AES Encryption 5: Expand Keys and Encryption Flow

preview_player
Показать описание
In this vid we'll complete the encryption side of our implementation of AES. I've decided not to go though decryption, which is much the same type of logic in reverse, and with the opposite look-up tables.

If you actually have to include AES in your programs, use assembly or AES intrinsics. Our implementation is not secure, and it's very slow. Modern CPU's have an instruction set called the AES Instruction Set, which makes this whole task a lot easier, and a lot faster.

The babies you can hear at point are my sweet little nieces. I live with my bro and his gf. They've just had twins. They sound like they're being attacked by an elephant, but they are just hungry. They quieten down when their ma feeds them.

I hope this vid series was helpful for folks studying the algorithm. There's very few examples of exactly how to code this thing. Anywho, I really wanted to make a good go of it. Well here it is! Now we can look at something completely different!

Well probably not that different...?

Music Channel:

Patreon:

FaceBook:

Twitter:
Рекомендации по теме
Комментарии
Автор

'i hope you have a really brilliant day, see you all later' that was so blessed and this video series MADE my day brilliant!!! thank you so much for making this series and explaining it in such an in depth yet simple and understandable way. This is exactly what i needed.

DewottEva
Автор

Thank You very much sir, you saved me from my university cryptography VIVA session. you are a lifesaver!! Love those videos lot, very clearly explain everything. Best AES encryption videos set in whole youtube. I share those videos with my colleagues. Again, Thank you very much for those videos. Please do more.

johnthehacker
Автор

Great series man, this helped me a ton. For anyone that was asking for the source code or the decryption portion I uploaded in my github with all credits to the author. I'm not much of a C developer so if anyone wants to make or suggest changes please do. I'm only sharing this since I ran into some issues while following the series myself and it can be a pain to debug jumping from video to video.

kevinpielacki
Автор

Thank you so much, this helped me understand AES so much better, and I might even be able to complete this homework that I though was otherwise impossible. I am going to go ahead and program the decryption portion as well. Thanks again, I subbed and liked!

sethrigney
Автор

To me, the algo is secure enough and the code is fine to be applied in real app. Only certain thing needs to be modified and the option of proper block cipher operation, plus with the salt and so on.

My code works at the first time following your video. Thanks! ;D

joedarkmatter
Автор

Thank you so much for this series! Very well explained!

lindfish
Автор

Thank you for all your AES series bro ! you helped me a lot !

Kataklysme
Автор

I could hear the little one in the background. I remember when mine were babies :D

harrypehkonen
Автор

Could you do another video explaining how to change the algorithm for 192- and 256-bit keys?

intelligentshitpastinginc
Автор

Great serious -- thanks for showing a how brilliantly simple AES really is. Other sources overcomplicate and obscure things in the name of verbosity and academic language.

It does beg the question though: On decryption how does it know if/which trailing zeroes are padding or part of some actual data?

BlackJar
Автор

Yes, I loved it... it is not that hard after all! And I'm sure I'll find it quite useful sooner or later. Thanks! Btw, do you have any book of Assembly writen by you. I loved your Assembly series but it is always more handy to have a book, than videos.

joaquinglez
Автор

Hi Chris,
You mentioned in your video that you will touch on the issue of Intel's i686 instruction set for AES, as a faster. Can you please elaborate on that or on your Assembly video channel, perhaps?

imrank
Автор

do exactly the same with you but my encrypted text is not same as your's wtf? can i have your source code?

anhtrung
Автор

in the rotate step I would not physically move any bytes, i would simply use an index and a mask to wrap on the original array of 4 bytes.
p.s. the game Archon was a chess like game in the 80's by electronic arts.
the word archon basically means supreme dictator, someone with the power to enact and abolish laws. Solon for example was raised to the level of archon and abolished draco law and instituted a system of laws which our founding fathers here in the U.S. used as an example for our constitution :)

markmanning
Автор

How to Encryption if length plaintext more than 16 character in AES 128 bit?

aniszaitunah
Автор

Thank you for the great work.
Could you please explain for me, why did you increment bytesGenerated by one? although you said, you wanted to increment it by 4?

anticaritz
Автор

sir can you please tell me that, if key are available and we donot want to generate key expansion and we only have to implement these keys in the code than how can we add, implement theses keys, i have keys from initial key to round 10 keys all key are available can you please just tell me how can we add those key in my code.

LyricVista
Автор

what are the steps that will change at the time of decryption other than reversing the steps of subbytes and the other steps calling methods? particularly in the code section because i tried to implement the same but not getting the plaintext back?

JATINKUMAR-iilg
Автор

You're back, yei!!! also nice AES serie, thanks.

ricardoalquicira
Автор

Great tutorial!!! Please can you do a tutorial on how to perform first-order masking on an AES implementation in C?

jdbenhur