How does AES encryption work? Advanced Encryption Standard

Поділитися
Вставка
  • Опубліковано 5 лип 2024
  • See studycoding.org for all tutorials by Shad Sluiter.
    Explanation and animation showing how the AES block cipher algorithm works

КОМЕНТАРІ • 103

  • @Isabellaa-ms5dk
    @Isabellaa-ms5dk Рік тому +2

    the only video that has really helped me understand AES!! thank you so much

  • @alexandrospanag
    @alexandrospanag Рік тому +4

    Dear professor, thank you from Greece! Your guides are awesome and very in-depth and explanatory! Have a good day and thank you for the amazing content!

  • @enaxorgil5352
    @enaxorgil5352 Рік тому

    Easiest explanation I've come across by far. Thanks Sir 💕

  • @abuk95
    @abuk95 4 роки тому +39

    - You should really mention more that the matrix multiplication (in mix columns) is not in normal arithmetic, but in Galois's finite field (2^8) arithmetic. Not just say "go look it up", because result with normal matrix multiplication are different.
    - And during key schedule you use Rcon(4) in first iteration, which is wrong. You should use number of iteration for the lookup, so Rcon(1). Visualize the XOR with only first byte, in order to be less confusive. Another iteration for next subkey is Rcon(2) in lookup table and so on. -- yeah, having rcon lookup table would also be better, rather than created vectors from the table.
    - Other things you are talking about are really clear and i am glad you dedicated time for making this helpful video, thanks!

    • @maoryatskan6346
      @maoryatskan6346 3 роки тому +1

      Still best explanation found

    • @chetanjoshi3922
      @chetanjoshi3922 2 роки тому +1

      Gotta say I'm impressed by your counter.. can you tell me some good resources to learn about AES in more detail? I'd be glad!

    • @marko90000
      @marko90000 3 місяці тому

      also we can and will increase the AES size as needed into 1024 16*16 2bytes *4 or we can use 3 for 4096 or even 4 bytes in encription and use 256*256 which would be AES 65356 :) for the data layer. :)

  • @jericovillanueva3459
    @jericovillanueva3459 4 роки тому +42

    Thanks! Really helped alot. Learned more in this 12 mins than my whole semester

    • @leonard128
      @leonard128 4 роки тому

      hahahah, i think in the same way, you save my life sir.

    • @netbotcl586
      @netbotcl586 4 роки тому +2

      I guess you came here the night before the exam? xD

    • @Nickola_United
      @Nickola_United Рік тому

      students are same everywehere)))

  • @jaren2kilo
    @jaren2kilo 3 роки тому

    Thank you Shared! This short video really helped to understand the concept in simple way.

  • @francisonojeharho6928
    @francisonojeharho6928 2 роки тому

    This is the best explanation to AES encryption standard out here

  • @haviettien1914
    @haviettien1914 4 роки тому

    Easy to understand and nice animations. Thank you, sir

  • @teleport3306
    @teleport3306 6 місяців тому

    Tried to litterly find explanation how it works and only you explained the best way possible

  • @himanshujain718
    @himanshujain718 4 роки тому +1

    Best ever explanation of AES!
    You deserve infinite likes
    Thank you so much ❤️ Sir!

  • @italian_taco1247
    @italian_taco1247 2 роки тому

    I am 12 trying to understand AES, this helped! Thank you!

  • @michellemassaad1013
    @michellemassaad1013 3 роки тому +9

    hey professor i am 13 and i am trying to learn how to encrypt using the AES algorithm ,this helped a lot to understand the process thank you

    • @goyslop-consumer
      @goyslop-consumer 2 роки тому

      hey, did figure out how to encrypt pls message me back

  • @jerlynjohnson7928
    @jerlynjohnson7928 2 роки тому

    Excellent presentation!

  • @qin6409
    @qin6409 Рік тому

    Best video after I struggled on whole UA-cam video

  • @sravanakumar9326
    @sravanakumar9326 Рік тому +1

    Wow, great explanation 🎉

  • @nursyazwani_4108
    @nursyazwani_4108 4 роки тому

    much more understandable and clear explanation rather than my classmate presentation

  • @tridibroyarjo418
    @tridibroyarjo418 3 роки тому +4

    Sir, I did love your video and I am just too young to understand your valuable speech as a 12 Years old. But still, I keep a large interest in Computer Science and Encryption Algorithms. Your lectures are really very much helpful. Thank you, sir!

  • @muhammadhassan3058
    @muhammadhassan3058 3 роки тому

    The video I wants I found here thanks sir what a great way to explain 😊☺️

  • @kempisabel9945
    @kempisabel9945 2 роки тому

    loved your explanation! thanks so much

  • @lmaoty
    @lmaoty 3 роки тому +1

    Excellent! Finally understood this!

  • @adedejiemmanuel1
    @adedejiemmanuel1 3 роки тому +3

    Thanks for this lesson. I have a question, what cipher mode is applicable in the AES encryption?
    By cipher mode, I meant something like ECB, CBC, CTM, GCM, etc.

  • @mikewashington4188
    @mikewashington4188 Рік тому

    Great video. I used the AES algorithm to encrypt and decrypt the contents of a hidden file that stored the password and username of sFTP server used to retrieve data.

  • @adamtafesse8971
    @adamtafesse8971 4 роки тому +1

    Great overview! Thanks!

  • @ismailuwair187
    @ismailuwair187 3 роки тому

    Sir, u saved my life! thank u, sir! I hope i was a student of urs that would make me invincible

  • @naumannasir6948
    @naumannasir6948 4 роки тому

    very helpful ,easily explained

  • @ENZOuwu
    @ENZOuwu Рік тому

    Thanks you, sir. This helped me a lot

  • @rmabsone8108
    @rmabsone8108 4 роки тому

    thank you sir, animation is so helpful

  • @james10master
    @james10master 4 роки тому +2

    At the end when the Round Keys are being determined from the cipher key, is this process the same regardless of the key size? I ask this because each 'key' is only 16-bytes (128-bits) so does that mean the process is slightly different for 24-byte (192-bits) and 32-byte (256-bit) keys?

  • @loganbala1450
    @loganbala1450 2 роки тому

    Thanks. This video helped me alot.

  • @ognjenantonic8675
    @ognjenantonic8675 4 роки тому

    Great Explanation

  • @aurelio3532
    @aurelio3532 3 роки тому

    Beautiful! very easy to understand even if I know nothing about cryptpgraphy. I want to aplly this so baaad

  • @lalehalimadadi2129
    @lalehalimadadi2129 4 роки тому +1

    Thanks a lot, your video is amazing! I hope you share us more video.

  • @paulinacastillo1166
    @paulinacastillo1166 Рік тому +1

    a good video, i liked so much. Thank for doing this :)

  • @salissobrachialis3719
    @salissobrachialis3719 Рік тому

    Very helpful. Thank you

  • @SumitKumar-sg9pt
    @SumitKumar-sg9pt 3 роки тому +1

    this is exactly what I was looking for. thank you so much professor

  • @isaacweber7398
    @isaacweber7398 Рік тому

    NIiiiiiiiiiiiiiiiceeeeeeeeeeeeeeee. Do not stop doing that, professor

  • @anjanasanthosh1040
    @anjanasanthosh1040 4 роки тому

    Thanku sir,it was of great help

  • @epaguyeify
    @epaguyeify 3 роки тому

    Well explained. Thank you

  • @ngedrupsamphel9092
    @ngedrupsamphel9092 3 роки тому

    great tutorial

  • @the_wizard_exe
    @the_wizard_exe Рік тому

    great video , sr thank you very much

  • @davico23
    @davico23 3 роки тому

    very good explanation

  • @anjanasanthosh1040
    @anjanasanthosh1040 4 роки тому

    Hope u share more videos like this

  • @mohammedshaik7113
    @mohammedshaik7113 4 роки тому

    Excellent !

  • @juangutierrezgomez8596
    @juangutierrezgomez8596 2 роки тому

    I love it jejejeje great !

  • @techreviewz10
    @techreviewz10 4 роки тому +3

    How does XOR work on the round key step? can anyone explain?

  • @jxw7196
    @jxw7196 4 роки тому

    Amazing!

  • @in2uniform
    @in2uniform Рік тому +1

    Uh, well, with all due respect… NSA (part of DoD, obv) did not call for replacements to the DES or run the worldwide competition to select the algorithm to be selected to be designated as the Advanced Encryption Algorithm and incorporated into the Advanced Encryption Standard (FIPS 197). That completion was run by NIST, part of the Commerce Department. Now, NSA did decide that, at higher key lengths, when the algorithm is properly implemented, it would be sufficient to classified data up to TS. IMHO….

  • @datdang5364
    @datdang5364 3 роки тому

    thanks you so much, sir!

  • @akhilpandey1539
    @akhilpandey1539 Рік тому

    Hello
    thanks for the wonderful video.
    anything about padding?

  • @salmanmansha4818
    @salmanmansha4818 3 роки тому

    it helped alot

  • @578n.jhansisri5
    @578n.jhansisri5 Рік тому

    Awesome 😎

  • @rahulnpr18
    @rahulnpr18 4 роки тому

    perfect!

  • @viddeshk8020
    @viddeshk8020 3 роки тому

    Fantastic

  • @mohamedkhoulali7267
    @mohamedkhoulali7267 4 роки тому +5

    Hi , thanks for the awseome video . i have on question at 9:41 . why you started rotating the bytes from the second row not from the first one .. is this how the AES works or i'm missing something ?
    Edit: in case someone is interested for the answer i searched and found that the first rows keep unchanged 🙂 have a good day everybody.

  • @csanadselmeczy4066
    @csanadselmeczy4066 4 роки тому

    solid

  • @shalubansal7738
    @shalubansal7738 3 роки тому

    Easy explained

    • @shadsluiter
      @shadsluiter  3 роки тому

      Thank you. Are you a computer science student?

    • @shalubansal7738
      @shalubansal7738 3 роки тому

      @@shadsluiter Yes Sir. Not Particularly. I am In 8th grade.

  • @blockmo2219
    @blockmo2219 4 роки тому +3

    Could you explain the MixColumns part.
    Where the matrix come from? And how to calculate to get result?
    Thank you.

    • @nielsbuch6903
      @nielsbuch6903 4 роки тому +1

      It's a fixed matrix for every encryption. You can find the specific matrix on wikipedia: en.wikipedia.org/wiki/Advanced_Encryption_Standard#The_MixColumns_step

  • @supertran28
    @supertran28 4 роки тому +1

    I think there’s a mix up at 10:50, not XOR but just adding across

    • @Atameow
      @Atameow 4 роки тому

      yea true. unless there's something we didn't understand?

    • @GogsDavies
      @GogsDavies 4 роки тому +2

      Nah, it is an XOR. Just so happens that XOR and an add for 04 and a0 has the same result. If you XOR it, it looks like this:
      Round 1 after MixColumns (showing only Column 1)
      04 = 00000100
      66 = 01100110
      81 = 10000001
      e5 = 11100101
      RoundKey (showing only Column 1)
      a0 = 10100000
      fa = 11111010
      fe = 11111110
      17 = 00010111
      Now let's XOR them:
      04 = 00000100
      a0 = 10100000
      XOR= 10100100 = A4
      66 = 01100110
      fa = 11111010
      XOR= 10011100 = 9c
      81 = 10000001
      fe = 11111110
      XOR= 01111111 = 7f
      e5 = 11100101
      17 = 00010111
      XOR= 11110010 = f2
      Which reflects what you see in the first column at the start of Round 2 at 11:17

  • @wewlad296
    @wewlad296 4 роки тому

    Shad the Lad

  • @TheTrueKailash
    @TheTrueKailash 4 роки тому

    😯

  • @AmitSingh-ds8yl
    @AmitSingh-ds8yl 3 роки тому +1

    What about decryption

  • @joserodriguezalvira1151
    @joserodriguezalvira1151 3 роки тому

    It's a pity that you skip the MixColumns part in your otherwise excellent presentation. Also, looking up matrix multiplication is not the answer to understanding this step. Thanks for the video, and please consider explaining in detail the MixColums steps.

  • @mule_one9860
    @mule_one9860 2 роки тому

    can i get the code of AES?

  • @skapbap9785
    @skapbap9785 4 роки тому

    +1

  • @Ahmed_Elhaddad
    @Ahmed_Elhaddad 4 роки тому

    انا مستغني عن ال 10%

  • @delowerhossain3069
    @delowerhossain3069 2 роки тому

    This is called learning and A professor was supposed to be like that.
    Do you have any python courses, Professor?

  • @brahimbelmouhand9888
    @brahimbelmouhand9888 Рік тому +1

    I met Rijmen irl

  • @sikendongol4208
    @sikendongol4208 2 роки тому

    XOR is the key

  • @franatrturcech8484
    @franatrturcech8484 4 роки тому

    how about doing a decryption-explanation as well?

    • @alexgear959
      @alexgear959 4 роки тому

      Its that but in reverse

    • @franatrturcech8484
      @franatrturcech8484 4 роки тому

      @@alexgear959 I know but what is the order? Or how is the MixColumns step, or the key schedule done in reverse? things like that. I see everywhere tutorials and explanations just about the encryption part.

  • @DrMoonther
    @DrMoonther 3 роки тому

    no explanation of what happen on each step.

  • @christoffer4862
    @christoffer4862 3 роки тому +2

    Your description of MixColumns was awful. The rest was ok.
    Apparently a 128-bit key only provides 32-bit security since every single round key is derived from only 4-columns of which 1 is being reversibly obfuscated. It doesn't appear very secure. Figure out the obfuscated 32-bit column through brute-force, reverse the obfuscation and then finally recursively compute the other 3 key columns from the ciphertext, so that they propery match the result of the brute-forced column.

  • @mohamedsadik5437
    @mohamedsadik5437 3 роки тому

    every body talks about steps in encryption, what about decryption?

    • @kewl-asian
      @kewl-asian 2 роки тому

      the exact opposite process of encryption

  • @mehranehk8784
    @mehranehk8784 3 роки тому

    Great Explanation