全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Complex Encryption System Design Implemented by AES

DOI: 10.4236/jis.2021.122009, PP. 177-187

Keywords: AES Algorithm, RSA Algorithm, Encryption, Key Management

Full-Text   Cite this paper   Add to My Lib

Abstract:

With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.

References

[1]  Odeh, A., Masadeh, S.R. and Azzazi, A. (2015) A Performance Evaluation of Common Encryption Techniques with Secure Watermark System (SWS). International Journal of Network Security & Its Applications, 7, 31-38.
https://doi.org/10.5121/ijnsa.2015.7303
[2]  Kazlauskas, K., Smaliukas, R. and Vaicekauskas, G. (2016) A Novel Method to Design S-Boxes Based on Key-Dependent Permutation Schemes and Its Quality Analysis. International Journal of Advanced Computer Science and Applications, 7, 93-99.
https://doi.org/10.14569/IJACSA.2016.070412
[3]  Priyadarshini, P., Narayankar, P., Narayan, D.G. and Meena, S.M. (2016) A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617-624.
https://doi.org/10.1016/j.procs.2016.02.108
[4]  Ali, A.H. and Sagheer, A.M. (2017) Design of an Android Application for Secure Chatting. International Journal Computer Network and Information Security, 9, 29-35.
https://doi.org/10.5815/ijcnis.2017.02.04
[5]  Dimas, N., Faisal and Suryani, D. (2018) Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC). Procedia Computer Science, 135, 283-291.
https://doi.org/10.1016/j.procs.2018.08.176
[6]  Teng, L., Li, H., Yin, S. and Sun, Y. (2019) A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22, 112-117.
[7]  Tan, C., Deng, X. and Zhang, L. (2018) Identification of Block Ciphers under CBC Mode. Procedia Computer Science, 131, 65-71.
https://doi.org/10.1016/j.procs.2018.04.186
[8]  Abdel-hafeez, S., Sawalmeh, A. and Bataineh, S. (2017) High Performance AES Design using Pipelining Structure over GF((24)2). 2007 IEEE International Conference on Signal Processing and Communications, Dubai, 24-27 November 2007, 716-719.
https://doi.org/10.1109/ICSPC.2007.4728419
[9]  Cao, T. (2016) Design and Implementation of Encryption System Based on AES. Software Development and Application, 21, 141-142.
[10]  Indra Sena, R.M. and Siva Kumar, A.P. (2016) Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm. Procedia Computer Science, 85, 62-69.
https://doi.org/10.1016/j.procs.2016.05.177
[11]  Yang, B. and Bo, L. (2018) Complex Encryption Computer System Realized by AES World Smart Home. Information System Engineering, No. 12, 31-35.
[12]  Vigila, S.M.C. and Muneeswaran, K. (2009) Implementation of Text Based Cryptosystem Using Elliptic Curve Cryptography. 2009 1st International Conference on Advanced Computing, Chennai, 13-15 December 2009, 82-85.
https://doi.org/10.1109/ICADVC.2009.5378025
[13]  Xia, G. (2019) Technical Browsing of Complex Encryption Computer System Realized by AES. Automotive Application, No. 6, 26-28.
[14]  Zhang, M. (2019) Alarm System of Complex Encryption Computer System Implemented by AES. Inner Mongolia University of Science and Technology, Baotou, 21-22.
[15]  Neenu, S. and Bonifus, P.L. (2016) Design of AES Architecture with Area and Speed Tradeoff. Procedia Technology, 24, 1135-1140.
https://doi.org/10.1016/j.protcy.2016.05.066
[16]  Jie, K. and Liu, Y. (2015) Analysis of Data Encryption Algorithms. China Science and Technology, 18, 33-34.
[17]  Rakesh, K. and Geetu, M. (2015) A Novel Framework for Secure File Transmission Using Modified Aes and md5 Algorithms. International Journal of Information and Computer Security, 7, Article No. 91.
https://doi.org/10.1504/IJICS.2015.073012
[18]  Berry, R., Berry, K. and Kumar, A. (2016) Review on Network Security and Cryptography. International Journal of Innovative Research in Technology, 3, 44-45.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133