Question

In: Computer Science

Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is...

Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem. Your response must include the type of Algorithm used, the size of data blocks that can be processed, and the lengths of the cipher keys.

Solutions

Expert Solution

Answer:-

A cryptosystem is a pair of algorithms: one for the encryption of data and another for decryption. Often these algorithms use a unique key which should be kept secret, in which case the process for generating and sharing the key is also considered part of the cryptosystem.

Modern cryptography is essential to the digital world we live in and has grown to be quite complex. It is used for sending messages in a secure manner on the internet, such as our credit card information and other private data. Encryption is used to keep our data secure online and locally. The Advanced Encryption Standard (AES) is used by governments to maintain the secrecy of their documents and was chosen from a number of candidates across the mathematics community for its security and efficiency.

In addition, digital security can also be used to maintain anonymity, to authenticate one’s identity via digital signatures, to demonstrate proof of work in blockchain technologies and to ensure that software and messages are free from tampering.

A cryptosystem is a pair of algorithms: one for the encryption of data and another for decryption. Often these algorithms use a unique key which should be kept secret, in which case the process for generating and sharing the key is also considered part of the cryptosystem.

Modern cryptography is essential to the digital world we live in and has grown to be quite complex. It is used for sending messages in a secure manner on the internet, such as our credit card information and other private data. Encryption is used to keep our data secure online and locally. The Advanced Encryption Standard (AES) is used by governments to maintain the secrecy of their documents and was chosen from a number of candidates across the mathematics community for its security and efficiency.

In addition, digital security can also be used to maintain anonymity, to authenticate one’s identity via digital signatures, to demonstrate proof of work in blockchain technologies and to ensure that software and messages are free from tampering.

Definitions
Cryptography terms
Here are a few definitions of some terms relating to cryptography and cryptosystems:

Plaintext: The original message in its original legible form.
Ciphertext: Encrypted text that will appear to be a random string.
Encryption: The process of converting data into its cryptic form that prevents unauthorized access, i.e. converting plaintext to ciphertext. This process requires encryption keys which provide information regarding the specific implementation of a given encryption algorithm.
Decryption: The process of converting encrypted data back into its original form for use, i.e. converting ciphertext back to plaintext. Decryption requires a decryption key which provides the specific information required to ‘undo’ the encryption.
Symmetric Key Cryptosystems: Cryptosystems that use the same key for encryption as well as decryption. This key is assumed to be a shared secret between the two parties exchanging messages. A few examples of Symmetric Key Cryptosystems:
Cipher: A system of encryption that maps each character to a substitute.
Code: A system of encryption that maps each word or feature to a substitute.
Shift Cipher: A cipher that replaces each character with another chosen by moving forwards through the alphabet by some fixed shift factor.
Asymmetric or Public Key Cryptosystems: Cryptosystems that use public-private key pairs. This enables anyone to encrypt messages for sending to the publisher of the keys (using the public key) but only the holder of the private key will be able to decrypt the messages.
Digital Signatures: A digital code (generated and authenticated by public key encryption) which is attached to an electronically transmitted document to verify its contents and the sender's identity.
Number theory terms
The following are some important concepts required for cryptography from the field of number theory

Modulo: The remainder operator (e.g. 17 modulo 5 is 2, i.e. 17 when divided by 5 leaves a remainder of 2). This is often shortened to mod, we write 17 ≡ 2 (mod 5), read as "17 is congruent to 2, modulo 5".
Coprime: In number theory two values are said to be coprime or relatively prime if they do not share any common prime factors. That’s to say that their greatest common divisor (GCD) or highest common factor is 1.
Characters
It is general practice in cryptography to follow the standards of Rivest, Shamir and Adleman, the inventors of the RSA encryption algorithm, by using Alice and Bob as the main protagonists in any example of cryptosystem protocols. In examples of attacks, Eve is usually cast as the attacker. That is, Alice wants to send messages privately to Bob, and Eve is trying to spy on the messages.

Design Objectives & Goals
The design objectives of a cryptosystem can be summarized by Kerckhoff’s Priniciple:

The system must be secure even if everything except the private key is public information. In particular, the design of the system must not be required to be kept secret.
This is the approach taken by modern cryptography (as compared to earlier cryptographic systems, which often relied on obscurity, i.e. aiming for security by keeping the system or parts of it secret or unclear.)

Beyond security computational efficiency and the practicality of implementation are sub-objectives in cryptosystem design. This is shown in the development of AES whereby the US Government accepted suggestions for algorithms and 15 made it to the final. Some of the finalists were more secure than the ultimate winner but were dismissed for requiring too much processing power.

The trade-off between complexity and therefore security and ease of implementation can be further seen in the guidance for the use of AES encryption. Top secret information is encrypted using a 192 or 256 bit key whereas less highly classified information may be encrypted using a 128-bit key for efficiency. AES involves 10 rounds of encryption processes for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys.


Related Solutions

Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption...
Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption Standard (AES) is the current NIST standard for encryption and is used in most applications. Explain the differences between the following concepts as they apply to both algorithms. Concept DES AES S-BOX Permutation Key Size
Researching Applications of RFID. Visit the Web and perform a search on RFID for applications that...
Researching Applications of RFID. Visit the Web and perform a search on RFID for applications that we didn’t discuss in this chapter. Also, search the Web for the leading provider of RFID technologies. What companies did you find? Does one seem to stand out above the rest? If so, which is it?
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
Perform a web-search and locate information about utilization review in healthcare. What is utilization review? How...
Perform a web-search and locate information about utilization review in healthcare. What is utilization review? How does it relate to Health Information Management? How does it relate to coding? What are skill needed to perform utilization review?250 words
PLEASE TYPE YOUR ANSWER Visit the ANA web site (www.nursingworld.org), search communication, and read an article....
PLEASE TYPE YOUR ANSWER Visit the ANA web site (www.nursingworld.org), search communication, and read an article. Report what they learned in 2-3 paragraphs or read the article “Mindful Communication: A Novel Approach to Improving Delegation and Increasing Patient Safety,” and report on it.
W2A1: Question: Perform an Internet search using the term break-even analysis. Select and read a case...
W2A1: Question: Perform an Internet search using the term break-even analysis. Select and read a case study or article from the results of your search. Summarize the case study or article, and relate the ideas of the article to what you have learned this week in this course.
Binary Search. Write a MIPS assembly program to perform a binary search on A[10], which is an array of 10 positive integers.
Binary Search. Write a MIPS assembly program to perform a binary search on A[10], which is an array of 10 positive integers. Your program should have a main routine that does the following:(a) Prompt the user to enter all the 10 integers in the array.(b) Prompt the user to enter the number to be searched.(c) Reads the integer values and makes sure it is a positive integer.(d) Prints the index of the integer. If the input is not available in...
Design a program which uses functions to sort a list and perform a binary search. Your...
Design a program which uses functions to sort a list and perform a binary search. Your program should: Iinitialize an unsorted list (using the list provided) Display the unsorted list Sort the list Display the sorted list. Set up a loop to ask the user for a name, perform a binary search, and then report if the name is in the list. Use a sentinel value to end the loop. Do not use the Python built in sort function to...
Conduct an internet web search which addresses alternative medicine as an approach to disease prevention. Provide...
Conduct an internet web search which addresses alternative medicine as an approach to disease prevention. Provide a brief summary of your findings and post the internet website/or article.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT