Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithm’s design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
The document describes a project report on the implementation of the AES encryption algorithm. It was submitted by two students, Sunil Kumar R and Shreekant, in partial fulfillment of the requirements for a Bachelor of Engineering degree in computer science. The project was carried out under the guidance of three faculty members at R.V. College of Engineering in Bangalore. It includes a certificate signed by the faculty confirming the students' satisfactory completion of the project.
This is a Presentation On use of AES Algorithm To Encrypt Or Decrypt a Text File. This Algorithm is the latest and better than DES. It is a Networking Presentation. Thank You.
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
AES algorithm has been stated as secure against any attack but increasing fast computing is making hackers to develop the cracks for AES as well. Therefore to further increase the security of AES, i tried to replace Standard static and fixed Substitution Box with a dynamic S Box. Dynamicity is brought with the help of Input key. Static S box is altered using the input key and the new generated s box is used for encryption. Reverse steps goes for Decryption. Presently, working on to test this design against Side Channel attacks and would publish the results here.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithm’s design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
The document describes a project report on the implementation of the AES encryption algorithm. It was submitted by two students, Sunil Kumar R and Shreekant, in partial fulfillment of the requirements for a Bachelor of Engineering degree in computer science. The project was carried out under the guidance of three faculty members at R.V. College of Engineering in Bangalore. It includes a certificate signed by the faculty confirming the students' satisfactory completion of the project.
This is a Presentation On use of AES Algorithm To Encrypt Or Decrypt a Text File. This Algorithm is the latest and better than DES. It is a Networking Presentation. Thank You.
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
AES algorithm has been stated as secure against any attack but increasing fast computing is making hackers to develop the cracks for AES as well. Therefore to further increase the security of AES, i tried to replace Standard static and fixed Substitution Box with a dynamic S Box. Dynamicity is brought with the help of Input key. Static S box is altered using the input key and the new generated s box is used for encryption. Reverse steps goes for Decryption. Presently, working on to test this design against Side Channel attacks and would publish the results here.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Advanced Encryption Standard (AES) is a symmetric block cipher algorithm used for securing information that was published by NIST as a replacement for DES. AES takes an input block and secret key to produce an encrypted output block of the same size. This work integrates both AES encryption and decryption using a 128-bit key length in VHDL or VERILOG, providing the input block and key for encryption and cipher block and same key for decryption to verify the proper output block is obtained through simulation results.
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses
on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for
encryption as well as decryption algorithms and also give the sufficient description of key generation, key
expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era,
Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and
they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic
design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multi
encryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the
encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. It
also shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated
analysis of encryption and decryption time for different file formats using a windows application. It describe
feature of application and its process and efficiency as well as calculation of time and throughput.
Hybrid Encryption for Database SecurityIRJET Journal
1. The document discusses hybrid encryption technique for securing databases. Hybrid encryption uses both symmetric and asymmetric encryption.
2. At the sender site, the data is encrypted with a symmetric key (secret key) and then the secret key is encrypted with the receiver's public key using asymmetric encryption.
3. The encrypted data and encrypted secret key are sent to the receiver. The receiver decrypts the secret key with their private key and then decrypts the data with the secret key to access the original data. This provides two layers of security for the database.
This document discusses the implementation of a hybrid cryptography algorithm combining DES and IDEA. It begins by providing background on encryption, key escrow schemes, and the need for stronger algorithms. It then separately describes DES and IDEA, including their structure, performance analysis, and types of cryptanalysis attacks they are susceptible to. The document proposes a new hybrid algorithm combining DES and IDEA to improve security and integrity.
This document proposes a hybrid encryption-decryption algorithm combining AES and DES. It implements the algorithm in VHDL using a Modelsim platform. The hybrid algorithm integrates AES into each iteration of DES's Feistel network, using AES operations like substitution and key addition. This increases computational complexity compared to the individual standards. The VHDL implementation includes modules for AES encryption/decryption and the hybrid algorithm. Simulations validate the code works correctly. Future work could increase iterations to suit different security levels or implement a 128-bit AES variant. The hybrid approach strengthens AES security against attacks.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 2 1173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Analysis and comparison of symmetric keyIJNSA Journal
The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
New approach in symmetric block cipher security using a new cubical techniqueijcsit
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is
called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really
appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
This document describes a proposed technique for information security that uses a hybrid of DES and RSA encryption along with LSB steganography. The message is first encrypted with DES, then the DES keys are encrypted with RSA. The hybrid encrypted result is then embedded into an image file using LSB steganography. This combines the strengths of cryptography and steganography for improved security of transmitted data. The encryption time is faster than previous techniques and brute force attacks on this technique would be very difficult.
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
1) The document discusses the implementation of the Advanced Encryption Standard (AES) algorithm for encryption on an Arduino Mega2560 board. AES was chosen to securely transmit sensor data collected by microcontrollers.
2) AES provides stronger encryption than older standards like DES and 3DES through its larger key sizes of 128, 192, and 256 bits and more rounds of encryption. The document implements a simple version of AES on the Arduino board.
3) Testing showed the AES code used 8824 bytes of program storage on the Arduino and encryption took 3016 microseconds while decryption took 3792 microseconds, demonstrating AES can provide security for resource-constrained devices.
This document discusses and compares several cryptography algorithms. It begins by introducing symmetric key algorithms like DES, AES, and Blowfish that use the same key for encryption and decryption. It then covers asymmetric key algorithms like RSA that use a public key for encryption and private key for decryption. The document evaluates the algorithms by describing their basic workings, including key sizes, block sizes, number of rounds, and encryption/decryption processes. It aims to study these cryptography algorithms and analyze their performance characteristics.
This document describes a student project to implement the Advanced Encryption Standard (AES) in Verilog. AES is a symmetric block cipher that uses 128-bit blocks and 128/192/256-bit keys. The project aims to develop optimized and synthesizable Verilog code to encrypt and decrypt 128-bit data using AES. The document provides background on cryptography, AES, and its algorithm which includes key expansion, substitution, transposition, and mixing operations. It also outlines the implementation, encryption, decryption, and performance estimation aspects of the project.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
Disruption tolerant network technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext policy attribute-based encryption is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued from different authorities. We propose a secure data retrieval scheme using 3DES with MD5 for decentralized DTNs where multiple key authorities manage their attributes independently. We demonstrate how to apply the proposed mechanism to securely and efficiently manage the confidential data distributed in the Disruption-tolerant military network.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
Advanced Encryption Standard (AES) is a symmetric block cipher algorithm used for securing information that was published by NIST as a replacement for DES. AES takes an input block and secret key to produce an encrypted output block of the same size. This work integrates both AES encryption and decryption using a 128-bit key length in VHDL or VERILOG, providing the input block and key for encryption and cipher block and same key for decryption to verify the proper output block is obtained through simulation results.
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses
on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for
encryption as well as decryption algorithms and also give the sufficient description of key generation, key
expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era,
Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and
they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic
design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multi
encryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the
encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. It
also shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated
analysis of encryption and decryption time for different file formats using a windows application. It describe
feature of application and its process and efficiency as well as calculation of time and throughput.
Hybrid Encryption for Database SecurityIRJET Journal
1. The document discusses hybrid encryption technique for securing databases. Hybrid encryption uses both symmetric and asymmetric encryption.
2. At the sender site, the data is encrypted with a symmetric key (secret key) and then the secret key is encrypted with the receiver's public key using asymmetric encryption.
3. The encrypted data and encrypted secret key are sent to the receiver. The receiver decrypts the secret key with their private key and then decrypts the data with the secret key to access the original data. This provides two layers of security for the database.
This document discusses the implementation of a hybrid cryptography algorithm combining DES and IDEA. It begins by providing background on encryption, key escrow schemes, and the need for stronger algorithms. It then separately describes DES and IDEA, including their structure, performance analysis, and types of cryptanalysis attacks they are susceptible to. The document proposes a new hybrid algorithm combining DES and IDEA to improve security and integrity.
This document proposes a hybrid encryption-decryption algorithm combining AES and DES. It implements the algorithm in VHDL using a Modelsim platform. The hybrid algorithm integrates AES into each iteration of DES's Feistel network, using AES operations like substitution and key addition. This increases computational complexity compared to the individual standards. The VHDL implementation includes modules for AES encryption/decryption and the hybrid algorithm. Simulations validate the code works correctly. Future work could increase iterations to suit different security levels or implement a 128-bit AES variant. The hybrid approach strengthens AES security against attacks.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 2 1173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Analysis and comparison of symmetric keyIJNSA Journal
The document analyzes and compares the performance of symmetric key cryptographic algorithms based on various file features such as data type, size, density, and key size. It tests the encryption time of algorithms like AES, DES, Triple DES, RC2, Blowfish, Skipjack and RC4 on different data types, file sizes ranging from 10MB to 482MB, and files with different data densities. The results show that encryption time is not affected by data type but increases proportionally with file size and number of bytes. Encryption time is also similar for sparse and dense files of comparable sizes. RC4 has the fastest encryption time while AES time is low compared to other block ciphers.
New approach in symmetric block cipher security using a new cubical techniqueijcsit
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is
called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really
appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
This document describes a proposed technique for information security that uses a hybrid of DES and RSA encryption along with LSB steganography. The message is first encrypted with DES, then the DES keys are encrypted with RSA. The hybrid encrypted result is then embedded into an image file using LSB steganography. This combines the strengths of cryptography and steganography for improved security of transmitted data. The encryption time is faster than previous techniques and brute force attacks on this technique would be very difficult.
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
1) The document discusses the implementation of the Advanced Encryption Standard (AES) algorithm for encryption on an Arduino Mega2560 board. AES was chosen to securely transmit sensor data collected by microcontrollers.
2) AES provides stronger encryption than older standards like DES and 3DES through its larger key sizes of 128, 192, and 256 bits and more rounds of encryption. The document implements a simple version of AES on the Arduino board.
3) Testing showed the AES code used 8824 bytes of program storage on the Arduino and encryption took 3016 microseconds while decryption took 3792 microseconds, demonstrating AES can provide security for resource-constrained devices.
This document discusses and compares several cryptography algorithms. It begins by introducing symmetric key algorithms like DES, AES, and Blowfish that use the same key for encryption and decryption. It then covers asymmetric key algorithms like RSA that use a public key for encryption and private key for decryption. The document evaluates the algorithms by describing their basic workings, including key sizes, block sizes, number of rounds, and encryption/decryption processes. It aims to study these cryptography algorithms and analyze their performance characteristics.
This document describes a student project to implement the Advanced Encryption Standard (AES) in Verilog. AES is a symmetric block cipher that uses 128-bit blocks and 128/192/256-bit keys. The project aims to develop optimized and synthesizable Verilog code to encrypt and decrypt 128-bit data using AES. The document provides background on cryptography, AES, and its algorithm which includes key expansion, substitution, transposition, and mixing operations. It also outlines the implementation, encryption, decryption, and performance estimation aspects of the project.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
This document discusses using Triple DES (Data Encryption Standard) to encrypt images for security. It begins with an introduction to the need for encrypting digital images. It then provides background on DES and how Triple DES works by applying the DES cipher algorithm three times with independent keys. The document outlines the Triple DES encryption and decryption process and references used in the project code, which is written in Python.
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
1. The document discusses a hardware-software co-design of the AES encryption algorithm implemented on the NIOS II soft-core processor on an FPGA.
2. It proposes using a hardware-software co-design methodology to implement AES for encryption and decryption of 128-bit blocks using 128, 192, or 256-bit keys.
3. The implementation will utilize the Quartus II software tools and NIOS II integrated development environment to program the FPGA with the AES algorithm designed around the NIOS II soft-core processor.
Abstract: Security is playing an important and crucial role in the field of network communication system and internet. Here, lot of encryption algorithms were developed and so far .Though many algorithms are used now a days, there is a lack of security in message transformation. Security can be improved by making some modifications in traditional algorithms. Algorithms are DES, RSA, ECC algorithm etc. Among this it is preferred to do some modifications in RSA Algorithm. So, the changes applied in these algorithms, security will be better than the previous.
Keywords: Encryption, Decryption, DES, RSA, ECC, Plain Text, Cipher Text.
Title: Improving Network Security by Modifying RSA Algorithm
Author: KANNIKA PARAMESHWARI B, KRITHIKA M, KARTHI P
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Abstract Security in transmission of digital images has its importance in today’s image communications, due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been investigated and developed to protect data and personal privacy. Encryption is probably the most obvious one. In order to protect valuable information from undesirable readers, image encryption is essential. This paper presents an application of AES (Advanced Encryption Standard) operations in image encryption and decryption. The encrypted cipher images always display the uniformly distributed RGB pixels. Index Terms: Security, Image Processing, AES, Encryption and Decryption
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
This document reviews and summarizes various cryptography techniques. It discusses how cryptography provides security for data transmission by converting plain text into cipher text using encryption and back using decryption. The two main types of cryptography discussed are symmetric key cryptography which uses a single secret key for both encryption and decryption, and asymmetric key cryptography which uses public/private key pairs. Specific techniques covered include DES, 3DES, AES, and RSA.
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
This document summarizes a research paper that proposes a hybrid encryption system using both the AES and RSA algorithms. The system first encrypts a data file with AES, using a randomly generated key. It then encrypts the AES key with RSA using the receiver's public key. These two encrypted files are combined and sent to the receiver. The receiver separates the files and decrypts the AES key with their private RSA key. Then the original data file is decrypted with AES using the retrieved key. The paper analyzes the encryption methods, provides an overview of how the system works, and evaluates its performance compared to using just AES or RSA alone. It finds that the combined system has faster encryption times than just using RSA.
International Data Encryption Algorithm (IDEA) is one of the encryption algorithms that is widely used for security purpose. IDEA block cipher operates with 64-bit plain text block and 64-bit cipher text block, and a 128-bit key controls it. The fundamental design of the algorithm is using three different algebraic operations: bitwise Exclusive OR, multiplication modulo, and addition modulo. Having the largest number of weak keys is one of the drawbacks of IDEA. In addition, a new attack during round six of IDEA’s operations has been detected. In this paper, we propose and describe the new design and preliminary implementation of a more secure encryption algorithm based on IDEA, and it is named DS-IDEA. Increasing the size of the key from 128 bits to 512 bits will increase the complexity of the algorithm. The algorithm’s complexity is increased by increasing the amount of diffusion (multiplicative additive block) in a single round. It is implemented to provide better security to the user’s password within the Online Password Management System (OPMS) in order to protect the user’s data within the database from hackers and other forms of unauthorized access.
Project consists of individual modules of encryption and decryption units. Standard T-DES algorithm is implemented. Presently working on to integrate DES with AES to develop stronger crypto algorithm and test the same against Side Channel Attacks and compare different algorithms.
This document provides an overview of cryptographic algorithms and their uses. It begins with symmetric encryption, which uses a single secret key to encrypt and decrypt data, providing confidentiality. The most common symmetric algorithms are the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), which are block ciphers that encrypt data in fixed-size blocks. It also discusses stream ciphers, which encrypt data one element at a time. The document then covers secure hash functions, public-key encryption, digital signatures, and key management before concluding with an example application of encrypting stored data.
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
This document describes the implementation of the Advanced Encryption Standard (AES) algorithm as a custom hardware accelerator connected to a Nios II processor system. AES was written in VHDL and connected to the Nios II system through GPIO pins. This allows AES operations to be controlled through C code in the Nios II IDE while running the AES algorithm in hardware, improving encryption speeds significantly compared to an all-software implementation. Synthesis results showed the hardware AES implementation reduced the number of clock cycles needed for encryption by over 99% compared to running AES solely in software on the Nios II processor.
Reply needed 1Public Key Cryptography is a form of asymmetric en.docxaudeleypearl
Reply needed 1
Public Key Cryptography is a form of asymmetric encryption that makes use of two separate sets of keys- a public key and a private key (Cryptography.io, n.d.). Public key cryptographic algorithms with RSA will be discussed considering they use encryption and decryption to function. RSA has three major parts key generation, encryption, and decryption. In this algorithm each receiver has their own unique decryption key. This receiver will then publish their public key. A public key is utilized to avoid spoofing. With public key with RSA a trusted third party is used that certifies the public key only belongs to a specific person. It’s not possible to figure out the private key from the public key. RSA itself is used to secure sensitive data when sent over an insecure network. The signatures use a specific hash function and encryption power is tied to key size (Cryptography.io, n.d.).
Cryptography.io. (n.d.) Asymmetric Algorithms. Retrieved from https://cryptography.io/en/latest/hazmat/primitives/asymmetric/
Reply needed 2
The Advanced Encryption Standard (AES) – also known as the Rijndael (pronounced “rain-doll”) cipher – is a form of secret key cryptography that was developed as a collaborative project between the National Institute of Standards and Technology (NIST) and a team of public and private sector cryptography experts. The goal of the project was to develop encryption powerful enough to protect sensitive U.S. government data and communications for the foreseeable future (NIST, 2019). “The Rijndael algorithm…is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits” (NIST, 2001, p5).
Both the input and output of AES consists of 128-bit sequences (“blocks”). As mentioned above there are three different lengths of cipher key that can be applied to each block (128, 192, or 256 bits) so the encryption levels are described as AES-128, AES-192, or AES-256. Obviously, the longer the cipher key is the heavier the blocks are encrypted and the more difficult it is to crack the encryption.
Federal Information Processing Standards (FIPS) publications are the standard by which the U.S. government directs its various agencies to manage their information systems and data. Since the publication of FIPS 197 on November 26, 2001, AES became the approved standard for cryptographic protection of sensitive but unclassified government information, and its adoption was also encouraged in non-government organizations as well (NIST, 2001). AES is particularly useful in secure messaging and encrypting large databases, due to its mathematical stability and relatively low processing and power costs. These advantages are becoming even more useful with the rise of the Internet of Things (IoT). IoT devices often require a delicate balance of processing speed and low power consumption, which coupled with the need to collect and securely transmit user data makes variations ...
This presentation consists of the Seminar, provided by me in the partial fulfillment of my Bachelors Degree in G B Pant Engineering College. Seminar included information about Encryption, Decryption, Cryptosystems and Authenticity in crytosystem.
Similar a PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) OVER SERIAL IMPLEMENTATION (19)
Call for Papers - 5th International Conference on Cloud, Big Data and IoT (CB...ijistjournal
5th International Conference on Cloud, Big Data and IoT (CBIoT 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
INFORMATION THEORY BASED ANALYSIS FOR UNDERSTANDING THE REGULATION OF HLA GEN...ijistjournal
Considering information entropy (IE), HLA surface expression (SE) regulation phenomenon is considered as information propagation channel with an amount of distortion. HLA gene SE is considered as sink regulated by the inducible transcription factors (TFs) (source). Previous work with a certain number of bin size, IEs for source and receiver is computed and computation of mutual information characterizes the dependencies of HLA gene SE on some certain TFs in different cells types of hematopoietic system under the condition of leukemia. Though in recent time information theory is utilized for different biological knowledge generation and different rules are available in those specific domains of biomedical areas; however, no such attempt is made regarding gene expression regulation, hence no such rule is available. In this work, IE calculation with varying bin size considering the number of bins is approximately half of the sample size of an attribute also confirms the previous inferences.
Call for Research Articles - 5th International Conference on Artificial Intel...ijistjournal
5th International Conference on Artificial Intelligence and Machine Learning (CAIML 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Artificial Intelligence and Machine Learning. The Conference looks for significant contributions to all major fields of the Artificial Intelligence, Machine Learning in theoretical and practical aspects. The aim of the Conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science, Engineering and Applications.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...ijistjournal
System identification from the experimental data plays a vital role for model based controller design. Derivation of process model from first principles is often difficult due to its complexity. The first stage in the development of any control and monitoring system is the identification and modeling of the system. Each model is developed within the context of a specific control problem. Thus, the need for a general system identification framework is warranted. The proposed framework should be able to adapt and emphasize different properties based on the control objective and the nature of the behavior of the system. Therefore, system identification has been a valuable tool in identifying the model of the system based on the input and output data for the design of the controller. The present work is concerned with the identification of transfer function models using statistical model identification, process reaction curve method, ARX model, genetic algorithm and modeling using neural network and fuzzy logic for interacting and non interacting tank process. The identification technique and modeling used is prone to parameter change & disturbance. The proposed methods are used for identifying the mathematical model and intelligent model of interacting and non interacting process from the real time experimental data.
Call for Research Articles - 4th International Conference on NLP & Data Minin...ijistjournal
4th International Conference on NLP & Data Mining (NLDM 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Data Mining.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)ijistjournal
Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topography(EIT) or Magnetic Induction Tomography(MIT). A circular subject with embedded circular objects is segmented into equal width slices from different angles. For each angle, Conductance and Conductivity of each slice is calculated and stored in an array. A back projection method is used to generate a two-dimensional image from one-dimensional projections. As a back projection method, Inverse Radon Transformation is applied on the calculated conductance and conductivity to reconstruct two dimensional images. These images are compared to the target image. In the time of image reconstruction, different filters are used and these images are compared with each other and target image.
Online Paper Submission - 6th International Conference on Machine Learning & ...ijistjournal
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systemsijistjournal
Almouti published the error performance of the 2x2 space-time transmit diversity scheme using BPSK. One of the key techniques employed for correcting such errors is the Quadrature amplitude modulation (QAM) because of its efficiency in power and bandwidth.. In this paper we explore the error performance of the 2x2 MIMO system using the Almouti space-time codes for higher order PSK and M-ary QAM. MATLAB was used to simulate the system; assuming slow fading Rayleigh channel and additive white Gaussian noise. The simulated performance curves were compared and evaluated with theoretical curves obtained using BER tool on the MATLAB by setting parameters for random generators. The results shows that the technique used do find a place in correcting error rates of QAM system of higher modulation schemes. The model can equally be used not only for the criteria of adaptive modulation but for a platform to design other modulation systems as well.
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
Feature extraction is a method of capturing visual content of an image. The feature extraction is the process to represent raw image in its reduced form to facilitate decision making such as pattern classification. We have tried to address the problem of classification MRI brain images by creating a robust and more accurate classifier which can act as an expert assistant to medical practitioners. The objective of this paper is to present a novel method of feature selection and extraction. This approach combines the Intensity, Texture, shape based features and classifies the tumor as white matter, Gray matter, CSF, abnormal and normal area. The experiment is performed on 140 tumor contained brain MR images from the Internet Brain Segmentation Repository. The proposed technique has been carried out over a larger database as compare to any previous work and is more robust and effective. PCA and Linear Discriminant Analysis (LDA) were applied on the training sets. The Support Vector Machine (SVM) classifier served as a comparison of nonlinear techniques Vs linear ones. PCA and LDA methods are used to reduce the number of features used. The feature selection using the proposed technique is more beneficial as it analyses the data according to grouping class variable and gives reduced feature set with high classification accuracy.
Research Article Submission - International Journal of Information Sciences a...ijistjournal
The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Manufacturing Process of molasses based distillery ppt.pptx
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) OVER SERIAL IMPLEMENTATION
1. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
DOI : 10.5121/ijist.2012.2601 1
PERFORMANCE ANALYSIS OF PARALLEL
IMPLEMENTATION OF ADVANCED
ENCRYPTION STANDARD (AES) OVER
SERIAL IMPLEMENTATION
Uzzal Kumar Prodhan1
, A.H.M. Shahariar Parvez2
, Md. Ibrahim Hussain2
,Yeasir
Fathah Rumi2
,Md. Ali Hossain3
1
Assistant Professor, CSE Dept.,Jatiya Kabi Kazi Nazrul Islam University,Trishal,
Mymensingh, Bangladesh
uzzal_bagerhat@yahoo.com
2
Senior Lecturer, CSE Dept., Bangladesh University, Dhaka, Bangladesh
sha0131@yahoo.com, ibrahim180772@gmail.com, yeasirfathah@yahoo.com
3
Lecturer, CSE Dept., Bangladesh University, Dhaka, Bangladesh
ali.cse.bd@gmail.com
ABSTRACT
Cryptography is the study of mathematical techniques related to aspects of information security such as
confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic
algorithms function more efficiently when implemented in hardware than in software running on single
processor. However, systems that use hardware implementations have significant drawbacks: they are
unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an
alternative, it is possible to implement cryptographic algorithms in software running on multiple
processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES
have some drawbacks when implemented in software: DES is no longer secure as computers get more
powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is
rapidly being adopted worldwide, provides a better combination of performance and enhanced network
security than DES or 3DES by being computationally more efficient than these earlier standards.
Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against
brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with
parallel implementations of AES with 2 varying different parameters such as key size, number of rounds
and extended key size, and show how parallel implementation of the AES offers better performance yet
flexible enough for cryptographic algorithms.
KEYWORDS
Cryptography, DES, AES, NIST, Plaintext, RSA.
2. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
2
1. INTRODUCTION
Cryptography is generally understood to be the study of the principles and techniques by which
information is converted into an encrypted version that is difficult (ideally impossible) for any
unauthorized person to convert to the original information, while still allowing the intended
reader to do so. In fact, cryptography covers rather more than merely encryption and decryption.
It is, in practice, a specialized branch of information theory with substantial additions from other
branches of mathematics. Cryptography is probably the most important aspect of communications
security [1] and is becoming increasingly important as a basic building block for computer
security.
The increased use of computer and communications systems by the industry has increased the
risk of theft of proprietary information. Although these threats may require a variety of
countermeasures, cryptography is a primary method of protecting valuable electronic information.
In data and telecommunications, cryptography is necessary when communicating over any
unsecured medium, which includes just about any network, particularly the Internet. Within the
context of any application-to-application communication, there are some specific security
requirements, including the following:
Authentication: The process of proving one's identity.
Confidentiality: Ensuring that no one can read the message except the intended receiver.
Integrity: Assuring the receiver that the received message has not been altered in any way from
the original.
Non-repudiation: A mechanism to prove that the sender really sent this message.
There are, in general, two types of cryptographic schemes typically used to accomplish these
goals: secret key (or symmetric or conventional) cryptography and public-key (or asymmetric)
cryptography.
In symmetric-key cryptography, an algorithm is used to scramble the message using a secret key
in such a way that it becomes unusable to all except the ones that have access to that secret key.
The most widely known symmetric cryptographic algorithm is DES, developed by IBM in the
seventies. It uses a key of 56 bits and operates on chunks of 64 bits at a time. In public key
cryptography [4], algorithms use two different keys: a private and a public one. A message
encrypted with a private key can be decrypted with its public key (and vice versa). The owner of
the key pair holds the private key, and may distribute the public key to anyone. Someone who
wants to send a secret message uses the public key of the intended receiver to encrypt it. Only the
receiver holds the private key and can decrypt it.
Figure 1: Two types of cryptography
3. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
3
1.1 Data Encryption Standard (DES)
The most common symmetric-key cryptography scheme used today is the Data Encryption
Standard (DES) [2], designed by IBM in the 1970s and adopted by the National Bureau of
Standards (NBS) [now the National Institute for Standards and Technology (NIST)] in 1977 [2]
for commercial and unclassified government applications. DES has been adopted as Federal
Information Processing Standard 46 (FIPS 46-3) and by the American National Standards
Institute as X3.92. DES is a block-cipher employing a 56-bit key that operates on 64-bit blocks.
DES has a complex set of rules and transformations that were designed specifically to yield fast
hardware implementations and slow software implementations, although this latter point is
becoming less significant today since the speed of computer processors is several orders of
magnitude faster today than twenty years ago. IBM also proposed a 112-bit key for DES, which
was rejected at the time by the government; the use of 112-bit keys was considered in the 1990s,
however, conversion was never seriously considered.
1.2 AES: An Alternative to DES
The symmetric-key cryptography is efficient for encryption while the Public-key cryptography
facilitates efficient signatures (particularly non-repudiation) and key management. Symmetric–
key cryptography is faster than any currently available public-key encryption method. On the
other hand, the most widely used symmetric-key encryption technique like DES is vulnerable to a
brute-force attack [3] because of its inadequate key size compare to the processing power of
modern computer. In order to increase the security of symmetric-key cryptography, NIST in 1997
issued a call for proposals for a new Advanced Encryption Standard (AES), which should have
security strength better than DES and significantly improved efficiency. In addition, to these
general requirements, NIST specified that AES must be a symmetric block cipher with a block
length of 128 bits and support for key lengths of 128, 192, and 256 bits.
2. MATERIALS AND METHODS:
AES Cipher:
The Rijndael proposal for AES [6] defined a cipher in which the block length and the key length
specified to be 128, 192, or 256 bits. The AES specification uses the same three key size
alternatives but limits the block length to 128 bits. A number of AES parameters (Table1) depend
on the key length. Most of the implementation of AES uses the key length of 128 bits.
Table 1: AES Parameter
4. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
4
2.1 Overall Structure of AES
The overall structure of AES is depicted in figure 2. The input to the encryption and decryption
algorithms is a single 128-bit block. This block of input is depicted as a square matrix of bytes.
This block is copied into the state array, which is modified at each stage of encryption or
decryption. After the final stage, state is copied to an output matrix. These operations are
depicted in figure: 3. similarly, the 128-bit key is depicted as a square matrix of bytes. This key is
then expanded into an array of key schedule words; each word is four bytes and total key
schedule is 44 words for the 128-bit key. The ordering of bytes within a matrix is by column. So,
for example, the first four bytes of a 128-bit plaintext input to the encryption cipher occupy the
first column of the in matrix, the second four bytes occupy the second column, and so on.
Similarly, the first four bytes of the expanded key, which form a word, occupy the first column of
the w matrix.
Figure 2: AES encryption and decryption
5. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
5
Several features of the overall AES structure [7]:
1. One noteworthy feature of this structure is that it is not a Feistel structure. In the classic feistel
structure, half of the data block is used to modify the other half of the data block, and then the
half are swapped. Rijndael does not use a Feistel structure but process the entire block in parallel
during each round using substitutions and permutations.
2. The key that is provided as input is expanded into an array of forty-four 32-bit words, w[i].
Four distinct words (128 bits) serve as a round key for each round; these are indicated in Figure-
2.
3. Four different stages are used, one of permutation and three of substitution:
Substitute bytes: Uses an S-box to perform a byte-by-byte substitution of the block.
Shift rows: A simple permutation
Mix Columns: A substitution that makes use of arithmetic over GF (28
)
Add round Key: A simple bitwise XOR of the current block with a portion of the expanded key
(a) Input, State array and Output
→
(b) Key and Expanded Key
Figure 3: AES Data Structure
4. The structure of AES is quite simple. For both encryption and decryption, the cipher begins
with an Add Round Key stage, followed by nine rounds that each includes all four stages,
followed by a tenth round of three stages. Figure 4 depicts the structure of a full encryption
round.
5. Only the Add Round Key stage makes use of the key. For this reason, the cipher begins and
ends with an Add Round Key stage. Any other stage, applied at the beginning or end, is reversible
without knowledge of the key and so would add no security.
K0 K4 K8 K12
K1 K5 K9 K13
K2 K6 K10 K14
K3 K7 K11 K15
W0 W1 …… W43
6. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
6
6. The Add Round Key stage is, in effect, a form of Vernam cipher and by itself would not be
formidable. The other three stages together provide confusion, diffusion, and nonlinearity, but by
themselves would provide no security because they do not use the key. The cipher is an
alternating operations of XOR encryption (Add Round Key) of a block, followed by scrambling
of the block (the other three stages), and followed by XOR encryption, and so on. This scheme is
both efficient and highly secure.
7. Each stage is easily reversible. For the Substitute Byte, Shift Row, and Mix Columns stages, an
inverse function is used in the decryption algorithm. For the Add Round Key stage, the inverse is
achieved by XORing the same round key to the block, using the result that A ⊕ A ⊕ B = B.
8. As with most block ciphers [5], the decryption algorithm makes use of the expanded key in
reverse order. However, the decryption algorithm is not identical to the encryption algorithm.
This is a consequence of the particular structure of AES.
9. Once it is established that all four stages are reversible, it is easy to verify that decryption does
recover the plaintext. Figure 2 lays out encryption and decryption going in opposite vertical
directions. At each horizontal point (e.g.,the dashed line in the figure), State is the same for both
encryption and decryption.
10. The final round of both encryption and decryption consists of only three stages. Again, this is
a consequence of the particular structure of AES and is required to make the cipher reversible.
Figure 4: AES encryption round
7. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
7
2.2 Algorithm for Serial Implementation of AES
AES is an iterated block cipher, meaning that the initial input block and cipher key undergoes
multiple rounds of transformation before producing the output. Each intermediate cipher result is
called a State. The block and cipher key are often represented as an array of columns where each
array has 4 rows and each column represents a single byte (8 bits). The number of columns in an
array representing the state or cipher key, then, can be calculated as the block or key length
divided by 32 (32 bits = 4 bytes). An array representing a State will have Nb columns, where Nb
values of 4, 6, and 8 correspond to a 128-, 192-, and 256-bit block, respectively. Similarly, an
array representing a Cipher Key will have Nk columns, where Nk values of 4, 6, and 8
correspond to a 128-, 192-, and 256-bit key, respectively. The AES cipher itself has three
operational stages:
1. AddRound Key transformation
2. Nr-1 Rounds comprising: • SubBytes transformation • ShiftRows transformation
• MixColumns transformation • AddRoundKey transformation
3. A final Round comprising: • SubBytes transformation • ShiftRows transformation
• AddRoundKey transformation
The overall structure of AES cipher is described below:
Constants: int Nb = 4;
int Nr = 10, 12, or 14; // rounds, for Nk = 4, 6, or 8
Inputs: array in of 4*Nb bytes // input plaintext
array out of 4*Nb bytes // output ciphertext
array w of 4*Nb*(Nr+1) bytes // expanded key
Internal work array: state, 2-dim array of 4*Nb bytes, 4 rows and Nb cols
8. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
8
Algorithm :
In the above algorithm:
• in[] and out[] are 16-byte arrays with the plaintext and cipher text, respectively. Both of
these arrays are actually 4*Nb bytes in length but Nb=4 in AES.
• state[] is a 2-dimensional array containing bytes in 4 rows and 4 columns. This arrays is
4 rows by Nb columns.
• w[] is an array containing the key material and is 4*(Nr+1) words in length.
• AddRoundKey(), SubBytes(), ShiftRows(), and MixColumns() are functions representing
the individual transformations.
2.3 Run Time Complexity of the Serial Implementation
The number of steps an algorithm requires to solve a specific problem is denoted as the running
time of the algorithm. In general, the running time depends on the size of the problem and on the
respective input. In order to evaluate an algorithm independently of the input, the notation of time
complexity is introduced. The time complexity T(n) is a function of the problem size n. The value
of T(n) is the running time of the algorithm in the worst case, i.e. the number of steps it requires
at most with an arbitrary input. However, time complexity function does not give the actual
execution time of an algorithm rather it gives an idea how the time required for an algorithm
changes as the problem size increases.
9. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
9
In order to compute the run time complexity of the AES algorithm, the time complexity function
for each transformation has to be considered. As the AES algorithm consists of only four different
types of transformation, the time complexity function of AES will depend on the time complexity
of each transformation.
From the time complexity of different transformation function, it is found that the AES algorithm
has a linear complexity that means when the value of N (number of data block) ranges from 10 –
100000, the execution time will vary from 10-5
second to 1 seconds (each operation is assumed to
take 10-6
second). However, when the value of N is greater than 108
, the execution time of the
algorithm will require several days to encrypt or decrypt. The following table will give a clear
idea:
2.4 Computer time used for different data blocks
2.5 PARALLEL IMPLEMENTAION OF AES
The current trend in high performance computing is clustering and distributed computing. In
clusters, powerful low cost workstations and/or PCs are linked through fast communication
interfaces to achieve high performance parallel computing. Recent increases in communication
speeds, microprocessor clock speeds, availability of high performance public domain software
including operating system, compiler tools and message passing libraries, make cluster based
computing appealing in terms of both high performance computing and cost effectiveness.
For implementing the AES algorithm in parallel, the MPI based cluster is used in the present
section. The performance of a parallel algorithm depends not only on input size but also on
the architecture of the parallel computer, the number of processors, and the interconnection
network. In this chapter, different types of parallel architectures and interconnection networks are
discussed before actually implementing the parallel algorithm of AES. At the end of this chapter,
some sample input/output are shown varying the key size, number of rounds and the number of
processors to verify the correctness of parallel algorithm. Finally, the run time complexity of the
parallel algorithm is shown to measure the performance improvement of the parallel
implementation over the serial implementation.
10. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
10
2.6 Algorithm for Parallel Implementation of AES
There are two major components of parallel algorithm design. The first one is the identification
and specification of the overall problem as a set of tasks that can be performed concurrently. The
second is the mapping of these tasks onto different processors so that the overall communication
overhead is minimized. The first component specifies concurrency, and the second one specifies
data locality. The performance of an algorithm on a parallel architecture depends on both.
Concurrency is necessary to keep the processors busy. Locality is important because it minimizes
communication overhead. Ideally, a parallel algorithm should have maximum concurrency and
locality. However, for most algorithms, there is a tradeoff. An algorithm that has more
concurrency often has less locality.
To implement the AES algorithm in parallel, data blocks (Figure 5) and a key are distributed
among the available processors. Each processor will encrypt different data blocks using the same
key. For example, in order to encrypt n number of data blocks with p processors, n/p data blocks
will be encrypted by each processor. As each processor has its own data blocks and a key
(increases data locality), all the 10/12/14 rounds (consists of four transformations) will be
executed by each processor for encrypting each data block.
After encrypting all the data blocks of each processor, the encrypted data will be merged in tree
structure and return back to the main processor. For example, if there are four processors working
in parallel, processor P1 will send its encrypted data to P0 and P0 will merge its encrypted data
with P1; processor P3 will send its encrypted data to P2, and P2 will merge its encrypted data
with P3.
Figure 5: (a, b) Data blocks are distributed between two and four processors
Finally processor P2 will send its (P2 & P3) encrypted data to P0 and P0 will merge its (P0 & P1)
encrypted data with P2. This technique of merging and returning data to the main processor will
increase the concurrency and reduce the idle time of each processor.
The overall parallel algorithm of AES cipher is described below:
Constant: ArraySize = 160 ; int Nb = 4;
int Nr = 10, 12, or 14; // rounds, for Nk = 4, 6, or 8
11. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
11
Inputs: int nProcessors = 2/4/8/16 processors
int tNumberOfBlocks // number of blocks to be encrypted
unsigned char key[16] // key for encrypting data
int k = 0;
array w of 4*Nb*(Nr+1) bytes // expanded key
Internal work array: my_pointer is an array of pointers where each element of the array
points to an array of data blocks. Each processor will have the variable my_pointer, where the
first index will contain the data blocks for each processor.
Algorithm:
3. SAMPLE INPUT/OUTPUT
128-bit data, 128-bit Key
2 processors, each processor processes 4 data blocks
Encrypting . . .
void Cipher(byte[] in, byte[] out, byte[] w) {
nProcessors = 4
int nBlockPerProcessor = tNumberOfBlocks / nProcessors
int rank = processor’s label
if (rank = = processor 0){
my_pointer[0] = nBlockPerProcessor data blocks
read the key
send nBlockPerProcessor data blocks to rest of the processors
send the same key to other processors
}
else{// for all other processors
receive the nBlockPerProcessor data blocks from processor 0
my_pointer[0] = nBlockPerProcessor data blocks
receive the key from the processor 0
}
// each processor will execute this part of the algorithm.
//Encrytion
Encryption(my_pointer[0]);
// Encrypted data are merged in tree structure and return back to the
// main processor
BTM(0, nProcessors -1);
//Decryption
Decryption(my_pointer[1]);
BTM(0, nProcessors -1);}
12. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
12
13. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
13
4. CONCLUSIONS
In the figure 6 and 7, the performance of serial and parallel implementation of AES is shown with
2 processors. The speedup factor of AES is given in figure 8 with 2 processors.
Figure 6: Performance of AES in Serial
14. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
14
Figure 7: Performance of AES in Parallel with 2 processors
Figure 8: Speedup of AES with 2 processors
After implementing the AES algorithm on a single processor, it is found that the AES algorithm
has a linear complexity that means when the value of N (number of data blocks) ranges from 10 –
100000, the execution time will vary from 10-5
second to 1 seconds (each operation is assumed to
take 10-6 second). However, when the value of N is greater than 108
, the execution time of the
algorithm will require several days to encrypt or decrypt. This creates the reason for
implementing the algorithm in parallel.
After implementing the AES algorithm in parallel, it is found that the performance of AES
algorithm increases significantly as the number of processor increases. It is not possible to get the
speedup factor equal to P (number of processor), as some parallel processing overhead is also
occurred during the implementation of AES in parallel.
REFERENCES
1. Menezes, A. and Vanstone, S. “Handbook of Applied Cryptography”, CRC Press, Inc. 1996
2. National Bureau of Standards, NBS FIPS PUB 46, “Data Encryption Standard,”, U.S. Department of
Commerce, January 1977.
15. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
15
3. Coppersmith, D. “The Data Encryption Standard (DES) and Its Strength Against Attacks.” IBM
Journal of Research and Development, May 1994.
4. Diffie, W. and Hellman, M. “Multiuser Cryptographic Techniques” proceedings of AFIPS National
Computer Conference, 1976, 109-112
5. Korner. T. “The Pleasures of Counting”, Cambridge, England, Cambridge University Press, 1996
6. Khan, D. “The Codebreakers: The Story of Secret Writing.” New York, 1996
7. Schneier, B. “Applied Cryptgraphy.” New York: Wiley, 1996.
8. Daemon, J. and Rijmen, V. “The Rijndael Block Cipher: AES Proposal”, NIST, Version 2, March
1999.
9. Stallings, W. “Cryptography and Network Security: Principles and Practices.” Third Edition, Pearson
Education, Inc. 2003.
AUTHORS
Uzzal Kumar Prodhan
Assistant Professor, Department of Computer Science & Engineering, Jatiya Kabi Kazi
Nazrul Islam University, Trishal, Mymensingh, Bangladesh. He has completed his
M.Sc. and B.Sc. from the department of Computer Science & Engineering, Islamic
University, Bangladesh. He got first class in both exams. He passed S.S.C. and H.S.C
with star marks. After completing M.Sc in CSE, he joined Bangladesh University as a
Lecturer & joined in Jatia Kabi Kazi Nazrul Islam University as an Assistant Professor.
In his long teaching life he was appointed as a head examiner in Computer Technology
by Bangladesh Technical Education Board, Dhaka. Due to his teaching interest he was selected as a Book
reviewer of National Curriculum of Textbook Board, Dhaka. He has successfully completed Microsoft
Certified IT Professional (MCITP) on Server 2008 platform. His research interest includes Artificial
Intelligence, Neural Network, Cryptography, Computer Architecture and Organization and Pattern
Recognition. He has many international and national research publications. His email addresses are
uzzal_bagerhat@yahoo.com, uzzal.prodhan@bu.edu.bd.
A.H.M Shahariar Parvez
Senior Lecturer, Department of Computer Science & Engineering, Bangladesh
University, Bangladesh. He has completed his M.Sc. in Computer Science &
Engineering, Kiev, Ukraine. He also got another M.Sc. in E-Commerce from UK. He
got B.Sc degree in Computer Science & Engineering, Kiev, Ukraine. He got first class
in both exams. He passed S.S.C. and H.S.C with first class. After completing M.Sc in
CSE, he joined Bangladesh University as a Lecturer. He has successfully completed
Microsoft Certified IT Professional (MCITP) on Server 2008 platform. His research
interest includes Operating System, Digital Logic, Digital System Design and Electrical Drivers and
Instrument. He has many international and national research publications. His email addresses are
shariar.parvez@bu.edu.bd, sha0131@yahoo.com.
Mohammed Ibrahim Hussain
Senior Lecturer, Department of Computer Science & Engineering, Bangladesh
University, Dhaka, Bangladesh. He had M.Sc. in E-Commerce from London, UK. He
got B.Sc degree in Computer Science & Engineering, Kiev, Ukraine. He got first class
in both exams. After completing M.Sc in CSE, he joined Bangladesh University as a
Lecturer. He has successfully completed Cisco Certified Network Associate(CCNA)
and Microsoft Certified IT Professional (MCITP) on Server 2008 platform.He is also a
nominated Book reviewer of National Curriculum of Textbook Board, Dhaka. His
16. International Journal of Information Sciences and Techniques (IJIST) Vol.2, No.6, November 2012
16
research interest includes Operating System, Networking, VLSI Design,Digital, Logic,Perpheral
Interfacing,Digital System Design and Web Programming. He has many international and national research
publications. His email addresses are ibrahim.hussain@bu.edu.bd, ibrahim180772@gmail.com .
Yeasir Fathah Rumi
Senior Lecturer, Department of Computer Science & Engineering, Bangladesh
University, Dhaka, Bangladesh. He had M.Sc. in Computer Science and completed B.Sc
degree in Computer Science & Engineering from The University of Asia pacific. He got
first class in both S.S.C & H.S.C exams. After completing M.Sc in CSE, he joined
Bangladesh University as a Lecturer. He has successfully completed Cisco Certified
Network Associate(CCNA) and Microsoft Certified IT Professional (MCITP) on Server
2008 platform.He has nominated Book reviewer of National Curriculum of Textbook
Board, Dhaka. His research interest includes Microprocessor and assembly language ,Operating System,
Networking, VLSI Design,Digital Logic,Perpheral Interfacing,Digital System Design and Web
Programming. He has many international and national research publications. His email address ,
yeasirfathah@yahoo.com,
Md. Ali Hossain
Md. Ali Hossain was born in Manikganj, Bangladesh, on 30 December 1984. He received
the B.Sc. and M.Sc. degrees from the Department of Computer Science and Engineering,
University of Islamic University, Kushtia, Bangladesh, in 2008 and 2009, respectively. He
is serving as a Lecturer with the Department of Computer Science and Engineering (CSE),
Bangladesh University, Dhaka. His current research interests include Cryptography,
Biomedical Imaging, Biomedical Signal and Speech Processing and Bioinformatics. Mr.
Ali Hossain is an Associate Member of the Bangladesh Computer Society and Executive Member of
Islamic University Computer Association (IUCA).