How encryption works: AES-256 and S-box

View profile for Tim Mazumdar

FPGA engineering and CUDA programming

All encryption is applying masks and applying XOR operations Or using an S- box or Substitution box. Which is a 2D substitution table originally invented by Kaisa Nyberg. It cannot be banned otherwise almost nothing will work in Denmark. Bitwise circular shifts and Bitwise XORs are the only operations utilized in AES-256. This massive intervention by Danish govt.

View profile for Johan Rønby

Owner of STROMNING APS | Associate Professor in Mathematics at Roskilde University | Opinions are my own

The flawed reasoning behind #chatcontrol Maybe the Danish Minister of Justice, Peter Hummelgaard, is not aware that encryption is a relatively simple mathematical operation to implement in a code so banning it is like banning multiplication or prime numbers. With a backdoor introduced in end-to-end encryption, we will all be permanently vulnerable to massive, irreversible data breaches from hackers. The pedos will quickly find out how to implement and use an encryption algorithm in customised communication software if the official messaging channels (Messenger, WhatsApp etc.) get backdoors. I don't know what the solution is to child abuse, but I know that chatcontrol is not it.

  • No alternative text description for this image

To view or add a comment, sign in

Explore content categories