Open Access   Article Go Back

A Review on Advanced Encryption Standard – (AES)

Ajit Karki1

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 551-556, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.551556

Online published on Aug 31, 2018

Copyright © Ajit Karki . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ajit Karki, “A Review on Advanced Encryption Standard – (AES),” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.551-556, 2018.

MLA Style Citation: Ajit Karki "A Review on Advanced Encryption Standard – (AES)." International Journal of Computer Sciences and Engineering 6.8 (2018): 551-556.

APA Style Citation: Ajit Karki, (2018). A Review on Advanced Encryption Standard – (AES). International Journal of Computer Sciences and Engineering, 6(8), 551-556.

BibTex Style Citation:
@article{Karki_2018,
author = {Ajit Karki},
title = {A Review on Advanced Encryption Standard – (AES)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {551-556},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2730},
doi = {https://doi.org/10.26438/ijcse/v6i8.551556}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.551556}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2730
TI - A Review on Advanced Encryption Standard – (AES)
T2 - International Journal of Computer Sciences and Engineering
AU - Ajit Karki
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 551-556
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
394 352 downloads 171 downloads
  
  
           

Abstract

Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunications, cryptography is necessary when communicating over any unreliable medium, which includes any network particularly the internet. AES encryption is the solution for Data Encryption Standard (DES) aging problem. Rijndanel Symmetric block cipher standard version which can encrypt and decrypt plaintext 128 bits blocks using key with 128-bit, 192-bit, or 256-bit size. The Rijndael cipher has simple structure and suitable to 8-bit and 32-bit processing. The cipher has numbers round of plaintext transformation. Key length determines how many rounds to be executed. The key with 128-bit use 10 rounds, 192-bit use 12 rounds, and 256-bit use 14 rounds. For the AES algorithm, the number of rounds to be performed during the execution of the algorithm uses a round function that is composed of four different byte-oriented transformations: Sub Bytes, Shift Rows, Mix columns and Add Round Key.

Key-Words / Index Term

Advanced Encryption Standard, Cryptography, Decryption, Encryption

References

[1]. Selent, D. Advanced encryption standard. Rivier Academic Journal 2010.
[2]. Sarker, M.Z.H., Parvez, M.S. A cost effective symmetric key cryptographic algorithm for small amount of data. In: 9th International Multitopic Conference, IEEE INMIC 2005. IEEE; 2005, p. 1–6.
[3]. Stallings, W., Tahiliani, M.P.. Cryptography and network security: principles and practice; vol. 6. Pearson London; 2014.
[4]. Satoh, A., Morioka, S., Takano, K., Munetoh, S. Compact rijndael hardware architecture with s-box optimization. In: Asiacrypt; vol. 2248. Springer; 2001, p. 239–254.
[5]. Ahmad, N., Hasan, R., Jubadi, W.M.. Design of aes s-box using combinational logic optimization. In: Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium on. IEEE; 2010, p. 696–699.
[6]. Z. Yuan, Y. Wang, J. Li, R. Li and W. Zhao, “FPGA based optimization for masked AES implementation”, Proc. IEEE 54th
[7]. International Midwest Symposium on Circuits and Systems (MWSCAS), pp.1-4 August 2011.
[8]. B.Schneier. Applied Cryptography. John Wiley and Sons, second edition, 2012.
[9]. Cryptography and Elliptic Curves, koblitz, second edition, 2011.
[10]. Julio Lopez and Ricardo Dahab, “An overview of elliptic curve cryptography”, May 2011.
[11]. V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology -CRYPTO`85, LNCS 218, pp.417-426, 2011.
[12]. Botes, J.J., Penzhorn, W.T., 1994. An implementation of an elliptic curve cryptosystem. Communications and Signal Processing. COMSIG-94. In Proceedings of the 1994 IEEE South African Symposium, 85 -90.