ADVANCED ENCRYPTION STANDARD (AES):...
Transcript of ADVANCED ENCRYPTION STANDARD (AES):...
![Page 1: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/1.jpg)
Pertemuan ke-7
Dr. R. Rizal Isnanto, S.T., M.M., M.T.
ADVANCED ENCRYPTION STANDARD
(AES): RIJNDAEL
1
![Page 2: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/2.jpg)
Introduction (1) In 1997 the National Institute of Standards and
Technology (NIST) of the United States put out a call for proposals for a new symmetric algorithm, that will be called the Advanced Encryption Standard (AES).
The algorithm DES was since 1976 the standard for symmetric algorithms, and a replacement was necessary.
In 1998 15 candidate algorithms were accepted, and after one year of research 5 of these candidates were announced as finalists: • MARS (IBM corporation)
• RC6 (RSA Laboratories)
• Rijndael (J. Daemen & V. Rijmen)
• Serpent (E. Biham et al.)
• Twofish (B. Schneier et al.)2
![Page 3: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/3.jpg)
Introduction (2)
On all of these algorithms extensive research has been
done to find attacks or weaknesses.
According to NIST, all 5 finalists appear to offer adequate
security. Also much research has been done to test the
performs of these 5 algorithms in both software and
hardware.
In 2000 NIST announced that Rijndael was chosen as the
successor of DES, the AES. The combination of security,
performance, efficiency, implementability and flexibility
made Rijndael an appropriate selection for the AES.
3
![Page 4: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/4.jpg)
Introduction (3)
4
The candidates for the AES algorithm had to fulfill certain
design criteria.
1. First, of course the algorithm should be a symmetric
algorithm and it must be resistant against all known attacks.
2. Furthermore, the AES must be efficient in performance and
memory for different platforms.
3. The design must be simple, and it should be able to handle
different key lengths (128, 192 and 256 bits).
4. The block length of the cipher should be 128 bits.
This chapter gives a description of the Rijndael algorithm.
![Page 5: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/5.jpg)
Mathematical tools (1)
5
This section gives a short introduction to the
mathematics that are used in Rijndael.
Rijndael uses a finite field of the form GF(28), and
here the basics of (finite) fields are presented such
that the Rijndael algorithm can be understood.
GF stands for Galois Field and is an other name for
finite field.
![Page 6: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/6.jpg)
Galois Field (GF)
6
1. Hanya berlaku terbatas, di luar GF tidak berlaku
2. Nilai Koefisien yang dikenal hanya 0 dan 1
3. Hanya ada tanda ‘+’, tidak dikenal tanda ‘-’
4. Operator yang dipakai: ‘+’ dan ‘X’.
5. Penjumlahan ‘+’ diberlakukan sebagai XOR (Exclusive OR)
6. Bilangan disajikan dalam 3 (tiga) cara: biner, polinomial dalam
f(x), dan heksadesimal.
Contoh: f (x) = x3+x+1, dalam GF (23).
Secara biner ditulis sebagai 00001011.
Secara heksadesimal ditulis sebagai ‘0B’
![Page 7: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/7.jpg)
Penjumlahan dalam GF (1)
7
![Page 8: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/8.jpg)
Penjumlahan dalam GF (2)
8
![Page 9: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/9.jpg)
Perkalian dalam GF
9
![Page 10: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/10.jpg)
Pembagian dan Modulo dalam GF
10
Contoh: berapakah ?
Jawab:
sehingga
![Page 11: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/11.jpg)
Sekilas tentang Rijndael
11
First an overview of the Rijndael
algorithm is given. Figure 1 shows
the different phases of the Rijndael
algorithm. It starts with an initial
round followed by a number of
standard rounds and it ends with the
final round. Only four different
operations are necessary to compute
these rounds and a key schedule.
Each of these operations are
described separately in the next
chapters.
![Page 12: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/12.jpg)
Panjang Kunci dan Jumlah Ronde
12
![Page 13: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/13.jpg)
Representasi Kunci dan Pesan dalam Matriks
13
![Page 14: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/14.jpg)
14
Representasi Kunci dan Pesan dalam Matriks
![Page 15: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/15.jpg)
Operasi AddRoundKey (1)
15
![Page 16: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/16.jpg)
Operasi AddRoundKey (2)
16
![Page 17: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/17.jpg)
Operasi SubBytes (1)
17
The operation SubBytes is similar to the S-boxes used in the DES-
algorithm. Rijndael has only one S-box.
![Page 18: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/18.jpg)
18
Operasi SubBytes (2)
![Page 19: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/19.jpg)
PR (1 minggu)
19
![Page 20: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/20.jpg)
AES masih belum selesai
20
Kita tuntaskan setelah UTS karena masih sangat banyak
Ada pertanyaan?
Terima kasih
![Page 21: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/21.jpg)
KISI-KISI UTS KRIPTOGRAFI
Periode Genap 2014-2015
![Page 22: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/22.jpg)
All about Midsemester….
Pelaksanaan: Kamis, 23 April 2015, jam: 12.00-13.40 (Waktu:
100 menit); ruang D205,E201,E202
Sifat: Buka ringkasan 1 lbr double folio (tulis tangan, disisipkan
pada lembar jawab ujian)
Yang tidak sepakat dengan sifat ini: CLOSED BOOK
Kalkulator boleh dipakai, jangan saling pinjam
Segala alat komunikasi, laptop, dkk tutup
Bahan yg perlu disiapkan: next page
![Page 23: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/23.jpg)
BAHAN YANG PERLU DISIAPKAN UNTUK UTS
1. Algoritma Klasik 1 (Matrix Encryption atau Playfair)
2. Algoritma Klasik 2 (Affine, Hill, One-Time-Pad, Rotor)
3. RSA (Rivest, Shamir, Adleman): Konversi kata ke dalam angka
(plaintext), pembangkitan kunci, enkripsi dan dekripsi
4. El Gamal: pembangkitan kunci, enkripsi, dan dekripsi; atau
Rabin Williams Cryptosystem: enkripsi saja
5. Block Cipher (CBC = Cipher Block Chaining atau CFB =
Cipher Feedback)
6. Data Encryption Standard (DES): substitusi dan ekspansi
![Page 24: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/24.jpg)
Hal-hal (agak) penting
1. Tabel ASCII : sudah diberikan
2. Tabel Ekspansi dan Substitusi pada DES/AES: sudah diberikan
3. Jika mau buat lagi sendiri juga boleh
4. Semua soal yang akan dikeluarkan, versi soalnya sudah
diberikan selama perkuliahan
![Page 25: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/25.jpg)
Ada pertanyaan tentang UTS
25
Selamat belajar, semoga sukses
Terima kasih
![Page 26: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/26.jpg)
Pertemuan ke-8
Dr. R. Rizal Isnanto, S.T., M.M., M.T.
ADVANCED ENCRYPTION STANDARD
(AES): RIJNDAEL (2)
26
![Page 27: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/27.jpg)
Operasi ShiftRows (1)
27
In ShiftRows (figure 3), the rows of State are cyclically shifted with
different offsets.
Row 1 is shifted over c1 bytes, row 2 over c2 bytes, and row 3 over
c3 bytes.
The values of c1, c2, and c3 depend on the block length Nb:
![Page 28: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/28.jpg)
Operasi ShiftRows (2)
28
![Page 29: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/29.jpg)
Operasi ShiftRows (3)
29
![Page 30: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/30.jpg)
Operasi MixColumns (1)
30
![Page 31: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/31.jpg)
Operasi MixColumns (2)
31
![Page 32: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/32.jpg)
Operasi MixColumns (3)
32
Contoh Soal: State s dinyatakan sebagai
![Page 33: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/33.jpg)
Operasi MixColumns (3)
33
![Page 34: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/34.jpg)
Operasi MixColumns (4)
34
![Page 35: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/35.jpg)
Bagaimana jika pangkat tertinggi dari f(x)
lebih dari 7? (1)
35
![Page 36: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/36.jpg)
Bagaimana jika pangkat tertinggi dari f(x)
lebih dari 7? (2)
36
![Page 37: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/37.jpg)
Bagaimana jika pangkat tertinggi dari
f(x) lebih dari 7? (3)
37
![Page 38: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/38.jpg)
Bagaimana jika pangkat tertinggi dari f(x)
lebih dari 7? (4)
38
![Page 39: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/39.jpg)
39
ADVANCED ENCRYPTION
STANDARD (AES):
RIJNDAEL
Ekspansi Kunci AES (key scheduling)
Lanjutan…
![Page 40: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/40.jpg)
Ekspansi Kunci AES (key scheduling)
40
• Contoh: untuk Nk = 4, panjang kunci = 128 bit
• (AES-128)
![Page 41: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/41.jpg)
w[4] = w[0] SubWord(RotWord(w[3])) rcon(i/4) ; i = 4
w[5] = w[1] w[4] ; i = 4
w[6] = w[2] w[5] ; i = 5
.
.
.
w[8] = w[4] SubWord(RotWord(w[7])) rcon(i/4) ; i = 8
41
i 1 2 3 4 5 6 7 8 9 10
rcon(i) 01 02 04 08 10 20 40 80 1B 3C
![Page 42: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/42.jpg)
Contoh Soal:
42
![Page 43: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/43.jpg)
Solusi
43
![Page 44: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/44.jpg)
Lanjutan Solusi
44
![Page 45: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/45.jpg)
PR (1 minggu)
45
1.
2. Misalnya terdapat kunci AES sebagai berikut.
CA 14 10 90 FF AC DA 27 83 C1 BF 93 67 19 E1 32
Tentukanlah 4 byte pertama kunci ronde 1 (=w[4])
3. Tentukanlah w[5] hasil ekspansi kunci AES-128 dengan kunci sbb.
AB CD EF 01 23 45 67 89 AB CD EF 01 23 45 67 89
![Page 46: ADVANCED ENCRYPTION STANDARD (AES): RIJNDAELrizal.blog.undip.ac.id/.../09/8_ADVANCED_ENCRYPTION-STANDAR… · be called the Advanced Encryption Standard (AES). ... This chapter gives](https://reader034.fdocuments.us/reader034/viewer/2022050807/5a7935f57f8b9ac53b8c19f7/html5/thumbnails/46.jpg)
Ada pertanyaan?
Selamat belajar, semoga sukses
Terima kasih