scholarly journals Advanced Encryption Standard (AES) 128 Bit untuk Keamanan Data Internet of Things (IoT) Tanaman Hidroponik

Author(s):  
Roiya Ravida ◽  
Heru Agus Santoso

One method of growing vegetables is to use hydroponics by utilizing water as the medium used. In this era of rapidly developing technology, one of which is Internet of Things (IoT) is a system between computers or objects that can connect and exchange data without requiring interaction, because the data sent is public data, a security system is needed to secure the data sent. Advanced Encryption Standard (AES) 128 bits are used to secure data sent by users or data received by users, using a private key so that data security is maintained. The process of encryption and decryption was carried out through the website using an Arduino Uno microcontroller, SoC version ESP 8266. To adjust the rules for controlling plant needs such as Total Dissolve Solid (TDS), Potential Hydrogen (PH), temperature, and distance, this study uses Sensor2. Database in the research used to facilitate computerized access to assist the process of caring for IoT-based hydroponic plants. The final results have been tested in the encryption decryption process, Avalanche Effect (AE), entropy and Bit Error Ratio (BER). The AE yield 58.01% as highest score, the highest entropy was 6.3566 while all data resulted in BER = 0.

Symmetry ◽  
2019 ◽  
Vol 11 (12) ◽  
pp. 1484 ◽  
Author(s):  
Oluwakemi Christiana Abikoye ◽  
Ahmad Dokoro Haruna ◽  
Abdullahi Abubakar ◽  
Noah Oluwatobi Akande ◽  
Emmanuel Oluwatobi Asani

The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that were aimed at securing information while using AES is still being undermined by the activities of attackers This has further necessitated the need for researchers to come up with ways of enhancing the strength of AES. This article presents an enhanced AES algorithm that was achieved by modifying its SubBytes and ShiftRows transformations. The SubBytes transformation is modified to be round key dependent, while the ShiftRows transformation is randomized. The rationale behind the modification is to make the two transformations round key dependent, so that a single bit change in the key will produce a significant change in the cipher text. The conventional and modified AES algorithms are both implemented and evaluated in terms avalanche effect and execution time. The modified AES algorithm achieved an avalanche effect of 57.81% as compared to 50.78 recorded with the conventional AES. However, with 16, 32, 64, and 128 plain text bytes, the modified AES recorded an execution time of 0.18, 0.31, 0.46, and 0.59 ms, respectively. This is slightly higher than the results obtained with the conventional AES. Though a slightly higher execution time in milliseconds was recorded with the modified AES, the improved encryption and decryption strength via the avalanche effects measured is a desirable feat.


2021 ◽  
Author(s):  
Akula Vamsi Krishna Rao ◽  
V.N. Aditya Datta Chivukula ◽  
Sri Keshava Reddy Adupala ◽  
Abhiram Reddy Cholleti

In recent years, security has become a big issue for many applications to defend attacks from intruders. Exchanging credentials in plaintext might expose it to stealers. Many techniques are required to protect the data of the consumers from attackers. Cryptography has come up with a solution to provide security for the users to exchange data securely by the means of the process called as Encryption/ Decryption. In this field, there are basically two techniques of cryptography i.e Symmetric and asymmetric, developed to achieve a secure connection between the sender and receiver. These techniques provide specific goals in maintaining privacy by converting original message to non-readable form and sends it over a communication channel. The unauthorized members try to break the non-readable form but the difficulty depends upon the techniques that were used to encrypt the data. In this paper, we proposed a quadruple encryption algorithm consists of novel phase-shift algorithm, AES (Advanced Encryption Standard), TwoFish and RC4 and making it hard to attack by common methods.


2017 ◽  
Vol 8 (2) ◽  
Author(s):  
Sugiyanto Sugiyanto ◽  
Rinci Kembang Hapsari

Short Message Service (SMS) is working on a wireless network that allows the theft of the message contents. There are risks that could threaten the security of the contents of the message on SMS services, including SMS snooping, and SMS interception. Therefore, it takes security system messages on SMS services to maintain the security and integrity of the message content to cover the security messages. Algorithms Advanced Encryption Standard (AES) using a structure SPN (Substitution Permutation Network) structure, which has the disadvantage of encryption and decryption, so the safety level is low. To cover the security hole of these weaknesses, the researchers conducted the improvement of Advanced Encryption Standard (AES) algorithm security system based on android SMS using Vigenere algorithm, so that the level of security and integrity of the content of the short message becomes higher and difficult to solve. The results showed an average increase in percentage value of the avalanche effect from 37.24% to 42.96%. Keywords—Advanced Encryption Standard, android, message security, encryption.


2013 ◽  
Vol 336-338 ◽  
pp. 1848-1851
Author(s):  
Hong Wei Tang

This paper presents an architecture for 32-bit datapath Advanced Encryption Standard(AES) IP core based on FPGA. It uses finite state machine, and supports encryption, decryption and key expansion. The round-key is calculated before the beginning of encryption and decryption. It consumes less hardware resources. It is implemented on Cyclone II FPGA EP2C35F672C6, which consumes less than 55% logic elements of the resources. The IP core can operate at a maximum clock frequency of 100 MHz. Compared with 128-bit datapath AES, it can interface with CPU easily.


Repositor ◽  
2019 ◽  
Vol 1 (2) ◽  
pp. 95
Author(s):  
Dana Putri Harum ◽  
Aminudin Aminudin ◽  
Sofyan Arifianto

AbstrakAlgoritma kriptografi merupakan salah satu unsur penting dalam pengamanan data. Berbagai improvisasi pengembangan algoritma telah dilakukan untuk mengoptimalisasikan kemanan proses pertukaran dalam suata jaringan data. Efisiensi performa menjadi salah satu pertimbangan penggunaan algoritma tertentu. AES memiliki keamanan super yang hingga saat ini keamanannya hanya dapat ditembus dengan waktu sekitar  tahun dan semilyar processor. Kompleksitas keamanan AES sebanding dengan penggunaan penggunaan memori serta waktu yang dibutuhkan untuk memproses enkripsi dan dekripsi data begitu besar. Penelitian ini melakukan modifikasi lookup table sbox dan constant matrix pada mixcolumns. Improvisasi tersebut dilakukan dengan harapan mampu meningkatkan performa agar menjadi lebih efisien. Pengujian yang dilakukan terhadap penggunaan memori, waktu komputasi serta persentase avalanche effect masing – masing memiliki selisih sebesar 24mb, 18.9 detik, serta peningkatan avalanche effect sebesar 0.92%. berdasarkan data tersebut dapat diketahui bahwa performa pada improvisasi AES ini telah mampu meningkatakan performa algoritma dengan mereduksi waktu dan memori serta meningkatkan persentase avalanche effect.Cryptographic algorithm is an important element in data security. Any improvised of algorithm development has been carried out to optimize the security of the exchange process in a data network environment. Performance efficiency is one of the considerations of using algorithms. AES has a super security nowaday and its security can only be broken about   years and a billion processors. The complexity of AES security is proportional with the memory usage and the time are needed to process encryption and decryption of data is huge. This study modified the sbox table and constant matrix in mixcolumns. That Improvement is expected of being able to improve the performance to become more efficient. Tests carried out on memory usage, computation time and the percentage of avalanche effect which have a difference of 24MB, 18.9 seconds, and an increase in the avalanche effect of 0.92%. based on the data, it can be known that the performance of the AES has been able to improve the performance of the algorithm by reducing time and memory also it is increasing the percentage of avalanche effect


Author(s):  
Varun G Menon

Security of transmitted information is a major area of concern in Internet of Things (IoT) networks especially with large number of dynamically connected devices. One of the major challenge is to design an efficient encryption and decryption mechanism for securely transmitting the data between the devices in the network. Tiny Encryption Algorithm (TEA) is the most attractive encryption technique among all, with its less memory utilization and ease of implementation in both hardware and software scales. But one of the major issues of TEA and its numerous developed versions is the usage of the same key through all rounds of encryption, which yields a reduced security evident from the avalanche effect of the algorithm. This article discusses the working of a  novel  encryption scheme termed as Tiny Symmetric Encryption Algorithm (NTSA) which provides enhanced security for the transfer of text files through the IoT network by introducing additional key confusions dynamically for each round of encryption. Experiments are carried out to analyze the avalanche effect, encryption and decryption time of NTSA in an IoT network with embedded devices. The proposed scheme is found to have better performance compared to all the existing techniques.


Author(s):  
Edjie Malonzo De Los Reyes ◽  
Ariel M. Sison ◽  
Ruji P. Medina

The continuing advancement of technology had provided security issues in protecting the confidentiality of information. The need to protect unauthorized access of a third party is warranted.  In this paper, the reduced-round modified AES with revised round keys and key schedule is proposed to ensure file confidentiality.  The modifications to the AES cipher round was the reduction of the round iterations from 10 to 6, and additional key permutations were added in between states; while in the key schedule, additional byte substitution process was appended.  Time and throughput were utilized to measure the performance of the application's encryption/decryption process; while the avalanche effect and randomness tests were used to measure the security of the modified AES algorithm.  The results of evaluations have shown that the encryption and decryption time have improved by 1.27% and 1.21% respectively while the throughput has similarly improved by 1.29% and 3.19% for both encryption and decryption respectively.  Whereas the avalanche effect of the modified AES was 50.06% which was more than the ideal value of 50% and it was also better than the standard AES which was 49.94% using the sample dataset.  Finally, all the ciphertext outputs of the modified AES passed the randomness tests.


2021 ◽  
Vol 11 (19) ◽  
pp. 9085
Author(s):  
Kyung-Kyu Ko ◽  
Eun-Sung Jung

Many hacking incidents are linked to work files because most companies work with them. However, a variety of file encryption and decryption methods have been proposed. Existing file encryption/decryption technologies are under threat as hacking technologies advance, necessitating the development of stronger encryption algorithms. Therefore, in this study, we propose a modified advanced encryption standard (AES) algorithm and use quantum computing to encrypt/decrypt AES image files. Because the shift is regular during the AES Shift Row procedure, the change technique led the shift to become irregular when using quantum random walk. Computing resources and speeds were simulated using IBM Qiskit quantum simulators for performance evaluation, whereas encryption performance was assessed using number of pixels change rate (NPCR) and unified average changing intensity (UACI).


2021 ◽  
Vol 17 (3) ◽  
pp. 1-23
Author(s):  
Ning Chen ◽  
Tie Qiu ◽  
Mahmoud Daneshmand ◽  
Dapeng Oliver Wu

The Internet of Things (IoT) has been extensively deployed in smart cities. However, with the expanding scale of networking, the failure of some nodes in the network severely affects the communication capacity of IoT applications. Therefore, researchers pay attention to improving communication capacity caused by network failures for applications that require high quality of services (QoS). Furthermore, the robustness of network topology is an important metric to measure the network communication capacity and the ability to resist the cyber-attacks induced by some failed nodes. While some algorithms have been proposed to enhance the robustness of IoT topologies, they are characterized by large computation overhead, and lacking a lightweight topology optimization model. To address this problem, we first propose a novel robustness optimization using evolution learning (ROEL) with a neural network. ROEL dynamically optimizes the IoT topology and intelligently prospects the robust degree in the process of evolutionary optimization. The experimental results demonstrate that ROEL can represent the evolutionary process of IoT topologies, and the prediction accuracy of network robustness is satisfactory with a small error ratio. Our algorithm has a better tolerance capacity in terms of resistance to random attacks and malicious attacks compared with other algorithms.


2013 ◽  
Vol 397-400 ◽  
pp. 2004-2007
Author(s):  
Wen Yan Ding ◽  
Zhi Ning Sun ◽  
Xiang Long Wang

The design on the system of low-voltage power line carrier-current communication based on OFDM was finished in this paper. Then model of the system was simulated and the modulation and demodulation of OFDM were realized. The results show that the integral performance can be enhanced with channel code. And the bit error ratio (BER) of the system is different with several sub-carrier wave modulation modes. This system could satisfy the requirement of power line communication basically.


Sign in / Sign up

Export Citation Format

Share Document