AES Flashcards

1
Q

What does AES stands for?

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which algorithm does AES use?

A

Rijndael

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which are the main characteristics of the AES algorithm?

A

clean, fast, good security margin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the available key sizes on AES?

A

128, 192, or 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which are the possible block size?

A

128, 192, or 256 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which matrix does the AES operates on?

A

For 128 bits, State[4,4] and key[4,4] matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many rounds does AES uses?

A

10 (for block and key size of 128 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens in each of the AES rounds?

A

round 1-9: make use of four different operations:
- Byte substitution
- Shift row
- MixColumn
- Round Key
round 10 (the last round)
- do not perform the mix column operation, all the rest is the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the subByte step work?

A

Each byte of the state matrix is divided in 4 bits each (the upper and the lower part). Then, we look into the line (upper part) and row (lower part) in the substitution matrix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the shift row step work?

A

After the subbyte step, for each line of the state matrix we left shift them by the number of bytes corresponding to the row number. So the row 0 remains the same, the row 1 is shifted once, the second row is left shifted twice and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the MixColumn step work?

A

After the shift row step, each column of the state matrix is multiplied by another matrix to increase the diffusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the Round Key step work?

A

Each column of the state matrix after the mix column step is XORED with the subkey generated on the key scheduling step.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the key scheduling step work?

A

The first key matrix to be used is the given key. To generate the next 16 bytes, we rotate the fourth matrix column by one position (up) and we perform a substitution using the s-box provided. Then, we XOR this result with the first column and the corresponding rcon. This result will be the next first key matrix column. The next ones are just the XOR of the previous column with the previous -3 column. For 10 steps, we need to generate 10 subkeys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which are the main AES algorithm decryption characteristic?

A

1) AES is invertible:
- S is bijective
- shifting as a permutation too
- Matrix for mix columns has an inverse XORING the key is bijective
2) AES is not a Feistel network and in fact the decryption is different from the encryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Discuss about security of AES

A

Key recovery attacks are faster than brute force by a factor of about four. Successful side channel attacks have been reported (in particular cache timing attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly