AES (Advance Encryption Standard) adalah teknik merahasiakan sandi atau data sesuai standarisasi dari FIPS (Federasi Information Processing Standard) versi 197 dengan menggunakan algoritma rijndael. AES dibuat oleh kriptografer asal... more
AES (Advance Encryption Standard) adalah teknik merahasiakan sandi atau data sesuai standarisasi dari FIPS (Federasi Information Processing Standard) versi 197 dengan menggunakan algoritma rijndael. AES dibuat oleh kriptografer asal belgia, yakni Vincent Rijmen dan Joan Daemen menggantikan metode DES (Data Encryption Standard). Untuk pengimplementasian program, penulis menggunakan bahasa C#.
Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will... more
Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will find out the two superlative symmetric cryptography algorithms available and used nowadays. Then, observe which algorithm is better than the other and finally give some recommendations based on the results achieved. This will surely narrow down the options as to which algorithm to choose when trying to achieve a secure communication.
A proposed FPGA-based implementation of the Advanced Encryption Standard (AES) algorithm is presented in this paper. This implementation is compared with other works to show the efficiency. The design uses an iterative looping approach... more
A proposed FPGA-based implementation of the Advanced Encryption Standard (AES) algorithm is presented in this paper. This implementation is compared with other works to show the efficiency. The design uses an iterative looping approach with block and key size of 128 bits, lookup table implementation of S -box. This gives low complexity architecture and easily achieves low latency as well as high throughput. Simulation results, performance results are presented and compared with previous reported designs.
Problem statement: Image encryption needs to be secure by resisting statistical attacks and other types of attacks. Approach: The new algorithm, call it the Shuffle Encryption Algorithm (SEA), applies nonlinear s-box byte substitution.... more
Problem statement: Image encryption needs to be secure by resisting statistical attacks and other types of attacks. Approach: The new algorithm, call it the Shuffle Encryption Algorithm (SEA), applies nonlinear s-box byte substitution. Then, it performed a shuffling operation partially dependent on the input data and uses the given key. Results: SEA was implemented and tested with different data, mainly
In this paper, we proposed a new approach for key scheduling algorithm which is an enhancement of the Rijndael key scheduling. This proposed algorithm was developed to improve the weaknesses that has in the Rijndael key schedule. The key... more
In this paper, we proposed a new approach for key scheduling algorithm which is an enhancement of the Rijndael key scheduling. This proposed algorithm was developed to improve the weaknesses that has in the Rijndael key schedule. The key schedule function in Rijndael block cipher did not receive the same amount of attention during design phase as the cipher components. Based on our research, there are several properties in key schedule that seemed to violate the design criteria, which was published by NIST, and this has led to many types of attack performed on Rijndael block cipher. Thus we proposed an approach called ShiftColumn, operates by shifting bit and the result will be shifted with different offsets. This transformation is added as the last function after the RCon function. Our new approach improves the security of the original Rijndael key scheduling, by enhancing the bit confusion and diffusion of the subkey, which is output that is produced from the key schedule transformation. The subkeys produced by the proposed approach have been proven to be a better result on both properties compared to the subkeys that were produced from Rijndael key scheduling transformation.
A real-time video encryption module, developed to be used on an electrical accelerated mini-helicopter (UAV), is presented in this paper. The surveillance system is composed from six modules: image capture, encryption, two radio link... more
A real-time video encryption module, developed to be used on an electrical accelerated mini-helicopter (UAV), is presented in this paper. The surveillance system is composed from six modules: image capture, encryption, two radio link modules, decryption and display module. The hart of the encryption system is the CV700C motherboard and it's VIA C7 microprocessor with ultra low power consumption and efficient heat dissipation. For encryption, Rijndael algorithm was used.
Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will... more
Cryptography is one of the most integral components when trying to maintain achieve a secure communication medium and determining the best cryptography algorithm is as important as having a secure communication. In this paper, we will find out the two superlative symmetric cryptography algorithms available and used nowadays. Then, observe which algorithm is better than the other and finally give some recommendations based on the results achieved. This will surely narrow down the options as to which algorithm to choose when trying to achieve a secure communication.
Implementation in one FPGA of the AES-Rijndael in Offset Codebook (OCB) and Electronic Codebook (ECB) modes of operation was developed and experimentally tested using the Insight Development Kit board, based on Xilinx Virtex II XC2V1000-4... more
Implementation in one FPGA of the AES-Rijndael in Offset Codebook (OCB) and Electronic Codebook (ECB) modes of operation was developed and experimentally tested using the Insight Development Kit board, based on Xilinx Virtex II XC2V1000-4 device. The circuit was designed to provide simultaneous data privacy and authenticity in applications which require small area such as wireless LANs, cellular phones, and
AES advanced encryption standard algorithm was designed to resist classical methods of cryptanalysis (e.g. linear or differential attacks), which were based on probabilistic characteristics. But, it has not mature immunity against... more
AES advanced encryption standard algorithm was designed to resist classical methods of cryptanalysis (e.g. linear or differential attacks), which were based on probabilistic characteristics. But, it has not mature immunity against algebraic attacks which becomes more powerful after the emergence of XSL algorithm. In this research we tried some methods to increase the immunity of AES algorithm against these algebraic
Abstract. Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of... more
Abstract. Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (eg linear or differential attacks) are ...