Open Access Open Access  Restricted Access Subscription or Fee Access

Investigations Regarding the Keys and Round Functions of AES for Data Security over RF Systems

Preetinder Singh, Ajay Kumar, Amarpal Singh

Abstract


Data security is a prime requirement of an organization in order to keep their information safe from their competitors. Cryptography technique which includes encryption algorithm and reliable keys are used for the same task. It is used to protect the digital data including financial,telecommunications, and government data.In this paper we analyzed various parameters of encryption techniques/algorithm. We encrypt the plain text by using different key lengths 128,192 and 256. On the basis of encryption time, other parameters can be determined e.g. processing time, round time,throughput etc. It is investigated that if clock frequency increases the throughput also varies.


Keywords


Encryption, Decryption, Processing time, Round time, Advanced Encryption Standard (AES).

Full Text:

PDF

References


K.H. Mundt, H. Eichel, “Supercrypt ASIC Technology facilitates Family for Data Encryption” IEEE transactions on secure communication,pp.356-359,1992.

Irma B. Fernandez, M. S. E. E. Wunnava V. Subbarao, “Encryption based Security for ISDN Communication Technique & Application” IEEE transactions, pp.70-73, 1994.

Hassina Guendouz & Samir Bouaziz, “Rapid prototype of a Fast Data Encryption Standard with Integrity Processing for Cryptographic Applications” IEEE, pp.VI-434-437, 1994.

Bruce Schneier and Mudge, “Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)”, CQRE '99, Springer-Verlag,pp. 192-203, 1999.

Federal Information Processing Standards, “Specification for advanced encryption standard” Publication 197, pp.1-47, 2001.

Guido Bertoni; Aril Bircan; Luca Breveglieri; Pasqualina Fragneto;Marco Macchetti. Vittorio Zaccaria; “Performances of the Advanced Encryption Standard in embedded Systems with Cache Memory” IEEE transactions, 2003.

Chih-Hsu Yen and Bing-Fei Wu, “Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard”, IEEE transactions on computers, vol.55, no. 6, pp.720-731, June 2006.

Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury,M.A. Matin, “Effect of Security Increment to Symmetric Data Encryption through AES Methodology”, IEEE Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp 291-294, 2008.

J. Daemen and V. Rijmen, AES Proposal, “Rijndael, AES Algorithm”, Dr.Brian Gladman, v3.1, 3rd March 2001.

Jingmei Liu1, Baodian Wei2, Xiangguo Cheng1, Xinmei Wang1, “An AES S-box to Increase Complexity and Cryptographic Analysis”,IEEE,Proceeding of 19th International Conference on Advanced Information Networking and Applications, pp. 1-5,2005.

Saleh Abdel-hafeez, Ahmed Sawalmeh, Sameer Bataineh “AES Design using pipelining structure Over GF(24)2”, IEEE International Conference on Signal Processing and Communications, Dubai, United Arab Emirates,pp.716-719,24-November, 2007.

Elisa Bertino; Ning Shang; and Samuel S. Wag; “An efficient time- bound hierarchical key management scheme for secure broadcasting”, IEEE transactions on dependable and secure computing, vol. 5, no. 2, pp 65-69,April-June 2008.

Zhao Xinjie, WANG Tao, Mi Dong, Zheng Yuanyuan, Lun Zhaoyang “Robust First Two Rounds Access Driven Cache Timing Attack on AES”,International Conference on Computer Science and Software Engineering, IEEE transactions, pp. 785-788, 2008.

Ashwini M. Deshpande, Mangesh S. Deshpande, Devendra N.Kayatanavar, “FPGA Implementation of AES Encryption & Decryption”,International conference on control automation, communication and energy conservation, pp.1-6,4th-6th June 2009.

Chi-Feng Lu; Yan-Shun Kan; Hsia-Ling Chiang; Chung-Huang Yang;“Fast Implementation of AES Cryptographic Algorithms in Smart Cards”research of NexSmart Technology, Inc. Taipei, Taiwan, R.O.C. IEEE pp: 573-579,2003.

Aamer Nadeem, Dr. M. Younus Javed “A Performance Comparison of Data Encryption Algorithms”, International Conference on Information and Communication Technologies, pp. 84-89, 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.