To see the other types of publications on this topic, follow the link: AES CRYPTOGRAPHY.

Journal articles on the topic 'AES CRYPTOGRAPHY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'AES CRYPTOGRAPHY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.

Full text
Abstract:
In order to effectively solve the increasingly prominent network security problems, cryptographic algorithm is the key factor affecting the effectiveness of IPSec VPN encryption. Therefore, this paper mainly studies cryptographic algorithms and puts forward the following solutions: briefly analyze the concept and function of IPSec VPN, as well as the basic theoretical knowledge of IPSec Security Protocol and cryptography, and analyze the traditional cryptography, modern cryptography, symmetric cryptographic algorithms and asymmetric algorithms, and their security. At the same time, the executa
APA, Harvard, Vancouver, ISO, and other styles
2

Raut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.

Full text
Abstract:
Abstract: The internet has revolutionized advancements, it’s conveniences and uses come at the price of new perils. To be safe from being the victim of fraud, theft and other damage security and vigilance is critical. Cryptography plays an important role in securing information and communications using a set of rules, it ensures the integrity of our data. It maintains confidentiality by protecting the privacy of personal information stored in enterprise systems. Hence Encryption is the only way to ensure that your information remains secure while it is stored and being transmitted. Cryptograph
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Xing, Qiang Zhang, and Xiao Peng Wei. "A New Encryption Method Based on Rijndael Algorithm and DNA Computing." Applied Mechanics and Materials 20-23 (January 2010): 1241–46. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.1241.

Full text
Abstract:
AES is one of the most widely used cryptographic systems. DNA computing has the high efficiency to solve some NP-problems. Therefore many scientists try to combine DNA computing with cryptography. In this paper, an algorithm is designed to simulate a plaintext encrypted by DNA biotechnology and modern cryptography. After mapping the plaintext information as DNA chain and handling the base chain with biological genetic technology, we can get the gene codes form, then using the Rijndael algorithm to deal with the biological chain with cryptography and get the final result. It makes the DNA-based
APA, Harvard, Vancouver, ISO, and other styles
4

Dhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.

Full text
Abstract:
Now a day‟s the uses of devices such as computer, mobile and many more other device for communication as well as for data storage and transmission has increases. As a result there is increase in no of user‟s also there is increase in no of unauthorized user‟s which are trying to access a data by unfair means. This arises the problem of data security. To solve this problem a data is stored or transmitted in the encrypted format. This encrypted data is unreadable to the unauthorized user. Cryptography is a science of information security which secures the data while the data is being transmitted
APA, Harvard, Vancouver, ISO, and other styles
5

Ahamad, Md Martuza, and Md Ibrahim Abdullah. "Comparison of Encryption Algorithms for Multimedia." Rajshahi University Journal of Science and Engineering 44 (November 19, 2016): 131–39. http://dx.doi.org/10.3329/rujse.v44i0.30398.

Full text
Abstract:
Cryptographic techniques play crucial role when users exchange information. Multimedia plays an important role in learning and sharing experiences. When multimedia contents are shared among the users, it faces security threats. Usually multimedia contents takes much space. Encryption technique should be time efficient. In this work we consider four encryption techniques: Blowfish, AES, XOR and RSA and four types of media content: text, image, audio and video. Simulation shows that AES is time efficient than others. Comparing between symmetric and asymmetric cryptography, symmetric cryptographi
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.

Full text
Abstract:
In many applications, secure communication and data privacy are crucially supported by cryptography. The study of cryptography is now essential for creating strong and dependable security systems due to the growing risks to sensitive information in the digital era. The fundamentals of cryptography, its guiding principles, and its useful applications in securing communication channels and preserving data privacy are explored in this research article.Beginning with symmetric and asymmetric encryption techniques, the inquiry first looks at the fundamental ideas of encryption and decryption. It ex
APA, Harvard, Vancouver, ISO, and other styles
7

B S, Aditya, and Sharadadevi Kaganurmath. "Use of Cryptography and Signing for Network Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 4080–83. http://dx.doi.org/10.22214/ijraset.2022.45926.

Full text
Abstract:
Abstract: With technological advancements along with tremendous generation and storage of sensitive data, which can be cryptographic keys, passwords or other data that can be crucial for operation of an organization, thereis a need to secure this sensitive data startingfrom its creation, its transfer from one place to another and its final place of storage. Thiscan be done with the help of cryptography and cryptographic algorithms that can help secure this entire process. With cryptography, it is possible to securely transfer sensitive data to ensure that it cannot be read or tampered by a thi
APA, Harvard, Vancouver, ISO, and other styles
8

Arifianto, Sofyan, Shinta Permatasari, and Aminudin Aminudin. "Modifikasi enkripsi dan dekripsi AES menggunakan polybius chiper dalam pengamanan data." Jurnal Repositor 1, no. 2 (2019): 117. http://dx.doi.org/10.22219/repositor.v1i2.808.

Full text
Abstract:
Data is a file that can be confidential so it requires a data security process to maintain confidentiality. Kripotgrrafi is a data security process that can be used based on the use of algorithms, one of which is AES. AES is a modern algorithm that can be modified to improve confusion and diffusion in cryptography. AES combination can be done using Polybius which has cryptographic diffusion properties. This study modified the AES using 6x6 and 10x10 polybius matrices that were performed on plaintext and plaintext and keys. Analysis was carried out based on the highest bit change rate found in
APA, Harvard, Vancouver, ISO, and other styles
9

Kurbet, ejashwini C., and Jenitta J. "NANO-AES Security Algorithm for Image Cryptography." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 742–46. http://dx.doi.org/10.22214/ijraset.2023.55238.

Full text
Abstract:
Abstract: Data transmission security is now essential in any wireless communication. The fundamental problem in wireless communication is ensuring the security of data transfer from source to destination through data encryption and decryption. We give a literature review on the security of the encryption AES method and its contemporary applications in communication, data transfer, and wireless communication in this study. To provide security, we employ the Advanced Encryption Standard (AES), which works with 128-bit data and encrypts it with 128-bit keys. In this paper, we will conduct a liter
APA, Harvard, Vancouver, ISO, and other styles
10

Tahir, Ari Shawkat. "A Modified Advanced Encryption Standard Algorithm for Image Encryption." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 11 (2015): 6258–67. http://dx.doi.org/10.24297/ijct.v14i11.1811.

Full text
Abstract:
Cryptography algorithms are becoming more necessary to ensure secure data transmission, which can be used in several applications. Increasing use of images in industrial process therefore it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well- known block cipher that has many benefits in data encryption process. In this paper, proposed some modification to the Advanced Encryption Standard (M-AES) to increase and reaching high level security and enhance image encryption. The modification is done by modifying the ShiftRow Tr
APA, Harvard, Vancouver, ISO, and other styles
11

Shah, Aayush, Prabhat Mahato, and Aadarsh Bhagat. "Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1626–42. http://dx.doi.org/10.22214/ijraset.2023.55341.

Full text
Abstract:
Abstract: This research paper surveys the landscape of cryptography, encompassing historical origins and modern applications. Beginning with foundational concepts, it explores encryption, decryption, ciphers, and keys, spanning symmetric and asymmetric cryptography. Historical context unfolds, tracing cryptography from ancient Egyptian hieroglyphs to Julius Caesar's cipher. The study then transitions to contemporary subjects. Elliptic Curves and Cryptography are investigated, showcasing their significance in secure communication, demonstrating ECC key exchange and AES-GCM encryption using pyth
APA, Harvard, Vancouver, ISO, and other styles
12

Satapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.

Full text
Abstract:
Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vita
APA, Harvard, Vancouver, ISO, and other styles
13

Mustika, Laila. "Implementasi Algoritma AES Untuk Pengamanan Login Dan Data Customer Pada E-Commerce Berbasis Web." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (2020): 148. http://dx.doi.org/10.30865/jurikom.v7i1.1943.

Full text
Abstract:
In the field of E-Commerce website security is very necessary considering that many cyber crimes target commercial websites. Some that need to be secured are logins, because logins are confidential and important to access a website that has account access rights. In addition, customer data also needs to be secured data from people who do not have access rights, to prevent and avoid data changes and destruction. If customer data is known by parties who do not have access rights, the data can be misused and can lead to fraud cases. Therefore an algorithm is needed to secure the website. One of t
APA, Harvard, Vancouver, ISO, and other styles
14

Verma, Rohit, and Aman Kumar Sharma. "Cryptography: Avalanche effect of AES and RSA." International Journal of Scientific and Research Publications (IJSRP) 10, no. 4 (2020): p10013. http://dx.doi.org/10.29322/ijsrp.10.04.2020.p10013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Allakany, Alaa, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem, and Haitham Elwahsh. "Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication." Sensors 23, no. 12 (2023): 5703. http://dx.doi.org/10.3390/s23125703.

Full text
Abstract:
The latest version of ZigBee offers improvements in various aspects, including its low power consumption, flexibility, and cost-effective deployment. However, the challenges persist, as the upgraded protocol continues to suffer from a wide range of security weaknesses. Constrained wireless sensor network devices cannot use standard security protocols such as asymmetric cryptography mechanisms, which are resource-intensive and unsuitable for wireless sensor networks. ZigBee uses the Advanced Encryption Standard (AES), which is the best recommended symmetric key block cipher for securing data of
APA, Harvard, Vancouver, ISO, and other styles
16

Sweatha, A. Anjalin, and K. Mohaideen Pitchai. "Construction of Cryptographically Secure AES S-Box using Second-order Reversible Cellular Automata." Journal of Intelligent & Fuzzy Systems 39, no. 3 (2020): 4313–18. http://dx.doi.org/10.3233/jifs-200326.

Full text
Abstract:
In cryptography the block ciphers are the mostly used symmetric algorithms. In the existing system the standard S-Box of Advanced Encryption Standard(AES) is performed using the irreducible polynomial equation in table form known as look-up tables(LUTs). For more security purposes, second-order reversible cellular automata based S-box is created. The security aspects of the S-Box used in the AES algorithm are evaluated using cryptographic properties like Strict Avalanche Criteria, Non-Linearity, Entropy, and Common Immunity Bias. The design of S-Box using second-order reversible Cellular Autom
APA, Harvard, Vancouver, ISO, and other styles
17

O. O, Rejuaro, Adetunji A. B., Adedeji F., Falohun A. S., Iromini N. A., and Adebajo O. O. "Development of an Improved Access Control System using an Enhanced Bimodal Crypto-Biometric System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 752–68. http://dx.doi.org/10.22214/ijraset.2023.49548.

Full text
Abstract:
Abstract: Recently, biometric was being integrated with cryptography (crypto-biometric system) to alleviate the limitations of the biometric or cryptography system. However, the main shortcoming of cryptography is poorly-chosen or forgotten password while challenges with biometrics include interclass similarities in the feature sets used to represent traits. In this work, a combination of cryptography and bimodal biometric was developed, an Advanced Encryption Standard based Fast Fourier Transform (AES-FFT) was developed and used as the cryptography technique. Hence, an attempt was made to dev
APA, Harvard, Vancouver, ISO, and other styles
18

Olaniyan, Olatayo Moses, Ayobami Taiwo Olusesi, Bolaji Abigail Omodunbi, Wajeed Bolanle Wahab, Olusogo Julius Adetunji, and Bamidele Musiliu Olukoya. "A Data Security Model for Mobile Ad Hoc Network Using Linear Function Mayfly Advanced Encryption Standard." International Journal of Emerging Technology and Advanced Engineering 13, no. 3 (2023): 101–10. http://dx.doi.org/10.46338/ijetae0323_10.

Full text
Abstract:
Mobile Ad Hoc network (MANET) is a connection of mobile nodes that are joined together to communicate and share information using a wireless link.Some of the MANET in use include mobile smart phones, laptops, personal digital assistant (PDAs), among others.However, MANET has been known for the major challenge of being vulnerable to malicious attacks within the network. One of the techniques which have been used by several research works is the cryptographic approach using advanced encryption technique (AES). AES has been found suitable in the MANET domain because it does not take much space in
APA, Harvard, Vancouver, ISO, and other styles
19

Mohammad, Hussein M., and Alharith A. Abdullah. "Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices." TELKOMNIKA (Telecommunication Computing Electronics and Control) 20, no. 3 (2022): 551. http://dx.doi.org/10.12928/telkomnika.v20i3.23297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Et. al., Arsha Kolate,. "An Information Security Using DNA Cryptography along with AES Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (2021): 183–92. http://dx.doi.org/10.17762/turcomat.v12i1s.1607.

Full text
Abstract:
Securing information is the most important need of not only the business world but also it’s highly essential in all the other major sectors. The secured data storage capacity along with security during data transit is also an important factor. In this paper DNA based security technique is proposed as an information carrier, the new data securing method can be adopted by harnessing the advantages of DNA based AES. This technique will provide multilayer security. The proposed system aims to secure transactional data during communication as it is required when message or data transfer between se
APA, Harvard, Vancouver, ISO, and other styles
21

Yan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.

Full text
Abstract:
The theory and technology of cryptography including the block cipher, stream cipher and public-key cryptosystem. The usual cryptographic algorithms, such as DES, RSA, AES and message digest algorithms are discussed. Basing on these studies, a design of secure communication is presented. It combines the data encryption with the authentication, can be applied to principal and subordinate system. It can provide a reliable protection for the secure communications for embedded devices. Finally, the core source code is shown.
APA, Harvard, Vancouver, ISO, and other styles
22

T, Ramya, Ramya G, Karthik Raju, Ravi J, and Deepak Verma. "An Efficient AES Algorithm for Cryptography Using VLSI." ECS Transactions 107, no. 1 (2022): 5605–12. http://dx.doi.org/10.1149/10701.5605ecst.

Full text
Abstract:
In today's data exchange framework, information security is the most important consideration. Encryption is a key component of Information security and is used extensively. Encryption techniques are used by all sorts of organisations to protect sensitive data. An technique known as Data Encryption Standard (DES), which uses the same key for both encryption and decryption at the same time, was the first to be employed. That algorithm's key drawback is that it is readily hacked and vulnerable to attacks. Compared to DES and Triple DES, the calculations require enormous memory space and cannot be
APA, Harvard, Vancouver, ISO, and other styles
23

Vijayarajan, R., P. Gnanasivam, and R. Avudaiammal. "Bio-Key Based AES for Personalized Image Cryptography." Computer Journal 62, no. 11 (2019): 1695–705. http://dx.doi.org/10.1093/comjnl/bxz030.

Full text
Abstract:
Abstract In the era of multimedia technologies and rapidly growing multimedia contents, secured information transfer needs to be ensured through robust cryptography techniques. This paper presents a bio-key-generation scheme in the local environment to transfer multimedia content over vulnerable networks. To encrypt the images, one user has to ensure his/her authentication and further needs to provide a secret key for bio-key generation. Secret key aids to fetch biometric features for key formation and key expansion. Thus, the user receives an expanded key from the template database to perform
APA, Harvard, Vancouver, ISO, and other styles
24

Singh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.

Full text
Abstract:
Cryptography is about protecting the data from third parties or from public to read confidential data. Cryptography mainly focuses on encrypting the data or we can say converting the data and decrypting the actual data or we can say reconverting the data by different methods. These encryption and decryption methods are based on mathematical theories and are implemented by computer science practices. But as cryptography progressed ways were found to decode the secured data and view actual data. This was also done by the use of mathematical theories and computer science practices. Popular algori
APA, Harvard, Vancouver, ISO, and other styles
25

Singhal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.

Full text
Abstract:
Abstract: There has been an explosion in data since last two decades and this explosion of data is due to high rates of data conversion and better internet services worldwide [21]. All the conventional methods of data handling have been replaced by much more sophisticated means. One of the typical shifts of the emerging information society is that information is becoming a crucial if not the most vital source. Information contrasts profoundly from further resources; for example and it can be imitative without cost, it can be erased without leaving traces. [22] Protecting the new resource infor
APA, Harvard, Vancouver, ISO, and other styles
26

Tabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.

Full text
Abstract:
The aim of this paper is to survey , analyze and evolution wireless security in IEEE 802.11 standards at the physical layer levels, to hold a fair comparison among the different WLAN security algorithms, and theoretical background of cryptography, and survey implementation Advanced Encryption Standard Algorithm (AES) -128, AES-192 and AES-256 using matlab7.
APA, Harvard, Vancouver, ISO, and other styles
27

Chang, Lipeng, Yuechuan Wei, Xiangru Wang, and Xiaozhong Pan. "Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing." Symmetry 14, no. 7 (2022): 1434. http://dx.doi.org/10.3390/sym14071434.

Full text
Abstract:
In recent years, some general cryptographic technologies have been widely used in network platforms related to the national economy and people’s livelihood, effectively curbing network security risks and maintaining the orderly operation and normal order of society. However, due to the fast development and considerable benefits of quantum computing, the classical cryptosystem faces serious security threats, so it is crucial to analyze and assess the anti-quantum computing ability of cryptographic algorithms under the quantum security model, to enhance or perfect the design defects of related a
APA, Harvard, Vancouver, ISO, and other styles
28

Bagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.

Full text
Abstract:
In modern computing systems data security is of paramount importance. The data transfer must be made secure because it can be significantly sensitive for any organization involved. This paper expounds a SOC architecture to facilitate end to end secure data exchange for applications involving short communication intervals. This SOC has been designed to behave as a co-processor which along with a standard general-purpose processor would serve as a cryptosystem. The SOC employs two famous algorithms – RSA and AES for cryptography. In contrast to usual single key cryptographic systems, this paper
APA, Harvard, Vancouver, ISO, and other styles
29

Chowdhary, Chiranji Lal, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, and Muhammad Fazal Ijaz. "Analytical Study of Hybrid Techniques for Image Encryption and Decryption." Sensors 20, no. 18 (2020): 5162. http://dx.doi.org/10.3390/s20185162.

Full text
Abstract:
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption ti
APA, Harvard, Vancouver, ISO, and other styles
30

Shukla, Piyush Kumar, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, and Sajjad Shaukat Jamal. "AES Based White Box Cryptography in Digital Signature Verification." Sensors 22, no. 23 (2022): 9444. http://dx.doi.org/10.3390/s22239444.

Full text
Abstract:
According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Juan. "A Symmetric Cryptography Algorithm in Wireless Sensor Network Security." International Journal of Online Engineering (iJOE) 13, no. 11 (2017): 102. http://dx.doi.org/10.3991/ijoe.v13i11.7752.

Full text
Abstract:
<span style="color: black; font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: 宋体; mso-themecolor: text1; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to study the symmetric cryptography algorithm, which plays an essential role in ensuring the information security, AES (Advanced Encryption Standard) basic theory is discussed, and AES protocol processor for a small area based on wireless sensor network is designed. In addition, an iterative encryption and decryption AES structure is designed to achieve
APA, Harvard, Vancouver, ISO, and other styles
32

Oukili, Soufiane, and Seddik Bri. "Hardware Implementation of AES Algorithm with Logic S-box." Journal of Circuits, Systems and Computers 26, no. 09 (2017): 1750141. http://dx.doi.org/10.1142/s0218126617501419.

Full text
Abstract:
Cryptography has an important role in data security against known attacks and decreases or limits the risks of hacking information, especially with rapid growth in communication techniques. In the recent years, we have noticed an increasing requirement to implement cryptographic algorithms in fast rising high-speed network applications. In this paper, we present high throughput efficient hardware implementations of Advanced Encryption Standard (AES) cryptographic algorithm. We have adopted pipeline technique in order to increase the speed and the maximum operating frequency. Therefore, registe
APA, Harvard, Vancouver, ISO, and other styles
33

Et. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.

Full text
Abstract:
Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide c
APA, Harvard, Vancouver, ISO, and other styles
34

Az, Maulyanda, Syafrial Fachri Pane, and Rolly Maulana Awangga. "Cryptography: Cryptography: Perancangan Middleware Web Service Encryptor menggunakan Triple Key MD5. Base64, dan AES." Jurnal Tekno Insentif 15, no. 2 (2021): 65–75. http://dx.doi.org/10.36787/jti.v15i1.497.

Full text
Abstract:
Abstrak
 Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode kriptografi digunakan untuk mempersatukan algoritma Md5, Base64 serta AES (Advanced Encryption Standard). Kombinasi dari tiga algoritma menghasilkan ciphertext, yang dapat mengamankan data dari proses tag NFC. Penelitian ini menggunakan metodologi penelitian yang dapat menyatakan bahwa sistem yang dibangun dapat berfungsi dengan
APA, Harvard, Vancouver, ISO, and other styles
35

Gayathri, P., Syed Umar, G. Sridevi, N. Bashwanth, and Royyuru Srikanth. "Hybrid Cryptography for Random-key Generation based on ECC Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 3 (2017): 1293. http://dx.doi.org/10.11591/ijece.v7i3.pp1293-1298.

Full text
Abstract:
As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data. Many researchers have developed many complex algorithms to maintain security in user’s application. Among those one of the best algorithms are cryptography based, in which user will be safe side mostly from the attackers. We already had some AES algorithm which uses very complex cryptographic algorithm to increase the performance and more usage of lookup tables. So the cache timing attackers will correlates the de
APA, Harvard, Vancouver, ISO, and other styles
36

Kumar, Thanikodi Manoj, Kasarla Satish Reddy, Stefano Rinaldi, Bidare Divakarachari Parameshachari, and Kavitha Arunachalam. "A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application." Electronics 10, no. 16 (2021): 2023. http://dx.doi.org/10.3390/electronics10162023.

Full text
Abstract:
Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes. This research article details the low power high-speed hardware architectures for the efficient field programmable gate array (FPGA) implementation of the advanced encryption standard (AES) algorithm to provide data security. This work does not depend on the Look-Up Table (LUTs) for the implementation the SubBytes and InvSubBytes stages of transformat
APA, Harvard, Vancouver, ISO, and other styles
37

M, Santhanalakshmi, Ms Lakshana K, and Ms Shahitya G M. "Enhanced AES-256 cipher round algorithm for IoT applications." Scientific Temper 14, no. 01 (2023): 184–90. http://dx.doi.org/10.58414/scientifictemper.2023.14.1.22.

Full text
Abstract:
Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by
APA, Harvard, Vancouver, ISO, and other styles
38

Fazila, S., B. Reddaiah, S. Sai Ramya, B. J. Karuna Sagar, and C. Swetha. "Enhancing AES with Key Dependent S-Box and Transpose MDS Matrix." International Journal of Innovative Technology and Exploring Engineering 11, no. 9 (2022): 61–66. http://dx.doi.org/10.35940/ijitee.g9245.0811922.

Full text
Abstract:
Privacy is an important feature in transmission of data. Due to continuous flow of data over network, there may be a chance of attacks on sensitive data, either passive or active. To provide security, Cryptography plays a vital role by scrambling data into unreadable form. Several techniques have been developed to provide security for digital data transmission. AES is one of the efficient encryption engaged for the past decade. There is every need to improve its security mechanism periodically. In this paper we implement Transpose mix column and S-BOX Rotation to enhance efficiency. This propo
APA, Harvard, Vancouver, ISO, and other styles
39

G. Chaloop, Samir, and Mahmood Z. Abdullah. "ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS." Journal of Engineering and Sustainable Development 25, no. 4 (2021): 58–66. http://dx.doi.org/10.31272/jeasd.25.4.6.

Full text
Abstract:
Network safety has become an important issue in recent years. Encryption has been developed as a solution and plays an important role in the security of information systems. Many methods are required to secure the shared data. The advanced internet, networking firms, health information and the cloud applications have significantly increased our data every minute. The current work focuses on cryptography to provide the protection for sensitive data that exchanged between personal users, companies, organizations, or in the cloud applications and others during the transfer of data across the netw
APA, Harvard, Vancouver, ISO, and other styles
40

Pyrkova, A. YU, and ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.

Full text
Abstract:
The Internet of Things (IoT) combines many devices with various platforms, computing capabilities and functions. The heterogeneity of the network and the ubiquity of IoT devices place increased demands on security and privacy protection. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, but at the same time they must be effective enough to be implemented on devices with disabilities. One of the limited devices are microcontrollers and smart cards. This paper presents the performance and memory limitations of modern cryptographic primitives and sche
APA, Harvard, Vancouver, ISO, and other styles
41

Singh, Amritpal, Mohit Marwaha, Baljinder Singh, and Sandeep Singh. "Comparative Study of DES, 3DES, AES and RSA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (2013): 1162–70. http://dx.doi.org/10.24297/ijct.v9i3.3342.

Full text
Abstract:
In today world importance of exchange of data over internet and other media type is eminent; the search for best data protection against security attacks and a method to timely deliver the data without much delay is the matter of discussion among security related communities. Cryptography is one such method that provides the security mechanism in timely driven fashion. Cryptography is usually referred to as "the study of secret", which is most attached to the definition of encryption. The two main characteristics that identify and differentiate encryption algorithm from another are their capab
APA, Harvard, Vancouver, ISO, and other styles
42

Nurnaningsih, Desi, and Angga Aditya Permana. "RANCANGAN APLIKASI PENGAMANAN DATA DENGAN ALGORITMA ADVANCED ENCYPTION STANDARD (AES)." JURNAL TEKNIK INFORMATIKA 11, no. 2 (2018): 177–86. http://dx.doi.org/10.15408/jti.v11i2.7811.

Full text
Abstract:
ABSTRAKData sangatlah berharga bagi semua pengguna komputer, belakangan ini kriptografi menjadi metode yang digunakan dalam mengamankan data. Kriptografi adalah ilmu yang mempelajari teknik-teknik matematika dalam mengamankan suatu informasi atau pesan asli (Plainteks) menjadi sebuah teks tersembunyi (Chiperteks) dan kemudian di ubah menjadi pesan asli kembali. Kriptografi mempunyai tiga unsur penting yaitu pembangkitan kunci, enkripsi dan deskipsi. Dalam kriptografi di kenal algoritma block chiper yang didalamnya terdapat AES (Anvanced Encyption Standard) merupakan bagian dari Modern Symmetri
APA, Harvard, Vancouver, ISO, and other styles
43

Taufiqqurrachman, Taufiqurrachman, and Dani Elsandi. "Security Analysis and Encryption Time Comparison Description on Cryptography Advanced Encryption Standard (AES)." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 1 (2022): 60. http://dx.doi.org/10.32832/inova-tif.v5i1.8345.

Full text
Abstract:
<p><em>AES is a cryptographic computation intended to work on 128bit, 192bit, and 256bit message blocks. The four main calculation procedures consist of a process (ShiftRows) and three substitution processes (SubBytes, MixColumns, and AddRoundKey). The AES encryption procedure is intended to perform encryption confidentially with a non-linear level of security with time complexity as effectively as possible, using a light change procedure in its implementation. On the other hand, the inverse of this procedure has low effectiveness, so the AES description procedure is slow. By exami
APA, Harvard, Vancouver, ISO, and other styles
44

P, Varsha, and Dr V. Nanammal. "Image Cryptography Design Based on Nano AES Security Algorithm." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 590–93. http://dx.doi.org/10.22214/ijraset.2022.46613.

Full text
Abstract:
Abstract: Advanced Encryption Standard (AES) is a specification for electronic data encryption. This standard has become one of the most widely used encryption methodand has been implemented in both software and hardware. A high-secure symmetric cryptography algorithm, implementation on field-programmable gate array (FPGA). The proposed architecture includes 8-bit data path and five main blocks. We design two specified register banks, Key-Register and State-Register, for storing the plain text, keys, and intermediate data. To reduce the area, Shift-Rows is embedded inside the State- Register.
APA, Harvard, Vancouver, ISO, and other styles
45

Fei, Xiongwei, Kenli Li, and Wangdong Yang. "A fast parallel cryptography algorithm based on AES-NI." Journal of Intelligent & Fuzzy Systems 31, no. 2 (2016): 1099–107. http://dx.doi.org/10.3233/jifs-169039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Adlani, M. Adharis, and Ricky Eka Putra. "Pengamanan Mnemonic Phrase Menggunakan Modified Advanced Encryption Standart." Journal of Informatics and Computer Science (JINACS) 3, no. 04 (2022): 425–34. http://dx.doi.org/10.26740/jinacs.v3n04.p425-434.

Full text
Abstract:
Abstract - Security is an action to prevent the occurrence of dangers, threats, and attacks, especially the security of cryptocurrency storage assets on the smartphone crypto mobile wallet application. Security is important to protect wallet data from asset theft attacks. The results of the observations made by many users store their wallet recovery words (mnemonic phrases) on cloud services such as Google Drive and One Drive, this is very vulnerable to data hacking if the account has been compromised then hackers take valuable data for their own benefit. Computer scientists created a cryptogr
APA, Harvard, Vancouver, ISO, and other styles
47

Mohamad, Rafidah. "Data hiding by using AES Algorithm." Wasit Journal of Computer and Mathematics Science 1, no. 4 (2022): 112–19. http://dx.doi.org/10.31185/wjcm.82.

Full text
Abstract:
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchange the data over the internet network is very important issue. So, in order to transfer the data securely to the destination, there are many approaches like cryptography and steganography. In this research we propose an AES algorithm for embedding the data into the images which is implemented through the Microsoft .NET framework using the C#.NET.
APA, Harvard, Vancouver, ISO, and other styles
48

Kulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.

Full text
Abstract:
Abstract: Hybrid cryptography is implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user. The hybrid encryption algorithm combines the advantages of fast encryption speed of AES algorithm, easy management of RSA algorithm key, and digital signature to ensure the secure transmission of confidential documents. Data/information is the most valuable asset for the modern electronic communication system. Securing data or information has become a c
APA, Harvard, Vancouver, ISO, and other styles
49

Sivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.

Full text
Abstract:
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is compute
APA, Harvard, Vancouver, ISO, and other styles
50

Iftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.

Full text
Abstract:
Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on s
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!