ALGORITMA AES (Advance Encryption Standard)

Witerman jaya Zalukhu
8 Jul 202207:00

Summary

TLDRIn this video, the speaker explains the AES encryption and decryption process, starting with the concept of plain-text and how it is transformed using mathematical operations. Using their own name as an example, the speaker demonstrates how to set up the plain-text and generate key values based on specific formulas. The video also highlights the step-by-step procedure of using an encryption key, applying it to columns, and calculating encrypted and decrypted values through a series of logical functions. The speaker concludes with a reminder of the potential for error and expresses gratitude for the audience's understanding.

Takeaways

  • 😀 Understanding plain-text: The script begins by explaining what plain-text is and how it is represented using 4 columns with values.
  • 😀 AES Encryption Process: The encryption process involves applying mathematical formulas to the given plain-text and key values.
  • 😀 Key Requirement: The key must be 25 characters long and is derived from something personal (like the speaker’s university name).
  • 😀 Formula Application: The process uses the Chord b85 method for generating values for encryption, which involves applying specific formulas in Excel.
  • 😀 Excel Functions: The speaker demonstrates how to use Excel formulas to automatically calculate the necessary values for AES encryption and decryption.
  • 😀 Dropping Values: The calculated values are 'dropped' to the next row to proceed with further operations, ensuring the process is automated.
  • 😀 Column Interactions: Values interact across multiple columns in the Excel sheet, with each column playing a crucial role in encryption or decryption.
  • 😀 Key Generation Steps: The key is inputted in the form of a campus name (Budi Darma), and Excel is used to map and calculate corresponding encryption values.
  • 😀 AES Transformation: The values are transformed according to AES encryption standards to produce the final ciphertext.
  • 😀 Decryption and Roadworks: The process of decryption is explained, including the 'roadworks' step, where the original values are reversed to retrieve plain-text.
  • 😀 Acknowledgment of Possible Errors: The speaker concludes by acknowledging potential mistakes in their explanation, suggesting a learning approach.

Q & A

  • What is the primary focus of the video script?

    -The video script focuses on explaining the process of encryption and decryption using the AES algorithm.

  • What is 'plain-text' in the context of the AES encryption process?

    -In the AES encryption process, plain-text refers to the original, unencrypted data that is processed during encryption.

  • How are the values for encryption derived from the 'plain-text'?

    -The values for encryption are derived by applying a formula (referred to as 'chord') to the plain-text. In the example, the plain-text consists of four columns, with each column containing specific character values.

  • What is the purpose of the 'key' in the AES encryption process?

    -The 'key' serves as a secret value used in the encryption and decryption processes. It is necessary to ensure that only authorized parties can decrypt the data.

  • What does the term 'key' refer to in the provided transcript?

    -In the transcript, the 'key' refers to a value used in the AES algorithm, represented as a 25-character string based on a specific example, such as the name of the presenter’s university.

  • What is meant by 'channel' in the AES encryption explanation?

    -The 'channel' refers to a step in the AES process where the values from the key are combined with the corresponding plain-text values using a specified formula to generate encrypted data.

  • How is the AES encryption formula applied in the example?

    -The AES encryption formula is applied by combining values from the plain-text with values derived from the key. This involves mathematical operations such as 'X' (multiplication) and using the 'chord' formula to generate new values for encryption.

  • What does the 'drop' operation signify in the encryption process?

    -The 'drop' operation refers to the action of moving values from one position to another in the calculation process, often used to align the correct data for further operations.

  • What are the values of 'subtext' in the encryption process?

    -The 'subtext' values are intermediate data derived from the calculated results during the AES encryption process, used in further operations to finalize the encrypted result.

  • How is the final 'export' value calculated in AES encryption?

    -The final 'export' value is calculated using a specific formula that involves multiplying values from the plain-text and key, with operations like 'X' (multiplication) and the use of the formula to derive the encrypted data.

Outlines

plate

Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.

Upgrade durchführen

Mindmap

plate

Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.

Upgrade durchführen

Keywords

plate

Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.

Upgrade durchführen

Highlights

plate

Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.

Upgrade durchführen

Transcripts

plate

Dieser Bereich ist nur für Premium-Benutzer verfügbar. Bitte führen Sie ein Upgrade durch, um auf diesen Abschnitt zuzugreifen.

Upgrade durchführen
Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
AES EncryptionData SecurityCryptographyEncryption TutorialTech EducationKey GenerationFormula BasedPlaintext ProcessingDecryption ProcessAlgorithm StepsSecure Data
Benötigen Sie eine Zusammenfassung auf Englisch?