With the rapid development of internet technology and the increasing popularity
of e-commerce, data encryption technology plays a very important role in data
security. Information security has two aspects: security protocol and cryptographic
algorithm and the latter is the foundation and core technology of information
security. Advanced Encryption Standard (AES) encryption algorithm is one of the
most commonly used algorithms in symmetric encryption algorithms. Such
algorithms face issues when used in the context of key management and security
functions. This paper focuses on the systematic analysis of these issues and
summarizes AES algorithm implementation, comprehensive application and
algorithm comparison with other existing methods. To analyze the performance of
the proposed algorithm and to make full use of the advantages of AES encryption
algorithm, one needs to reduce round key and improve the key schedule, as well
as organically integrate with RSA algorithm. Java language is used to implement
the algorithm due to its large library, then to show the efficiency of the
proposed method we compare different parameters, such as encryption/decryption
speed, entropies and memory consumption...) with a classic algorithm. Based on
the results of the comparison between AES and the hybrid AES algorithm, the
proposed algorithm shows good performance and high security. It therefore can
be used for key management and security functions, particularly for sharing
sensitive files through insecure channel. This analysis provides a reference
useful for selecting different encryption algorithms according to different
business needs.
References
[1]
Odeh, A., Masadeh, S.R. and Azzazi, A. (2015) A Performance Evaluation of Common Encryption Techniques with Secure Watermark System (SWS). International Journal of Network Security & Its Applications, 7, 31-38. https://doi.org/10.5121/ijnsa.2015.7303
[2]
Kazlauskas, K., Smaliukas, R. and Vaicekauskas, G. (2016) A Novel Method to Design S-Boxes Based on Key-Dependent Permutation Schemes and Its Quality Analysis. International Journal of Advanced Computer Science and Applications, 7, 93-99. https://doi.org/10.14569/IJACSA.2016.070412
[3]
Priyadarshini, P., Narayankar, P., Narayan, D.G. and Meena, S.M. (2016) A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science, 78, 617-624. https://doi.org/10.1016/j.procs.2016.02.108
[4]
Ali, A.H. and Sagheer, A.M. (2017) Design of an Android Application for Secure Chatting. International Journal Computer Network and Information Security, 9, 29-35. https://doi.org/10.5815/ijcnis.2017.02.04
[5]
Dimas, N., Faisal and Suryani, D. (2018) Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC). Procedia Computer Science, 135, 283-291. https://doi.org/10.1016/j.procs.2018.08.176
[6]
Teng, L., Li, H., Yin, S. and Sun, Y. (2019) A Modified Advanced Encryption Standard for Data Security. International Journal of Network Security, 22, 112-117.
[7]
Tan, C., Deng, X. and Zhang, L. (2018) Identification of Block Ciphers under CBC Mode. Procedia Computer Science, 131, 65-71. https://doi.org/10.1016/j.procs.2018.04.186
[8]
Abdel-hafeez, S., Sawalmeh, A. and Bataineh, S. (2017) High Performance AES Design using Pipelining Structure over GF((24)2). 2007 IEEE International Conference on Signal Processing and Communications, Dubai, 24-27 November 2007, 716-719. https://doi.org/10.1109/ICSPC.2007.4728419
[9]
Cao, T. (2016) Design and Implementation of Encryption System Based on AES. Software Development and Application, 21, 141-142.
[10]
Indra Sena, R.M. and Siva Kumar, A.P. (2016) Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm. Procedia Computer Science, 85, 62-69. https://doi.org/10.1016/j.procs.2016.05.177
[11]
Yang, B. and Bo, L. (2018) Complex Encryption Computer System Realized by AES World Smart Home. Information System Engineering, No. 12, 31-35.
[12]
Vigila, S.M.C. and Muneeswaran, K. (2009) Implementation of Text Based Cryptosystem Using Elliptic Curve Cryptography. 2009 1st International Conference on Advanced Computing, Chennai, 13-15 December 2009, 82-85. https://doi.org/10.1109/ICADVC.2009.5378025
[13]
Xia, G. (2019) Technical Browsing of Complex Encryption Computer System Realized by AES. Automotive Application, No. 6, 26-28.
[14]
Zhang, M. (2019) Alarm System of Complex Encryption Computer System Implemented by AES. Inner Mongolia University of Science and Technology, Baotou, 21-22.
[15]
Neenu, S. and Bonifus, P.L. (2016) Design of AES Architecture with Area and Speed Tradeoff. Procedia Technology, 24, 1135-1140. https://doi.org/10.1016/j.protcy.2016.05.066
[16]
Jie, K. and Liu, Y. (2015) Analysis of Data Encryption Algorithms. China Science and Technology, 18, 33-34.
[17]
Rakesh, K. and Geetu, M. (2015) A Novel Framework for Secure File Transmission Using Modified Aes and md5 Algorithms. International Journal of Information and Computer Security, 7, Article No. 91. https://doi.org/10.1504/IJICS.2015.073012
[18]
Berry, R., Berry, K. and Kumar, A. (2016) Review on Network Security and Cryptography. International Journal of Innovative Research in Technology, 3, 44-45.