4. DES
TI MỖI ROUND:
H M DES:
KEY GENERATION:
EXPANSION PBOX:
5. AES
a. AES CIPHER ARCHITECTURE
5.1
. AES CIPHER
BLOCK TO STATE AND STATE TO BLOCK TRANSFORMATION
STRUCTURE OF EACH ROUND
b. AES PRINCIPLE
SUBSTITUTION
-
SUBBYTES
- TRANSFORMATION USING GF (2
8
)
PERMUTATION
-
SHIFTROWS
MIXING
KEY – ADDING
c.
KEY EXPANSION
KEY EXPANSION IN AES 128
a. ORIGINAL DESIGN
5.2
. AES CIPHER DESIGN
b. ALTERNATIVE DESIGN
6. INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY
6.1. PUBLIC KEY
a. SYSTEM STRUCTURE
7.1. SYSTEM MODEL
7
.
RSA CRYPTOGRAPHY
7.2. RSA CRYPTOGRAPHY
8. HASH FUNCTION
8.1. INTRODUCTION
7.3
. SUMMARIZED EXAMPLE
8.2. HASH FUNCTION SCHEME
a. ALGORITHM STRUCTURE
8.3
. SHA-512
b.
PRINCIPLE

Preview text:

4. DES TẠI MỖI ROUND: H M DES: EXPANSION PBOX: KEY GENERATION: 5. AES 5.1 . AES CIPHER a. AES CIPHER ARCHITECTURE
• BLOCK TO STATE AND STATE TO BLOCK TRANSFORMATION • STRUCTURE OF EACH ROUND b. AES PRINCIPLE • SUBSTITUTION - SUBBYTES
- TRANSFORMATION USING GF (28) • PERMUTATION - SHIFTROWS • MIXING • KEY – ADDING c. KEY EXPANSION KEY EXPANSION IN AES 128 5.2 . AES CIPHER DESIGN a. ORIGINAL DESIGN b. ALTERNATIVE DESIGN
6. INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY 6.1. PUBLIC KEY a. SYSTEM STRUCTURE
7 . RSA CRYPTOGRAPHY 7.1. SYSTEM MODEL 7.2. RSA CRYPTOGRAPHY 7.3 . SUMMARIZED EXAMPLE 8. HASH FUNCTION 8.1. INTRODUCTION 8.2. HASH FUNCTION SCHEME 8.3 . SHA-512 a. ALGORITHM STRUCTURE b. PRINCIPLE