Click on any bit in initial message to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8
# of flipped bits
% of flipped bits
Round 9 10 11 12 13 14 15 16
# of flipped bits
% of flipped bits
1.2 Keep message, change key
- Type student name (only 8 characters) into DES plaintext.
- Click on 13th bit in initial key to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8
# of flipped bits
% of flipped bits
Round 9 10 11 12 13 14 15 16
# of flipped bits
% of flipped bits
2
1.3 Keep message, change key
- Type student name (only 8 characters) into DES plaintext.
- Click on 8th bit in initial key to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8
# of flipped bits
% of flipped bits
Round 9 10 11 12 13 14 15 16
# of flipped bits
% of flipped bits
1.4 Give your conclusion based on the previous change
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
3
2. AES
Open the [Link] file to inspect the operation of AES and fill
information in the following table:
Content Description
Key size (in bits) 128 bits.
192 bits.
256 bits.
Block size (in bits) 128 bits.
Number of rounds 128 bits – 10 rounds
(depending on key 192 bits – 12 rounds
size) 256 bits – 14 rounds
Summarize the First, the last four bytes of the previous key are taken.
steps of creating Afterward, the last byte is placed at the front
key in each round
Every byte in the state matrix is exchanged with the
(round key)
corresponding byte from S-box
A round constant is added
Adding the first four bytes of the previous key gives you the
first four bytes of the next key
For column x of the new key you XOR column x from the
previous key with column x-1 from the new key.
After that , we can complete Result matrix.
List and describe 4 Sub Byte: First, a byte is transferred from the state matrix to
functions (in order) the transition spot and split up. The corresponding byte in the
in each round S-box is determined and placed into the result matrix.
Shift Row : First, the second row is shifted once to the left.
Then, the third row is shifted twice towards the left, and
4
finally the fourth row is shifted three times to the left. The
overlapping bytes are transferred to the right to form a 4x4
matrix.
Mix Col: One column is taken from the current state and
placed next to the multiplication matrix. Then it is multiplied
with the multiplication matrix to determine the next column
of the next state.
Add key: The round key is added to the current state by
XORing the bytes.
Which function is Mix Column.
not available in
round 10?