To see the other types of publications on this topic, follow the link: AES-256 Encryption.

Journal articles on the topic 'AES-256 Encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'AES-256 Encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wade, Sahil. "Description of Image encryption Using AES-256 bits." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 7167–71. http://dx.doi.org/10.22214/ijraset.2023.53365.

Full text
Abstract:
Abstract: Image Encryption using AES Algorithm is a technique to secure the confidentiality of images. One of the most popular and secure encryption algorithms is the AES (Advanced Encryption Standard) algorithm. It is a symmetric encryption algorithm that encrypts data using a 128-bit block cipher. In this process, the image is first converted into a binary format. Then, a random 128-bit key is generated, which is used to create a sequence of subkeys that will be used for each round of encryption. The binary image is then divided into 128-bit blocks, and the encryption algorithm is applied to
APA, Harvard, Vancouver, ISO, and other styles
2

Shinde, K. A. "Pretty Good Privacy on Online Shopping." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03360.

Full text
Abstract:
ABSTRACT - This study investigates the integration of Pretty Good Privacy (PGP) encryption into e-commerce platforms, focusing on the use of RSA, AES and SHA-256 cryptographic algorithms. PGP enhances the security of online communications and transactions by combining symmetric encryption (AES), asymmetric encryption (RSA) and secure hashing (SHA-256). These mechanisms work together to ensure data confidentiality, authentication, and integrity. The paper presents the principles behind PGP, details the encryption and hashing techniques and examines their practical application in securing e-comm
APA, Harvard, Vancouver, ISO, and other styles
3

Ansh Goel, Harshit Baliyan, Shivam Tyagi, and Neeti Bansal. "End to end encryption of chat using advanced encryption standard-256." International Journal of Science and Research Archive 12, no. 1 (2024): 2018–25. http://dx.doi.org/10.30574/ijsra.2024.12.1.0923.

Full text
Abstract:
In an era marked by rampant digitalization and ubiquitous connectivity, ensuring the security and privacy of communications has become paramount. This paper introduces a novel application developed using Node.js, designed to address this pressing need by offering a secure means of converting plain text into cipher text. At its core, the application employs the Advanced Encryption Standard (AES) with a key length of 256 bits, a widely acclaimed cryptographic algorithm known for its robustness and reliability. The primary objective of this research is to provide a comprehensive solution for secu
APA, Harvard, Vancouver, ISO, and other styles
4

Gaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.

Full text
Abstract:
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is
APA, Harvard, Vancouver, ISO, and other styles
5

Arek Satria, Bagas Piwari, and Tata Sutarbi. "Implementasi Algoritma Kriptografi AES untuk Keamanan Data pada Aplikasi Pesan Instan Berbasis Android." Jurnal Ilmiah Teknik Informatika dan Komunikasi 5, no. 2 (2025): 541–47. https://doi.org/10.55606/juitik.v5i2.1167.

Full text
Abstract:
This study uses AES-256 encryption to protect data in Android messaging apps. The algorithm works well, encrypting text messages in 0.05 seconds and multimedia files in 0.2 seconds, without affecting device resources. Testing confirms that AES-256 effectively protects user data while maintaining communication capabilities in real time. These findings provide valuable insights for developers seeking to enhance data protection in instant messaging platforms without compromising user experience. The solution offers an optimal balance between security and performance for mobile applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Ravikiran, Dr P., M. Gnaneshwar, Enje Hepsibha, and Sudhesh Srivastav. "FPGA Implementation of 256-Bit Key AES Algorithm." International Journal for Research in Applied Science and Engineering Technology, no. 6 (June 30, 2024): 282–91. http://dx.doi.org/10.22214/ijraset.2024.63028.

Full text
Abstract:
Abstract: The most popular network security technique for secure data transmission between two end users, particularly over a public network, is the AES algorithm, also known as the Rijndael algorithm. It may be found in all kinds of wired and wireless digital communication networks AES, a network security technique, uses 256 bits on an FPGA. An authorized cryptographic technique that can be used to secure electronic data is the Advanced Encryption Standard technique (AES), which is specified by the National Institute of Standards and Technology. Because they provide faster and more flexible s
APA, Harvard, Vancouver, ISO, and other styles
7

Monica, Taris, Asep Id Hadiana, and Melina Melina. "QUESTION BANK SECURITY USING RIVEST SHAMIR ADLEMAN ALGORITHM AND ADVANCED ENCRYPTION STANDARD." JIKO (Jurnal Informatika dan Komputer) 7, no. 3 (2024): 175–81. https://doi.org/10.33387/jiko.v7i3.8654.

Full text
Abstract:
Data security is essential. Educational question banks at vocational high schools (SMK) contain confidential information that could be misused if not properly secured. This research aims to ensure students question bank data and develop a responsive web platform for Pusdikhubad Cimahi Vocational School by implementing the integration of the Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) cryptographic algorithms through the encryption and decryption process. AES is a symmetric key cryptography algorithm, while RSA is an encryption algorithm based on using public keys to encr
APA, Harvard, Vancouver, ISO, and other styles
8

Shivangi, Wadehra, Goel Shivam, and Sengar Nidhi. "AES Algorithm Encryption and Decryption." International Journal of Trend in Scientific Research and Development 2, no. 3 (2019): 1075–77. https://doi.org/10.31142/ijtsrd11221.

Full text
Abstract:
Advanced Encryption Standard AES algorithm is one of the most common and widely used symmetric block cipher algorithm. This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software, all over the world. It is extremely difficult for hackers to get the real data when encrypting by AES algorithm. In AES algorithm, encryption and decryption involves a number of rounds that depends on the length of the key and the number of block columns. So, to improve the strength of the AES the number of rounds is increased. Till date there is not a
APA, Harvard, Vancouver, ISO, and other styles
9

Patil, Paritosh S. "New Encryption Technique for Secure SMS Transmission." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 11 (2014): 1265–69. https://doi.org/10.5281/zenodo.14759441.

Full text
Abstract:
Short Message Service (SMS) is a very popular way for mobile phone and portable device users to send and receive simple text messages. Unfortunately, SMS is does not offer a secure environment for confidential data during transmission. This paper deals with an SMS encryption for mobile communication on Android message application. The transmission of an SMS in mobile communication is not secure, therefore it is desirable to secure SMS by additional encryption. In this paper, there is proposed the use of 3D-AES block cipher symmetric cryptography algorithm for SMS transfer securing. From the ex
APA, Harvard, Vancouver, ISO, and other styles
10

Putra, Jessa Syah, Rian Ardianto, and Purwono Purwono. "Tinjauan Terhadap Implementasi Advanced Encryption Standard 256 Dalam Keamanan Data." DEVICE : JOURNAL OF INFORMATION SYSTEM, COMPUTER SCIENCE AND INFORMATION TECHNOLOGY 5, no. 2 (2024): 335–55. https://doi.org/10.46576/device.v5i2.4621.

Full text
Abstract:
Penelitian ini membahas bagaimana algoritma Advanced Encryption Standard (AES) 256 dapat digunakan untuk melindungi data. Keamanan data menjadi semakin penting untuk mencegah penyalahgunaan dan pencurian data, terutama dalam komunikasi digital dan penyimpanan data sensitif, berkat kemajuan teknologi informasi. Metode penelitian yang digunakan adalah penelitian literatur dengan mengacu pada berbagai literatur dan jurnal yang relevan. Hasil penelitian menunjukkan bahwa algoritma enkripsi simetris AES-256 dapat dengan efektif mendekripsi dan mengenkripsi data sambil memastikan kerahasiaan, integr
APA, Harvard, Vancouver, ISO, and other styles
11

Setiani, Rina, Eldiva Tegar Imananda, Wahyu Enggar Wicaksono, Muhammad Aziz Baihaqi, and Jeki Kuswanto. "Perbandingan Algoritma AES128 dengan SHA256 dalam Kecepatan Enkripsi Pengiriman Data." JOINS (Journal of Information System) 9, no. 1 (2024): 13–22. http://dx.doi.org/10.33633/joins.v9i1.8800.

Full text
Abstract:
Internet of Things bekerja untuk menyediakan berbagai layanan yang menghubungkan sensor dengan aktuator. Pada masa sekarang, layanan IoT telah banyak digunakan diberbagai bidang. Dengan pertumbuhan eksponensial IoT menyebabkan meningkatnya masalah ancaman keamanan. Untuk memastikan keamanan data tersebut, diperlukan algoritma untuk mengenkripsi data. Algoritma yang paling umum dalam melakukan enkripsi adalah Advanced Encryption Standard (AES)[4]. AES adalah salah satu metode yang digunakan untuk mencapai privasi dan kerahasiaan data yang ditransfer melalui berbagai jaringan komputer. Selain AE
APA, Harvard, Vancouver, ISO, and other styles
12

Shiral, J. V., R. C. Deshmukh, J. S. Zade, and A. Potnurwar. "An Approach to Rijndael Algorithm." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 1 (2015): 01–05. http://dx.doi.org/10.53555/nncse.v2i1.508.

Full text
Abstract:
Rijndael or Advanced Encryption Standard (AES) is the most secure symmetric encryption technique and is available in many different encryption packages. The AES based on the Rijndael Algorithm is an efficient cryptographic technique that includes generation of ciphers for encryption and inverse ciphers for decryption. High security and speed of encryption and decryption is ensured by various operations. It has been standardized by the National Institute of Standards and Technology of the United States (NIST) and comprises three block ciphers, AES-128, AES-192 and AES-256 and it is adopted from
APA, Harvard, Vancouver, ISO, and other styles
13

Zehui, Zhang, Yao Fu, and Tiegang Gao. "A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System." International Journal of Multimedia Data Engineering and Management 11, no. 4 (2020): 1–24. http://dx.doi.org/10.4018/ijmdem.2020100101.

Full text
Abstract:
Image encryption algorithms usually have two processes: permutation and diffusion. In order to enhance the performance of the permutation process, this study proposes a dynamic permutation method based on XOR operation and sorting. Combined with the hyper-chaotic system, SHA-256, the proposed permutation method and the simplified advanced encryption system (S-AES), a novel image encryption algorithm is presented in this paper. Firstly, the SHA-256 is used to generate initial condition values of the chaotic system and control parameters of the permutation method. Then, the chaotic system genera
APA, Harvard, Vancouver, ISO, and other styles
14

Ridho, Akbar, and Moh Ali Romli. "SISTEM PENGAMANAN DOKUMEN MENGGUNAKAN ALGORITMA KRIPTOGRAFI ADVANCED ENCRYPTION STANDARD (AES-256)." Jurnal Informatika Teknologi dan Sains (Jinteks) 6, no. 4 (2024): 1044–52. http://dx.doi.org/10.51401/jinteks.v6i4.4887.

Full text
Abstract:
Penelitian ini membahas implementasi algoritma Advanced Encryption Standard (AES-256) untuk mengamankan dokumen digital. Dengan meningkatnya kebutuhan untuk melindungi informasi sensitif dari peretasan dan pelanggaran data, penelitian ini menekankan pentingnya strategi keamanan informasi yang efektif. Proses enkripsi meliputi transformasi AddRoundKey, beberapa putaran transformasi (SubBytes, ShiftRows, MixColumns, dan AddRoundKey), serta putaran akhir tanpa MixColumns. Proses dekripsi merupakan kebalikan dari enkripsi, menggunakan transformasi invers. Algoritma AES mendukung panjang kunci 128,
APA, Harvard, Vancouver, ISO, and other styles
15

Utami, Hamdan Dian Jaya Rozi Hyang, Riza Arifudin, and Alamsyah Alamsyah. "Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit." Scientific Journal of Informatics 6, no. 1 (2019): 34–44. http://dx.doi.org/10.15294/sji.v6i1.17589.

Full text
Abstract:
The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. A login system that used the database as user authentication and passwords are very vulnerable to be hacking. In securing data, various ways had been developed including cryptography. Cryptographic algorithms used in securing passwords usually used MD5 encryption. However, MD5 as a broader encryption technique is very risky. Therefore, the level of login s
APA, Harvard, Vancouver, ISO, and other styles
16

El Adib, Samir, and Naoufal Raissouni. "AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key." International Journal of Reconfigurable and Embedded Systems (IJRES) 1, no. 2 (2012): 67. http://dx.doi.org/10.11591/ijres.v1.i2.pp67-74.

Full text
Abstract:
<span lang="EN-US">Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) to replace existing Data Encryption Standard (DES), as the most widely used encryption algorithm in many security applications. Up to today, AES standard has key size variants of 128, 192, and 256-bit, where longer bit keys provide more secure ciphered text output. In the hardware perspective, bigger key size also means bigger area and small throughput. Some companies that employ ultra-high security in their systems may look for a key size bigger than 128-bit AES. In
APA, Harvard, Vancouver, ISO, and other styles
17

Manazipet, Pranitha, Sai Nukesh Matta, Vivek Kumar Ananthula, and Vive Harini. "DATA SECURITY ENHANCEMENT IN CLOUD COMPUTING USING AES ENCRYPTION." International Journal of Advanced Logistics, Transport and Engineering 8, no. 4 (2023): 34–51. http://dx.doi.org/10.52167/2790-5829-2023-8-4-34-51.

Full text
Abstract:
. Cloud computing has transformed data storage and access, yet it has raised significant security and privacy concerns. This article advocates the use of various encryption methods to protect data in the cloud. It discusses threats to data integrity and supports secure encryption techniques. The proposed framework integrates authentication and encrypted data transfer using 256-bit AES algorithm with token exchange for better security and trust. In addition, a web-based AES- CBC-256 encryption and decryption mechanism for cloud files is proposed. The study also recommends a bulk authentication
APA, Harvard, Vancouver, ISO, and other styles
18

Fitriani, Intan, and Aryo Baskoro Utomo. "Implementasi Algoritma Advanced Encryption Standard (AES) pada Layanan SMS Desa." JISKA (Jurnal Informatika Sunan Kalijaga) 5, no. 3 (2020): 153. http://dx.doi.org/10.14421/jiska.2020.53-03.

Full text
Abstract:
Along with the development of technology, Short Message Service (SMS) has begun to be used to communicate between someone and the system in an agency. But in some cases, the security of messages sent through the SMS application has not been well protected. To improve data security and confidentiality, cryptographic algorithms with Advanced Encryption Standard (AES) can be done. The method used is the Waterfall method. AES encryption testing is done by comparing the manual calculations and the results of the encryption on the system. Blackbox test, CrackStation test, and Avalanche Effect (AE) t
APA, Harvard, Vancouver, ISO, and other styles
19

Rohman, Ali, and Ahmad Munawir. "IMPLEMENTASI ENKRIPSI FILE BERBASIS CRYPTOGRAPHY UNTUK KEAMANAN DATA DI WINDOWS 10 MENGGUNAKAN ALGORITMA (AES)." Jurnal Ilmiah Sistem Informasi 3, no. 1 (2023): 149–59. http://dx.doi.org/10.46306/sm.v3i1.90.

Full text
Abstract:
This research aims to develop and implement a file encryption method based on the cryptography library in Windows 10 to enhance data security. The encryption uses the Advanced Encryption Standard (AES) algorithm with a 256-bit key in Galois/Counter Mode (GCM), known for its high security. The encryption key is generated using the Scrypt algorithm, ensuring resistance to brute-force attacks. The implementation includes file encryption and decryption with secure handling of salt, initialization vector (IV), and authentication tag. The research results show that this method is effective and effic
APA, Harvard, Vancouver, ISO, and other styles
20

AV, Shruthi, Electa Alice, and Mohammed Bilal. "Low Power VLSI Design and Implementation of Area-Optimized 256-bit AEStandard for Real Time Images on Vertex 5." International Journal of Reconfigurable and Embedded Systems (IJRES) 2, no. 2 (2013): 83. http://dx.doi.org/10.11591/ijres.v2.i2.pp83-88.

Full text
Abstract:
A new Vertex6-chipscope based implementation scheme of the AES-256 (Advanced Encryption Standard, with 256-bit key) encryption and decryption algorithm is proposed in this paper. For maintaining the speed of encryption and decryption, the pipelining technology is applied and the mode of data transmission is modified in this design so that the chip size can be reduced. The 256-bit plaintext and the 256- bit initial key, as well as the 256-bit output of cipher-text, are all divided into four 32-bit consecutive units respectively controlled by the clock. In this novel work, substantial improvemen
APA, Harvard, Vancouver, ISO, and other styles
21

Fahlevvi, Mohammad Rezza, Dhita Satria Aprilliana Putra, and Wahyu Ariandi. "ALGORITMA AES128-CBC (ADVANCED ENCRYPTION STANDARD) UNTUK ENKRIPSI DAN DEKRIPSI BERKAS DOKUMEN PT. ADIARTA MUZIZAT." Journal of Innovation And Future Technology (IFTECH) 7, no. 1 (2025): 166–76. https://doi.org/10.47080/iftech.v7i1.3929.

Full text
Abstract:
The rapid advancement of digital technology has increased concerns about data security, especially in document storage and transmission. PT. Adiarta Muzizat, a logistics company, has experienced multiple data breaches, highlighting the need for a more secure encryption method. This study focuses on implementing the Advanced Encryption Standard (AES) 128-bit with Cipher Block Chaining (CBC) mode to enhance document security. The research follows the Rational Unified Process (RUP) methodology, comprising four phases: inception, elaboration, construction, and transition. The encryption and decryp
APA, Harvard, Vancouver, ISO, and other styles
22

Thaenkaew, Phithak, Bruno Quoitin, and Ahmed Meddahi. "Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs." Sensors 23, no. 22 (2023): 9172. http://dx.doi.org/10.3390/s23229172.

Full text
Abstract:
Internet of Things (IoT) devices increasingly contribute to critical infrastructures, necessitating robust security measures. LoRaWAN, a low-power IoT network, employs the Advanced Encryption Standard (AES) with a 128-bit key for encryption and integrity, balancing efficiency and security. As computational capabilities of devices advance and recommendations for stronger encryption, such as AES-256, emerge, the implications of using longer AES keys (192 and 256 bits) on LoRaWAN devices’ energy consumption and processing time become crucial. Despite the significance of the topic, there is a lack
APA, Harvard, Vancouver, ISO, and other styles
23

M. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.

Full text
Abstract:
Cryptography is a field of study that deals with converting data from a readable to an unreadable format. It can provide secrecy, data integrity, authenticity, and non-repudiation services. Security has become a concern for the community because of the technology’s potential use in numerous sectors of any company, market, agency, or governmental body, information. The cryptosystems ensure that data are transported securely and only authorized individuals have access to it. Deeply encrypted data that cannot be deciphered through cryptanalysis are in high demand right now. There are a variety of
APA, Harvard, Vancouver, ISO, and other styles
24

Rais Rabtsani, Muhamad, Agung Triayudi, and Gatot Soepriyono. "Combination of AES (Advanced Encryption Standard) and SHA256 Algorithms for Data Security in Bill Payment Applications." SAGA: Journal of Technology and Information System 2, no. 1 (2024): 175–89. http://dx.doi.org/10.58905/saga.v2i1.250.

Full text
Abstract:
In the era of information technology development, digital payments and e-payments are becoming a dominant trend, supported by the crucial role of payment gateways such as Midtrans. Midtrans uses APIs to facilitate various online transactions, including debit cards. In this research, two cryptographic algorithms will be combined, namely Advance Encryption Standard (AES) with 256 bits and Secure Hash Algorithm (SHA) with 256 bits. The importance of data security in e-payments is recognized, with the application of cryptographic algorithms to protect sensitive transaction information. Yayasan Ant
APA, Harvard, Vancouver, ISO, and other styles
25

Parthasarathy, Rajamohan, Seow Soon Loong, and Preethy Ayyappan. "An Efficient Encryption Implementation Using AES Algorithm Techniques." Journal of Engineering & Technological Advances 3, no. 1 (2018): 61–70. http://dx.doi.org/10.35934/segi.v3i1.61.

Full text
Abstract:
The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard
APA, Harvard, Vancouver, ISO, and other styles
26

Saidi, Riad, Nada Cherrid, Tarek Bentahar, Hicham Mayache, and Atef Bentahar. "Number of Pixel Change Rate and Unified Average Changing Intensity for Sensitivity Analysis of Encrypted inSAR Interferogram." Ingénierie des systèmes d information 25, no. 5 (2020): 601–7. http://dx.doi.org/10.18280/isi.250507.

Full text
Abstract:
The transmission of images from satellites to earth is on the brink of many threats which can affect the confidentiality of the data as well as its quality. Several encryption algorithms are used to secure the transmitted images. The objective in this work is to analyze the sensitivity of a particular type of satellite image, which is an interferogram from interferometric imaging systems inSAR system. This image is encrypted by cryptosystem based on the Advanced Encryption Standard with key length of 256 bits (AES-256) standard and the asymmetric Rivest, Shamir & Adelman (RSA) encryption a
APA, Harvard, Vancouver, ISO, and other styles
27

Indrayani, Lilik Asih, and I. Made Suartana. "Implementasi Kriptografi dengan Modifikasi Algoritma Advanced Encryption Standard (AES) untuk Pengamanan File Document." Journal of Informatics and Computer Science (JINACS) 1, no. 01 (2019): 42–47. http://dx.doi.org/10.26740/jinacs.v1n01.p42-47.

Full text
Abstract:
Abstrak— Algoritma AES (Advanced Encryption Standard) disebut algoritma dengan cipher block symmetric karena untuk memperoleh data yang telah dienkripsi menggunakan kunci rahasia atau cipher key yang sama ketika melakukan proses penyandian data (enkripsi). AES memiliki 3 kategori blok cipher: AES-128, AES-192, dan AES-256 dengan panjang kunci masing-masing 128 bit, 192 bit, dan 256 bit. Perbedaan dari ketiga urutan tersebut adalah panjang kunci yang mempengaruhi jumlah round (putaran). Pada penelitian ini, algoritma AES akan dimodifikasi dengan meningkatkan jumlah putaran bersamaan dengan panj
APA, Harvard, Vancouver, ISO, and other styles
28

Seo, Hwajeong, Hyeokdong Kwon, Yongbeen Kwon, et al. "Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor." Sensors 20, no. 7 (2020): 2039. http://dx.doi.org/10.3390/s20072039.

Full text
Abstract:
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high performance and prevents timing attack and simple power analysis. In particular, we presented combined Look-Up Table (LUT)-based fast reduction techniques in a regular fashion. This novel approach only requires two times of LUT access to perform the whole modular reduction routine. The implementation is carefully written in assembly language, wh
APA, Harvard, Vancouver, ISO, and other styles
29

Farah Tawfiq Abdul Hussien and Teaba Wala Aldeen Khairi. "Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption." International Journal of Interactive Mobile Technologies (iJIM) 17, no. 10 (2023): 193–211. http://dx.doi.org/10.3991/ijim.v17i10.38787.

Full text
Abstract:
I
 n these days of technology, the usage of images has become increasingly high especially now that almost everyone has access to internet. Also, image helps us to learn, grabs our attention, explains complicated concepts as well as inspires us. Sharing these images is essential and therefore image encryption algorithms are proposed to secure the transmission of these image from many types of attacks such as Man-in-the-middle attack (MITM). In this paper, we proposed a hybrid security system that consist of Elliptic Curve Cryptography (ECC) and Advanced Encryption System (AES). Where ECC
APA, Harvard, Vancouver, ISO, and other styles
30

Tabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.

Full text
Abstract:
The aim of this paper is to survey , analyze and evolution wireless security in IEEE 802.11 standards at the physical layer levels, to hold a fair comparison among the different WLAN security algorithms, and theoretical background of cryptography, and survey implementation Advanced Encryption Standard Algorithm (AES) -128, AES-192 and AES-256 using matlab7.
APA, Harvard, Vancouver, ISO, and other styles
31

Ugwunna, Charles Okechukwu, P. E. Okimba, O. A. Alabi, E. E. Orji, E. O. Olowofeso, and S. O. Ayomide. "ADVANCED ENCRYPTION STANDARD (AES) IMPLEMENTATION EFFICIENCY USING JAVA AND NODE.JS PLATFORMS." FUDMA JOURNAL OF SCIENCES 8, no. 6 (2024): 42–49. https://doi.org/10.33003/fjs-2024-0806-2832.

Full text
Abstract:
The rapid advancement of communication technologies, such as satellite networks, mobile, internet, and terrestrial communications, has created an urgent need to protect sensitive data from potential attacks. This is particularly crucial as photos transmitted through unreliable channels may contain sensitive or confidential information. This study evaluates the effectiveness of the Advanced Encryption Standard (AES) algorithm implemented in Java and Node.js, focusing on their performance in data encryption and decryption. The research employs AES in Cipher Block Chaining (CBC) mode, using 128-b
APA, Harvard, Vancouver, ISO, and other styles
32

Adlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.

Full text
Abstract:
Abstract - Security is an action to prevent the occurrence of dangers, threats, and attacks, especially the security of cryptocurrency storage assets on the smartphone crypto mobile wallet application. Security is important to protect wallet data from asset theft attacks. The results of the observations made by many users store their wallet recovery words (mnemonic phrases) on cloud services such as Google Drive and One Drive, this is very vulnerable to data hacking if the account has been compromised then hackers take valuable data for their own benefit. Computer scientists created a cryptogr
APA, Harvard, Vancouver, ISO, and other styles
33

Nugrahantoro, Achmad, Abdul Fadlil, and Imam Riadi. "Optimasi Keamanan Informasi Menggunakan Algoritma Advanced Encryption Standard (AES) Mode Chiper Block Chaining (CBC)." Jurnal Ilmiah FIFO 12, no. 1 (2020): 12. http://dx.doi.org/10.22441/fifo.2020.v12i1.002.

Full text
Abstract:
Information comes from a collection of data obtained from various sources that have been processed. An information can help in decision making, so it is considered to have a high effectiveness value for the recipient of the information. Information exchange that utilizes public media internet services is widely used, so the validity of information must be done security from unauthorized attacks. One of them uses cryptography. AES is a method used by the National Institute of Standards and Technology (NIST) as a standard for the United States Federal encryption algorithm. Creativity in cryptogr
APA, Harvard, Vancouver, ISO, and other styles
34

Ahmad Halimi, Abu Tholib, and Moh. Ainol Yaqin. "OPTIMASI KEAMANAN DATA PENERIMAAN MAHASISWA MENGGUNAKAN AES-256, SHA-256, DAN BASE64." JUSTIFY : Jurnal Sistem Informasi Ibrahimy 3, no. 1 (2024): 38–45. http://dx.doi.org/10.35316/justify.v3i1.5107.

Full text
Abstract:
Di era teknologi informasi saat yang luar biasa berkembang menjadi prioritas keamanan data terutama proses penerimaan mahasiswa baru (PMB) di perguruan tinggi. Proses ini melibatkan pengumpulan data pribadi sensitif dari ribuan calon mahasiswa setiap tahun. Untuk melindungi data ini, penelitian ini menerapkan metode enkripsi Advanced Encryption Standard (AES) 256-bit, Secure Hash Algorithm 256 (SHA-256), dan Base64. AES-256-CBC dikenal efektif dalam menjaga keamanan data dengan tingkat keamanan yang tinggi. SHA-256 meningkatkan keamanan lebih lanjut dengan menghasilkan hash unik yang memverifi
APA, Harvard, Vancouver, ISO, and other styles
35

Hussien, Marwah K. "Encryption of Stereo Images after Compression by Advanced Encryption Standard (AES)." Al-Mustansiriyah Journal of Science 28, no. 2 (2018): 156. http://dx.doi.org/10.23851/mjs.v28i2.511.

Full text
Abstract:
New partial encryption schemes are proposed, in which a secure encryption algorithm is used to encrypt only part of the compressed data. Partial encryption applied after application of image compression algorithm. Only 0.0244%-25% of the original data isencrypted for two pairs of dif-ferent grayscale imageswiththe size (256 ´ 256) pixels. As a result, we see a significant reduction of time in the stage of encryption and decryption. In the compression step, the Orthogonal Search Algorithm (OSA) for motion estimation (the dif-ferent between stereo images) is used. The resulting disparity vector
APA, Harvard, Vancouver, ISO, and other styles
36

Le, Van-Hoan, Nhu-Quynh Luc, and Duc-Huy Quach. "Developing a secure voice recognition service on Raspberry Pi." Bulletin of Electrical Engineering and Informatics 13, no. 5 (2024): 3544–51. http://dx.doi.org/10.11591/eei.v13i5.7655.

Full text
Abstract:
In this study, we present a novel voice recognition service developed on the Raspberry Pi 4 model B platform, leveraging the fast Fourier transform (FFT) for efficient speech-to-digital signal conversion. By integrating the hidden Markov model (HMM) and artificial neural network (ANN), our system accurately reconstructs speech input. We further fortify this service with dual-layer encryption using the Rivest–Shamir–Adleman (RSA) and advanced encryption standard (AES) methods, achieving encryption and decryption times well suited for real-time applications. Our results demonstrate the system's
APA, Harvard, Vancouver, ISO, and other styles
37

M, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.

Full text
Abstract:
Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by
APA, Harvard, Vancouver, ISO, and other styles
38

Swati, Jadhav, and Pise Nitin. "Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework." Cybernetics and Information Technologies 24, no. 2 (2024): 16–31. http://dx.doi.org/10.2478/cait-2024-0013.

Full text
Abstract:
Abstract The evolution of decentralized storage, propelled by blockchain advancements, has revolutionized data management. This paper focuses on content security in the InterPlanetary File System (IPFS), a leading decentralized storage network lacking inherent content encryption. To address this vulnerability, we propose a novel hybrid cryptographic algorithm, merging AES 128-bit encryption with Elliptic Curve Cryptography (ECC) key generation. The algorithm includes ECC key pairs, random IV generation, and content/AES key encryption using ECC public keys. Benchmarking against standard AES 256
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.

Full text
Abstract:
In order to effectively solve the increasingly prominent network security problems, cryptographic algorithm is the key factor affecting the effectiveness of IPSec VPN encryption. Therefore, this paper mainly studies cryptographic algorithms and puts forward the following solutions: briefly analyze the concept and function of IPSec VPN, as well as the basic theoretical knowledge of IPSec Security Protocol and cryptography, and analyze the traditional cryptography, modern cryptography, symmetric cryptographic algorithms and asymmetric algorithms, and their security. At the same time, the executa
APA, Harvard, Vancouver, ISO, and other styles
40

Nirwan, Saepudin, Dini Hamidin, and Shifa Eldita Azzalea. "Implementation of AES-256 Algorithm for Encryption on Chatting Platforms." Internet of Things and Artificial Intelligence Journal 4, no. 4 (2024): 616–24. http://dx.doi.org/10.31763/iota.v4i4.804.

Full text
Abstract:
This research aims to design and build a web-based corporate chat media using prototype methodology and AES (Advanced et al.) algorithm for data encryption. The platform has been developed with MERN technology (MongoDB et al.), which allows the application to be dynamic and responsive. Prototype methodology is used for iterative development based on user feedback, ensuring the application meets user needs. The AES algorithm is applied to maintain the confidentiality and security of each message sent and received. The results show that the application effectively provides efficient and secure c
APA, Harvard, Vancouver, ISO, and other styles
41

Vetrivel, K., and S. P. Shantharajah. "A Study of Distinguisher Attack on AES-128 and AES-256 Block Ciphers through Model Based Classification Using Neural Network." Applied Mechanics and Materials 710 (January 2015): 133–38. http://dx.doi.org/10.4028/www.scientific.net/amm.710.133.

Full text
Abstract:
Modern encryption algorithms will focus on transforming rendered text block into a non-rendered block of symbols. The objective is to make the cipher block more non-interpretable. Distinguisher attack algorithm is used to distinguish cipher text from random permutation and other related algorithms. Currently, a cipher has been design to concentrate on distinguisher attack. In this research work, we have attempted to distinguish the cipher blocks of AES-128 (Advanced Encryption Standard) and AES-256 symmetric block cipher algorithms using an artificial neural network based classifier.
APA, Harvard, Vancouver, ISO, and other styles
42

Baban, Alaa, and Safa Hameed. "Securing a Web-Based Hospital Management System Using a Combination of AES and HMAC." Iraqi Journal for Electrical and Electronic Engineering 19, no. 1 (2023): 93–99. http://dx.doi.org/10.37917/ijeee.19.1.12.

Full text
Abstract:
The demand for a secured web storage system is increasing daily for its reliability which ensures data privacy and confidentiality. The proposed paper aims to find the most secure ways to maintain integrity and protect privacy and security in healthcare management systems. The Advanced Encryption Standard (AES) algorithm is used to encrypt data transferred by providing a means to check the integrity of information transmitted and make it more immune to cyberattack techniques, this was implemented by using Keyed-Hash Message Authentication Code (HMAC) and Secured Hash Algorithm-256 (SHA-256). T
APA, Harvard, Vancouver, ISO, and other styles
43

Prajuhana Putra, Agung, Herfina Herfina, Sufiatul Maryana, and Andrian Setiawan. "IMPLEMENTASI ALGORITMA AES (ADVANCE ENCRYPTION STANDARD) RIJNDAEL PADA APLIKASI KEAMANAN DATA." JIPETIK:Jurnal Ilmiah Penelitian Teknologi Informasi & Komputer 1, no. 2 (2020): 46–51. http://dx.doi.org/10.26877/jipetik.v1i2.4599.

Full text
Abstract:
AES Rijndael algorithm is a modern cryptographic algorithm published by NIST (National Institute of Standards and Technology) in 2001 using block cipher mode and using symmetric keys. AES Rijndael as a substitute for DES (Data Encryption Standard) algorithm whose use began in 1977 and has ended. The length of the block cipher used is 128 bits and variations in key length are 128 bits, 192 bits and 256 bits. AES Rijndael's algorithm has a reliability that is the simplicity of the bytes transformation process so that it can streamline encryption and decryption, and has high security.Implementati
APA, Harvard, Vancouver, ISO, and other styles
44

Singh, Sukhwinderjit, Hadian Satria Utama, and Joni Fat. "CHAT SIMULATOR USING AES ENCRYPTION." International Journal of Application on Sciences, Technology and Engineering 1, no. 3 (2023): 931–40. http://dx.doi.org/10.24912/ijaste.v1.i3.931-940.

Full text
Abstract:
Smartphones have become an integral part the lives of individuals and their priorities The present moment. The most visible uses are to chat and chat programs Most of these apps do does not provide the necessary protection and privacy information exchanged between users. Chat apps have become one of the most important and popular smartphone apps. It has the ability to exchange text messages, images and files that can freely communicate with each other. All messages must be protected and in this paper the encryption to used for secure all messages is by using AES encryption. AES (Advanced Encry
APA, Harvard, Vancouver, ISO, and other styles
45

Hussain, Iqtadar, Amir Anees, Temadher Al-Maadeed, and Muhammad Mustafa. "Construction of S-Box Based on Chaotic Map and Algebraic Structures." Symmetry 11, no. 3 (2019): 351. http://dx.doi.org/10.3390/sym11030351.

Full text
Abstract:
The Advanced Encryption Standard (AES) is widely used in different kinds of security applications. The substitution box (S-box) is the main component of many modern symmetric encryption ciphers that provides confusion between the secret key and ciphertext. The S-box component that is used in AES is fixed. If we construct this component dynamically, the encryption strength of AES would be greater than before. In this manuscript, we used chaotic logistic map, Mobius transformation and symmetric group S 256 to construct S-box for AES. The idea behind the proposed work is to make supplementary saf
APA, Harvard, Vancouver, ISO, and other styles
46

Ayu, Tasya Diah, and Yuli Asriningtias. "Aplikasi Pengamanan Dokumen Digital Perusahaan Berbasis Android Menggunakan Algoritma AES-256." Jurnal Sistem dan Teknologi Informasi (JustIN) 12, no. 1 (2024): 143. http://dx.doi.org/10.26418/justin.v12i1.71449.

Full text
Abstract:
Advanced Encryption Standard (AES) merupakan algoritma kriptografi yang dapat digunakan untuk mengamankan data. Algoritma Advanced Encryption Standard (AES) adalah blok chipertext simetrik yang dapat mengenkripsi (encipher) dan dekripsi (decipher) informasi. Teknik pengumpulan data merupakan langkah yang paling strategis dalam sebuah penelitian. Dengan menggunakan teknik pengumpulan data yang benar maka peneliti akan mendapatkan data-data yang memenuhi standar, maka dilakukan teknik pengumpulan data yaitu, studi dokumen. Penelitian ini menghasilkan sebuah sistem aplikasi android untuk pengaman
APA, Harvard, Vancouver, ISO, and other styles
47

V. Kinge, Pravin, S. J. Honale, and C. M. Bobade. "Design of AES Algorithm for 128/192/256 Key Length in FPGA." International Journal of Reconfigurable and Embedded Systems (IJRES) 3, no. 2 (2014): 49. http://dx.doi.org/10.11591/ijres.v3.i2.pp49-53.

Full text
Abstract:
<p class="p0">The cryptographic algorithms can be implemented with software or built with pure hardware. However Field Programmable Gate Arrays (FPGA) implementation offers quicker solution and can be easily upgraded to incorporate any protocol changes. The available AES algorithm is used for data and it is also suitable for image encryption and decryption to protect the confidential image from an unauthorized access. This project proposes a method in which the image data is an input to AES algorithm, to obtain the encrypted image. and the encrypted image is the input to AES Decryption t
APA, Harvard, Vancouver, ISO, and other styles
48

Chothe, Rupaliben V., Sunita P. Ugale, Dinesh M. Chandwadkar, and Shraddha V. Shelke. "Authenticated image encryption using robust chaotic maps and enhanced advanced encryption standard." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 3 (2025): 1543. https://doi.org/10.11591/ijeecs.v37.i3.pp1543-1554.

Full text
Abstract:
The ability of advanced encryption standard (AES) algorithm to protect information systems has given cryptography a new dimension. Recent encryption approaches to enhance randomness include the use of chaotic algorithms, which provide resistance to differential attacks. We have proposed the application of robust chaotic maps in the block cipher to design a secure authenticated encryption scheme to get advantages of both. The chaotic sequence is generated using hyperbolic tangent map and added to input image initially to increase randomness. The basic 256-bit AES key is generated using the robu
APA, Harvard, Vancouver, ISO, and other styles
49

Rupaliben, V. Chothe Sunita P. Ugale Dinesh M. Chandwadkar Shraddha V. Shelke. "Authenticated image encryption using robust chaotic maps and enhanced advanced encryption standard." Indonesian Journal of Electrical Engineering and Computer Science 37, no. 3 (2025): 1543–54. https://doi.org/10.11591/ijeecs.v37.i3.pp1543-1554.

Full text
Abstract:
The ability of advanced encryption standard (AES) algorithm to protect information systems has given cryptography a new dimension. Recent encryption approaches to enhance randomness include the use of chaotic algorithms, which provide resistance to differential attacks. We have proposed the application of robust chaotic maps in the block cipher to design a secure authenticated encryption scheme to get advantages of both. The chaotic sequence is generated using hyperbolic tangent map and added to input image initially to increase randomness. The basic 256-bit AES key is generated using the robu
APA, Harvard, Vancouver, ISO, and other styles
50

Baydaa Jaffer Al-Khafaji and Abdul Monem S Rahma. "Proposed new modification of AES algorithm for data security." Global Journal of Engineering and Technology Advances 12, no. 3 (2022): 117–22. http://dx.doi.org/10.30574/gjeta.2022.12.3.0165.

Full text
Abstract:
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as cipher text. Ideally, only authorized parties can decipher a cipher text back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. AES is based on a design principle known as a substitution–permutation network, and is efficient in both software and hardware. Unlike its predecessor DES, AES does not
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!