Implementation of AES with Time Complexity Measurement for Various Input

1
Shraddha More
Shraddha More
2
Mr.Rajesh Bansode
Mr.Rajesh Bansode
1 Mumbai university

Send Message

To: Author

GJCST Volume 15 Issue E4

Article Fingerprint

ReserarchID

CSTNWS3Q5ZJ

Implementation of AES with Time Complexity Measurement for Various Input Banner

AI TAKEAWAY

The objective of our study was to evaluate, in a population of Togolese People Living With HIV(PLWHIV), the agreement between three scores derived from the general population namely the Framingham score, the Systematic Coronary Risk Evaluation (SCORE), the evaluation of the cardiovascular risk (CVR) according to the World Health Organization.
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Network Security has a major role in the development of data communication system, where more randomization in the secret keys increases the security as well as the complexity of the cryptography algorithms. In the recent years network security has become an important issue. Cryptography has come up as a solution which plays a vital role in the information security system against various attacks. This security mechanism uses the AES algorithm to scramble data into unreadable text which can only be decrypted with the associated key. The AES algorithm is limited only for text as an input. It also has, the more time complexity. So it suffers from vulnerabilities associated with another type of input and time constraints. So its challenge to implement the AES algorithm for various types of input and require less decryption time. The propose work demonstrate implementation of a 128-bit Advanced Encryption Standard (AES), which consists of both symmetric key encryption and decryption algorithms for input as a text, image and audio. It also gives less time complexity as compared to existing one. At the last stage comparing the time complexity for encryption and decryption process for all three types of input. This paper also demonstrates a side channel attack on the standard software implementation of the AES cryptographic algorithm.de

Article content is being processed or not available yet.

19 Cites in Articles

References

  1. Prof Vinayak Bajirao Patil,Dr,L Uttam,Bombale,Hemant Pallavi,Dixit (2013). Implementation of AES algorithm on ARM processor for wireless network.
  2. Xinmiao Zhang,Keshab Parhi (2002). Implementation approaches for the advanced encryption standard algorithm.
  3. Chih-Pin Su,Tsung-Fu Lin,Chih-Tsun Huang,Cheng-Wen Wu (2003). A high throughput low cost AES processor.
  4. (2001). Advanced Encryption Standard (AES).
  5. M Gnanambika,S Adilakshmi,Dr Noorbasha (2013). AES-128 Bit Algorithm Using Fully Pipelined Architecture for Secret Communication.
  6. Rishabh Jain,Rahul Jejurka2,Shrikrishna Chopade,Someshwar Vaidya,Mahesh Sanap (2014). AES Algorithm Using 512 Bit Key Implementationfor Secure Communication.
  7. Prof Vinayak Bajirao Patil,Dr,L Uttam,Bombale,Hemant Pallavi,Dixit (2013). Implementation of AES algorithm on ARM processor for wireless network.
  8. Ritu Pahal,Vikas Kumar (2013). Efficient Implementation of AES.
  9. K Soumya,G Shyam Kishore (2013). Design and Implementation of Rijndael Encryption Algorithm Based on FPGA.
  10. Sumedha Kaushik,Ankur Singhal (2012). Network Security Using Cryptographic Techniques.
  11. Dr,Abhishek Prerna Mahajan,Sachdeva (2013). A Study of Encryption Algorithms AES, DES and RSA forSecurity.
  12. Henry Kuo,Ingrid Verbauwhede (2001). Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm.
  13. Navraj Khatri,Rajeev Dhanda,Jagtar Singh (2012). Comparison of power consumption and strict avalanche criteria at encryption/Decryption side of Different AES standards.
  14. Das Debasis,Misra Rajiv (2011). Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm.
  15. Sujatha Hiremath,M Suma (2009). Advanced Encryption Standard Implemented on FPGA.
  16. Chehal Ritika,Singh Kuldeep (2008). Robust First Two Rounds Access Driven Cache Timing Attack on AES.
  17. P Kocher (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS and other systems.
  18. William Stallings (2011). Web-Based Security Protocols.
  19. Joan Daemen,Vincent Rijmen (null). Rijndael/AES.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Shraddha More. 2015. \u201cImplementation of AES with Time Complexity Measurement for Various Input\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E4): .

Download Citation

Issue Cover
GJCST Volume 15 Issue E4
Pg. 11- 20
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification: F.1.3 C.2.1
Version of record

v1.2

Issue date

July 29, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 7925
Total Downloads: 2065
2026 Trends
Research Identity (RIN)
Related Research

Article in Review

Network Security has a major role in the development of data communication system, where more randomization in the secret keys increases the security as well as the complexity of the cryptography algorithms. In the recent years network security has become an important issue. Cryptography has come up as a solution which plays a vital role in the information security system against various attacks. This security mechanism uses the AES algorithm to scramble data into unreadable text which can only be decrypted with the associated key. The AES algorithm is limited only for text as an input. It also has, the more time complexity. So it suffers from vulnerabilities associated with another type of input and time constraints. So its challenge to implement the AES algorithm for various types of input and require less decryption time. The propose work demonstrate implementation of a 128-bit Advanced Encryption Standard (AES), which consists of both symmetric key encryption and decryption algorithms for input as a text, image and audio. It also gives less time complexity as compared to existing one. At the last stage comparing the time complexity for encryption and decryption process for all three types of input. This paper also demonstrates a side channel attack on the standard software implementation of the AES cryptographic algorithm.de

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Implementation of AES with Time Complexity Measurement for Various Input

Shraddha More
Shraddha More Mumbai university
Mr.Rajesh Bansode
Mr.Rajesh Bansode

Research Journals