Abstract:
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). The symmetric cryptography is the classic method of cryptography. The main feature is the use of the same key for both encryption and for decryption processes. Part of symmetric cryptography are block ciphers such as DES and AES.
The DES was adopted as the national standard and formally published as FIPS-46 with the name of DES on January 15, 1977. The DES algorithm is designed to encrypt and decrypt 64-bits blocks using a 56-bits key which is expressed as 64-bits text. The general structure of the algorithm includes 16 identical processing steps. There is also an initial and a final permutation known as IP and IP-1, which are inverse functions. Before the main rounds, the block is divided into two 32-bit texts and processed sequentially. This method is known as Feistel function . The Feistel function ensures that decryption and encryption processes are similar. The key processes in the swap function key.
AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001. Rijndael algorithm was selected to be most suitable for AES, which was developed by Belgian researchers Joan Daemen and Vincent Rijmen. The plain text is divided into blocks of 128 bits, while the key may have a length of 128, 192 or 256 bits, depending on the desired security level. The algorithm is AES-128 is the most prevalent and is supported by most hardware implementations. Both during the process of encryption and decryption process, each round consists of a series of transformations at byte level. In fact, there are used 4 types of transformations: SubBytes, ShiftRows, MixColums, AddRoundKey.
Linear and differential cryptanalysis methods are attacks that affect mainly the security of DES. Because DES has proven vulnerable to such attacks, AES was designed to be immune to such attacks.