In: Computer Science
Show that AES decryption is, in fact, the inverse of AES encryption
USE OF AES:
The result of the encryption will appear in base64 encoded to
prevent character encoding problems.
To decrypt a text be sure it is in base64 encoded and is encrypted
with AES algorithm.
Put the encrypted text in the white textarea, set the key and push
the Decrypt button.
ENCRYPTION WITH AES:
The encryption phase of AES can be broken into three phases: the initial round, the main rounds, and the final round.
Initial Round
Main Rounds
Final Round
AddRoundKey
SubBytes
ShiftRows
MixColumns
The AES Key Schedule
DECRYPTION IN AES
To decrypt an AES-encrypted ciphertext, it is necessary to undo
each stage of the encryption operation in the reverse order.
Inverse Final Round
Inverse Main Round
Inverse Initial Round
Of the four operations in AES encryption, only the AddRoundKey operation is its own inverse (since it is an exclusive-or). To undo AddRoundKey, it is only necessary to expand the entire AES key schedule.
Advantages of AES
One of the primary advantages of AES is its ubiquity. it is
supported by most vendors. Also, it is relatively fast in both
hardware and software.
Disadvantages of AES
AES has a very simple key schedule and simple encryption
operations. Many AES attacks are based upon the simplicity of this
key schedule and it is possible that one day an attack will be
created to break AES encryption.