Advanced Encryption Standards
114 Followers
Recent papers in Advanced Encryption Standards
Abstract — Genetic algorithm based Cryptanalysis has gained considerable attention due to its fast convergence time. This paper proposes a Genetic Algorithm (GA) based cryptanalysis scheme for breaking the key employed in Simplified- AES.... more
Today's world is growing rapidly over internet technologies. Steganography play an important role in the field of information security [1]. Video and images are very common choice for hiding data. In Visual cryptography we upload an image... more
— Any algorithm is evaluated based on its confusion and diffusion property determining its strength to withstand the intruding attacks. AES (Advanced Encryption Standard), using 128-bit key size has the number of rounds processed over... more
A construction method of í µí± 8 S-boxes is given in [6]. These í µí± 8 S-boxes are generated by the action of symmetric group í µí± 8 on AES S-box and these are 40320 in number. In this paper, we bounce a new method for the... more
In this research work, a fast and lightweight AES-128 cypher based on the Xilinx ZCU102 FPGA board is presented, suitable for 5G communications. In particular, both encryption and decryption algorithms have been developed using a... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal... more
Advanced Encryption Standard (AES) has been the focus of Cryptanalysis since it was released in the 2001, November. The research gained more important when AES as declared as the Type-1 Suite-B Encryption Algorithm, by the NSA in... more
Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this... more
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied... more
With the strong stimulation of computer networks, computer users increasingly important to find better ways to protect personal and confidential information. A common way to ensure that such information is unreadable string encryption of... more
Dalam penerapan konsep IoT ini ternyata banyak kasus yang ditemukan pada perangkat IoT yaitu menjadi target kejahatan siber, dengan terhubungnya perangkat kedalam jaringan internet maka disitu akan timbul kerentanan dalam jaringan IoT,... more
— Data security has become one of the most important concerns in the recent times. This has led to an increase in the importance of cryptography of the electronic data. Cryptography is the process of protecting digital information. Though... more
Patent application describing method to completely implement encryption algorithms as non-sequential hardware devices.
The increased of the use of computer & communications system by IT industries has increased the risk of theft of proprietary information. Cryptographic control (Encryption) is a primary method of protecting system resources. Control is... more
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm. Asynchronous AES Architecture is one of the... more
Sebuah pesan teks (SMS) Short Massage Servicec tidak terlalu diperhatikan tingkat keamanannya, banyak penguna pesan teks (SMS) tidak memperhatikan tingat kriminalitas yang timbul akibat kurangnya fasilitas yang melengkapi sistem keamanan... more
ABSTRAK Advances in computer science and technology have affected every aspect of human life, including education. Information and data can be easily and quickly sent to consumers via a computer network. Data and information can be easily... more
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm. Asynchronous AES Architecture is one of the... more
This study was conducted to determine the authenticity of a certificate quickly. Certificate forgery problem is one of the important aspects of a study that has been done. In this case, it is related to the importance of the authenticity... more
Developing a good database system and providing security control for the database has always been a big challenge. Encryption technique has previously been proposed to provide users with confidentiality in terms of outsource storage.... more
Image usage over the internet becomes more and more important each day. Over 3 billion images are shared each day over the internet which raise a concern about how to protect images copyrights? Or how to utilize image sharing experience?... more
Two existing cryptosystems are being combined and proposed. It is the enhanced combination of KED (Key Encryption Decryption), a cryptosystem that uses modulo 69 and the AES (Advance Encryption Standard) cryptography. The strength of the... more
The increased of the use of computer & communications system by IT industries has increased the risk of theft of proprietary information. Advanced Encryption Standard (Encryption) is a primary method of protecting system resources. AES is... more
Providing security to Mobile Ad-hoc Networks (MANETs) is one of the essential and demanding task in recent days, due to the mobility of nodes. Typically, the malicious or attacker nodes intend to access the data packet for interrupting... more
The leading causes of death worldwide are chronic illnesses suchlike diabetes, Heart Disease (HD), cancer as well as chronic respiratory malady. It is remarkably intricate to diagnose HD with disparate symptoms or features. With the... more
Dynamic Portable center points in military circumstances, for instance, a forefront or a debilitating area are subject to encounter the evil impacts of unpredictable framework system and nonstop assignments. Intrusion tolerant framework... more
In latest years, due to the fast expansion and development of information technology, securities of confidential information come to be critically vital in digital data broadcasting. During the transmission through insecure communication... more
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
As the advancement in technology ,banking industry is facing several changes. Customer is now at the driving seat of new financial industry scenario as the whole control is now in the hands of customer. Due to the prospering technology,... more
Encryption algorithms play a dominant role in preventing unauthorized access to important data. This paper focus on the implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms on Microblaze soft... more
Password protection is a major security concern the world is facing today. While there are many publications available that discuss ways to protect passwords and data, how widely user from around the world adhere to these rules are... more
Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable... more