How does AES encryption work? Advanced Encryption Standard

  Рет қаралды 109,286

Programming w/ Professor Sluiter

Programming w/ Professor Sluiter

Күн бұрын

See studycoding.org for all tutorials by Shad Sluiter.
Explanation and animation showing how the AES block cipher algorithm works

Пікірлер: 103
@abuk95
@abuk95 4 жыл бұрын
- You should really mention more that the matrix multiplication (in mix columns) is not in normal arithmetic, but in Galois's finite field (2^8) arithmetic. Not just say "go look it up", because result with normal matrix multiplication are different. - And during key schedule you use Rcon(4) in first iteration, which is wrong. You should use number of iteration for the lookup, so Rcon(1). Visualize the XOR with only first byte, in order to be less confusive. Another iteration for next subkey is Rcon(2) in lookup table and so on. -- yeah, having rcon lookup table would also be better, rather than created vectors from the table. - Other things you are talking about are really clear and i am glad you dedicated time for making this helpful video, thanks!
@maoryatskan6346
@maoryatskan6346 3 жыл бұрын
Still best explanation found
@chetanjoshi3922
@chetanjoshi3922 2 жыл бұрын
Gotta say I'm impressed by your counter.. can you tell me some good resources to learn about AES in more detail? I'd be glad!
@marko90000
@marko90000 3 ай бұрын
also we can and will increase the AES size as needed into 1024 16*16 2bytes *4 or we can use 3 for 4096 or even 4 bytes in encription and use 256*256 which would be AES 65356 :) for the data layer. :)
@alexandrospanag
@alexandrospanag Жыл бұрын
Dear professor, thank you from Greece! Your guides are awesome and very in-depth and explanatory! Have a good day and thank you for the amazing content!
@george53691
@george53691 6 ай бұрын
Same here lmao
@jericovillanueva3459
@jericovillanueva3459 4 жыл бұрын
Thanks! Really helped alot. Learned more in this 12 mins than my whole semester
@leonard128
@leonard128 4 жыл бұрын
hahahah, i think in the same way, you save my life sir.
@netbotcl586
@netbotcl586 4 жыл бұрын
I guess you came here the night before the exam? xD
@Nickola_United
@Nickola_United Жыл бұрын
students are same everywehere)))
@Isabellaa-ms5dk
@Isabellaa-ms5dk Жыл бұрын
the only video that has really helped me understand AES!! thank you so much
@enaxorgil5352
@enaxorgil5352 Жыл бұрын
Easiest explanation I've come across by far. Thanks Sir 💕
@haviettien1914
@haviettien1914 4 жыл бұрын
Easy to understand and nice animations. Thank you, sir
@jaren2kilo
@jaren2kilo 3 жыл бұрын
Thank you Shared! This short video really helped to understand the concept in simple way.
@shadsluiter
@shadsluiter 3 жыл бұрын
Great to hear!
@francisonojeharho6928
@francisonojeharho6928 2 жыл бұрын
This is the best explanation to AES encryption standard out here
@teleport3306
@teleport3306 7 ай бұрын
Tried to litterly find explanation how it works and only you explained the best way possible
@michellemassaad1013
@michellemassaad1013 3 жыл бұрын
hey professor i am 13 and i am trying to learn how to encrypt using the AES algorithm ,this helped a lot to understand the process thank you
@goyslop-consumer
@goyslop-consumer 2 жыл бұрын
hey, did figure out how to encrypt pls message me back
@tridibroyarjo418
@tridibroyarjo418 4 жыл бұрын
Sir, I did love your video and I am just too young to understand your valuable speech as a 12 Years old. But still, I keep a large interest in Computer Science and Encryption Algorithms. Your lectures are really very much helpful. Thank you, sir!
@shadsluiter
@shadsluiter Жыл бұрын
Thank you. I hope to see you in class soon.
@whistlingshadow370
@whistlingshadow370 Жыл бұрын
What's 14 like?
@adamtafesse8971
@adamtafesse8971 4 жыл бұрын
Great overview! Thanks!
@italian_taco1247
@italian_taco1247 2 жыл бұрын
I am 12 trying to understand AES, this helped! Thank you!
@rmabsone8108
@rmabsone8108 4 жыл бұрын
thank you sir, animation is so helpful
@himanshujain718
@himanshujain718 4 жыл бұрын
Best ever explanation of AES! You deserve infinite likes Thank you so much ❤️ Sir!
@kempisabel9945
@kempisabel9945 2 жыл бұрын
loved your explanation! thanks so much
@ognjenantonic8675
@ognjenantonic8675 4 жыл бұрын
Great Explanation
@lalehalimadadi2129
@lalehalimadadi2129 4 жыл бұрын
Thanks a lot, your video is amazing! I hope you share us more video.
@naumannasir6948
@naumannasir6948 4 жыл бұрын
very helpful ,easily explained
@jerlynjohnson7928
@jerlynjohnson7928 2 жыл бұрын
Excellent presentation!
@muhammadhassan3058
@muhammadhassan3058 4 жыл бұрын
The video I wants I found here thanks sir what a great way to explain 😊☺️
@sravanakumar9326
@sravanakumar9326 Жыл бұрын
Wow, great explanation 🎉
@nursyazwani_4108
@nursyazwani_4108 4 жыл бұрын
much more understandable and clear explanation rather than my classmate presentation
@lmaoty
@lmaoty 3 жыл бұрын
Excellent! Finally understood this!
@shadsluiter
@shadsluiter 3 жыл бұрын
Glad you liked it!
@mikewashington4188
@mikewashington4188 Жыл бұрын
Great video. I used the AES algorithm to encrypt and decrypt the contents of a hidden file that stored the password and username of sFTP server used to retrieve data.
@ismailuwair187
@ismailuwair187 3 жыл бұрын
Sir, u saved my life! thank u, sir! I hope i was a student of urs that would make me invincible
@adedejiemmanuel1
@adedejiemmanuel1 4 жыл бұрын
Thanks for this lesson. I have a question, what cipher mode is applicable in the AES encryption? By cipher mode, I meant something like ECB, CBC, CTM, GCM, etc.
@james10master
@james10master 4 жыл бұрын
At the end when the Round Keys are being determined from the cipher key, is this process the same regardless of the key size? I ask this because each 'key' is only 16-bytes (128-bits) so does that mean the process is slightly different for 24-byte (192-bits) and 32-byte (256-bit) keys?
@techreviewz10
@techreviewz10 4 жыл бұрын
How does XOR work on the round key step? can anyone explain?
@aurelio3532
@aurelio3532 3 жыл бұрын
Beautiful! very easy to understand even if I know nothing about cryptpgraphy. I want to aplly this so baaad
@ENZOuwu
@ENZOuwu Жыл бұрын
Thanks you, sir. This helped me a lot
@anjanasanthosh1040
@anjanasanthosh1040 4 жыл бұрын
Thanku sir,it was of great help
@isaacweber7398
@isaacweber7398 Жыл бұрын
NIiiiiiiiiiiiiiiiceeeeeeeeeeeeeeee. Do not stop doing that, professor
@loganbala1450
@loganbala1450 2 жыл бұрын
Thanks. This video helped me alot.
@ngedrupsamphel9092
@ngedrupsamphel9092 4 жыл бұрын
great tutorial
@paulinacastillo1166
@paulinacastillo1166 Жыл бұрын
a good video, i liked so much. Thank for doing this :)
@SumitKumar-sg9pt
@SumitKumar-sg9pt 3 жыл бұрын
this is exactly what I was looking for. thank you so much professor
@shadsluiter
@shadsluiter 3 жыл бұрын
You are welcome!
@anjanasanthosh1040
@anjanasanthosh1040 4 жыл бұрын
Hope u share more videos like this
@salissobrachialis3719
@salissobrachialis3719 Жыл бұрын
Very helpful. Thank you
@epaguyeify
@epaguyeify 3 жыл бұрын
Well explained. Thank you
@shadsluiter
@shadsluiter 3 жыл бұрын
You are welcome!
@mohammedshaik7113
@mohammedshaik7113 4 жыл бұрын
Excellent !
@qin6409
@qin6409 Жыл бұрын
Best video after I struggled on whole KZfaq video
@in2uniform
@in2uniform Жыл бұрын
Uh, well, with all due respect… NSA (part of DoD, obv) did not call for replacements to the DES or run the worldwide competition to select the algorithm to be selected to be designated as the Advanced Encryption Algorithm and incorporated into the Advanced Encryption Standard (FIPS 197). That completion was run by NIST, part of the Commerce Department. Now, NSA did decide that, at higher key lengths, when the algorithm is properly implemented, it would be sufficient to classified data up to TS. IMHO….
@davico23
@davico23 3 жыл бұрын
very good explanation
@shadsluiter
@shadsluiter 3 жыл бұрын
Glad you think so!
@jxw7196
@jxw7196 4 жыл бұрын
Amazing!
@the_wizard_exe
@the_wizard_exe 2 жыл бұрын
great video , sr thank you very much
@datdang5364
@datdang5364 3 жыл бұрын
thanks you so much, sir!
@akhilpandey1539
@akhilpandey1539 Жыл бұрын
Hello thanks for the wonderful video. anything about padding?
@mohamedkhoulali7267
@mohamedkhoulali7267 4 жыл бұрын
Hi , thanks for the awseome video . i have on question at 9:41 . why you started rotating the bytes from the second row not from the first one .. is this how the AES works or i'm missing something ? Edit: in case someone is interested for the answer i searched and found that the first rows keep unchanged 🙂 have a good day everybody.
@fingolfin9727
@fingolfin9727 4 жыл бұрын
thanks!
@mohamedkhoulali7267
@mohamedkhoulali7267 4 жыл бұрын
@@fingolfin9727 welcome 🤗
@juangutierrezgomez8596
@juangutierrezgomez8596 2 жыл бұрын
I love it jejejeje great !
@supertran28
@supertran28 4 жыл бұрын
I think there’s a mix up at 10:50, not XOR but just adding across
@Atameow
@Atameow 4 жыл бұрын
yea true. unless there's something we didn't understand?
@GogsDavies
@GogsDavies 4 жыл бұрын
Nah, it is an XOR. Just so happens that XOR and an add for 04 and a0 has the same result. If you XOR it, it looks like this: Round 1 after MixColumns (showing only Column 1) 04 = 00000100 66 = 01100110 81 = 10000001 e5 = 11100101 RoundKey (showing only Column 1) a0 = 10100000 fa = 11111010 fe = 11111110 17 = 00010111 Now let's XOR them: 04 = 00000100 a0 = 10100000 XOR= 10100100 = A4 66 = 01100110 fa = 11111010 XOR= 10011100 = 9c 81 = 10000001 fe = 11111110 XOR= 01111111 = 7f e5 = 11100101 17 = 00010111 XOR= 11110010 = f2 Which reflects what you see in the first column at the start of Round 2 at 11:17
@salmanmansha4818
@salmanmansha4818 3 жыл бұрын
it helped alot
@rahulnpr18
@rahulnpr18 4 жыл бұрын
perfect!
@578n.jhansisri5
@578n.jhansisri5 Жыл бұрын
Awesome 😎
@blockmo2219
@blockmo2219 4 жыл бұрын
Could you explain the MixColumns part. Where the matrix come from? And how to calculate to get result? Thank you.
@nielsbuch6903
@nielsbuch6903 4 жыл бұрын
It's a fixed matrix for every encryption. You can find the specific matrix on wikipedia: en.wikipedia.org/wiki/Advanced_Encryption_Standard#The_MixColumns_step
@viddeshk8020
@viddeshk8020 3 жыл бұрын
Fantastic
@shadsluiter
@shadsluiter 3 жыл бұрын
Thank you! Cheers!
@AmitSingh-ds8yl
@AmitSingh-ds8yl 3 жыл бұрын
What about decryption
@Ahmed_Elhaddad
@Ahmed_Elhaddad 4 жыл бұрын
انا مستغني عن ال 10%
@mule_one9860
@mule_one9860 2 жыл бұрын
can i get the code of AES?
@csanadselmeczy4066
@csanadselmeczy4066 4 жыл бұрын
solid
@DrMoonther
@DrMoonther 3 жыл бұрын
no explanation of what happen on each step.
@shalubansal7738
@shalubansal7738 3 жыл бұрын
Easy explained
@shadsluiter
@shadsluiter 3 жыл бұрын
Thank you. Are you a computer science student?
@shalubansal7738
@shalubansal7738 3 жыл бұрын
@@shadsluiter Yes Sir. Not Particularly. I am In 8th grade.
@joserodriguezalvira1151
@joserodriguezalvira1151 3 жыл бұрын
It's a pity that you skip the MixColumns part in your otherwise excellent presentation. Also, looking up matrix multiplication is not the answer to understanding this step. Thanks for the video, and please consider explaining in detail the MixColums steps.
@wewlad296
@wewlad296 4 жыл бұрын
Shad the Lad
@franatrturcech8484
@franatrturcech8484 4 жыл бұрын
how about doing a decryption-explanation as well?
@alexgear959
@alexgear959 4 жыл бұрын
Its that but in reverse
@franatrturcech8484
@franatrturcech8484 4 жыл бұрын
@@alexgear959 I know but what is the order? Or how is the MixColumns step, or the key schedule done in reverse? things like that. I see everywhere tutorials and explanations just about the encryption part.
@delowerhossain3069
@delowerhossain3069 2 жыл бұрын
This is called learning and A professor was supposed to be like that. Do you have any python courses, Professor?
@mohamedsadik5437
@mohamedsadik5437 3 жыл бұрын
every body talks about steps in encryption, what about decryption?
@kewl-asian
@kewl-asian 2 жыл бұрын
the exact opposite process of encryption
@christoffer4862
@christoffer4862 3 жыл бұрын
Your description of MixColumns was awful. The rest was ok. Apparently a 128-bit key only provides 32-bit security since every single round key is derived from only 4-columns of which 1 is being reversibly obfuscated. It doesn't appear very secure. Figure out the obfuscated 32-bit column through brute-force, reverse the obfuscation and then finally recursively compute the other 3 key columns from the ciphertext, so that they propery match the result of the brute-forced column.
@brahimbelmouhand9888
@brahimbelmouhand9888 Жыл бұрын
I met Rijmen irl
@IDrankTooMuchMilk
@IDrankTooMuchMilk Жыл бұрын
Hallo Radboud medestudent
@sikendongol4208
@sikendongol4208 2 жыл бұрын
XOR is the key
@TheTrueKailash
@TheTrueKailash 4 жыл бұрын
😯
@skapbap9785
@skapbap9785 4 жыл бұрын
+1
@mehranehk8784
@mehranehk8784 3 жыл бұрын
Great Explanation
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 165 М.
AES: How to Design Secure Encryption
15:37
Spanning Tree
Рет қаралды 154 М.
Clowns abuse children#Short #Officer Rabbit #angel
00:51
兔子警官
Рет қаралды 78 МЛН
БАБУШКИН КОМПОТ В СОЛО
00:23
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 16 МЛН
Sigma Kid Hair #funny #sigma #comedy
00:33
CRAZY GREAPA
Рет қаралды 35 МЛН
아이스크림으로 체감되는 요즘 물가
00:16
진영민yeongmin
Рет қаралды 63 МЛН
AES Explained (Advanced Encryption Standard) - Computerphile
14:14
Computerphile
Рет қаралды 1,2 МЛН
One Encryption Standard to Rule Them All! - Computerphile
9:11
Computerphile
Рет қаралды 427 М.
RSA algorithm step by step example
20:41
Programming w/ Professor Sluiter
Рет қаралды 105 М.
AES - The Advanced Encryption Standard Explained
38:48
Cryptography for Everybody
Рет қаралды 10 М.
128 Bit or 256 Bit Encryption? - Computerphile
8:45
Computerphile
Рет қаралды 331 М.
What is Public and Private Key Encryption?
6:55
Programming w/ Professor Sluiter
Рет қаралды 87 М.
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Рет қаралды 9 МЛН
Clowns abuse children#Short #Officer Rabbit #angel
00:51
兔子警官
Рет қаралды 78 МЛН