We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

AES Keys and Round Functions for Data Security

by Preetinder Singh, Ajay kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 11
Year of Publication: 2012
Authors: Preetinder Singh, Ajay kumar
10.5120/4864-7226

Preetinder Singh, Ajay kumar . AES Keys and Round Functions for Data Security. International Journal of Computer Applications. 39, 11 ( February 2012), 23-27. DOI=10.5120/4864-7226

@article{ 10.5120/4864-7226,
author = { Preetinder Singh, Ajay kumar },
title = { AES Keys and Round Functions for Data Security },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 11 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number11/4864-7226/ },
doi = { 10.5120/4864-7226 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:10.374286+05:30
%A Preetinder Singh
%A Ajay kumar
%T AES Keys and Round Functions for Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 11
%P 23-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is a basic requirement of an organization in the world to keep their information secure from their competitors. AES is the most recent algorithm which includes encryption with the help of reliable keys. It is used to protect the data including banking, financial, and government information. In this paper we analyzed various parameters of encryption techniques/algorithm. We encrypt the plain text by using different key size 128,192 and 256. On the basis of encryption time, other parameters can be determined e.g. processing time, round time, throughput etc. It is investigated that if clock frequency increases the throughput also varies.

References
  1. Irma B. Fernandez, M. S. E. E. Wunnava V. Subbarao, “Encryption based Security for ISDN Communication Technique & Application” IEEE transactions, pp.70-73, 1994.
  2. Hassina Guendouz & Samir Bouaziz, “Rapid prototype of a Fast Data Encryption Standard with Integrity Processing for Cryptographic Applications” IEEE, pp.VI-434-437, 1994.
  3. Bruce Schneier and Mudge, “Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)”, CQRE '99, Springer-Verlag, pp. 192-203, 1999.
  4. Federal Information Processing Standards, “Specification for advanced encryption standard” Publication 197, pp.1-47, 2001.
  5. Guido Bertoni; Aril Bircan; Luca Breveglieri; Pasqualina Fragneto; Marco Macchetti. Vittorio Zaccaria; “Performances of the Advanced Encryption Standard in embedded Systems with Cache Memory” IEEE transactions, 2003.
  6. Chih-Hsu Yen and Bing-Fei Wu, “Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard”, IEEE transactions on computers, vol.55, no. 6, pp.720-731, June 2006.
  7. Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M.A. Matin, “Effect of Security Increment to Symmetric Data Encryption through AES Methodology”, IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp 291-294, 2008.
  8. J. Daemen and V. Rijmen, AES Proposal, “Rijndael, AES Algorithm”, Dr. Brian Gladman, v3.1, 3rd March 2001.
  9. Jingmei Liu1, Baodian Wei2, Xiangguo Cheng1, Xinmei Wang1, “An AES S-box to Increase Complexity and Cryptographic Analysis”,IEEE, Proceeding of 19th International Conference on Advanced Information Networking and Applications, pp. 1-5,2005.
  10. Saleh Abdel-hafeez, Ahmed Sawalmeh, Sameer Bataineh “AES Design using pipelining structure Over GF(24)2”, IEEE International Conference on Signal Processing and Communications, Dubai, United Arab Emirates, pp.716-719,24-November, 2007.
  11. Zhao Xinjie, WANG Tao, Mi Dong, Zheng Yuanyuan, Lun Zhaoyang “Robust First Two Rounds Access Driven Cache Timing Attack on AES”,International Conference on Computer Science and Software Engineering, IEEE transactions, pp. 785-788, 2008.
  12. Ashwini M. Deshpande, Mangesh S. Deshpande, Devendra N. Kayatanavar, “FPGA Implementation of AES Encryption & Decryption”, International conference on control automation, communication and energy conservation, pp.1-6,4th-6th June 2009.
  13. Chi-Feng Lu; Yan-Shun Kan; Hsia-Ling Chiang; Chung-Huang Yang; “Fast Implementation of AES Cryptographic Algorithms in Smart Cards” research of NexSmart Technology, Inc. Taipei, Taiwan, R.O.C. IEEE pp: 573-579,2003.
  14. Aamer Nadeem, Dr. M. Younus Javed “A Performance Comparison of Data Encryption Algorithms”, International Conference on Information and Communication Technologies, pp. 84-89, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Processing time Round time Advanced Encryption Standard (AES)