scholarly journals Data Security using 128-bit Advanced Encryption Standard Algorithm

Author(s):  
Andysah Putera Utama Siahaan ◽  
Virdyra Tasril

The development of computer and telecommunications technology has experienced the significant change inprogress. It can be seen that technology has become a necessity because technological advances can accomplishtasks quickly, accurately, and efficiently. In line with the development of these technologies, it increasinglychanges the way people communicate. There needs to be security protection to protect data from the threat ofwild parties. Cryptography is the right method to secure data. One method that can be used is the AdvancedEncryption Standard (AES). This method is an excellent classical cryptographic algorithm that can be used toidentify data. AES algorithm is a symmetric ciphertext block that can encrypt and decrypt information quickly.Encryption changes data that can no longer be read called ciphertext; instead, decryption is changing theciphertext data into the original form that we know as plaintext. The AES algorithm has several key modelssuch as 128, 192, and 256 bits to encrypt and decrypt data on 128-bit message blocks. This study uses a 128-bitkey. AES encryption results can be trusted as one of the fast and powerful encryption methods.

2018 ◽  
Vol 3 (1) ◽  
pp. 61-70
Author(s):  
Rajamohan Parthasarathy ◽  
◽  
Seow Soon Loong ◽  
Preethy Ayyappan ◽  
◽  
...  

The AES algorithm is a symmetric block cipher that can encrypt, (encipher), and decrypt, (decipher), information. Encryption converts data to an unintelligible form called cipher-text. Decryption of the cipher-text converts the data back into its original form, which is called plaintext. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. The National Institute of Standards and Technology, (NIST), solicited proposals for the Advanced Encryption Standard, (AES). The AES is a Federal Information Processing Standard, (FIPS), which is a cryptographic algorithm that is used to protect electronic data. Advanced Encryption Standard (AES), specifying an Advanced Encryption Algorithm to replace the Data Encryption standard (DES) the Expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which Rijndael was chosen as the Advanced Encryption Standard. Some of these implementations are optimized for speed, some for area, some for configurability, and some for low-power applications. This is carried out in the Cadence Tool with NC simvision software.


Author(s):  
Amir Mahmud Hasibuan

Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information). Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text.


2020 ◽  
Vol 1 (2) ◽  
pp. 93-104
Author(s):  
Shabila Fitri Aulia ◽  
Siti Sauda

Technological advances have developed rapidly nowadays. These technological advances are also in line with the development of ways of communicating both orally and in writing. In terms of writing, maintaining aspects of data security and confidentiality is very important. Many technologies can be used to secure data such as cryptography and steganography. This research will use the First of File and End of File Steganography Algorithms to secure data. Steganography is the science of hiding messages or data in the media. The First of File and End of File methods are one of the many methods commonly used in the Steganography Algorithm. Generally, the First of File and End of File methods are not much different. The First of File method inserts a message at the beginning of the file, while End Of File inserts a message at the end of the file. This technology can also be applied again for the years to come. This research produces an overview after a review study of the application of the FOF and EOF steganographic algorithms, the speed of steganography and the differences in the image after steganography in terms of image size and pixel. Kemajuan teknologi sudah sangat berkembang dengan pesat pada era sekarang. Kemajuan teknologi ini juga seiring dengan berkembangnya cara berkomunikasi baik secara lisan maupun tulisan. Dalam hal tulisan, menjaga aspek keamanan dan kerahasiaan data sangatlah penting. Banyak teknologi yang bisa dipakai untuk mengamankan data seperti kriptografi dan steganografi. Penelitian ini akan menggunakan Algoritma Steganografi First Of File dan End Of File untuk mengamankan data. Steganografi merupakan ilmu menyembunyikan pesan atau data ke dalam media. Metode First Of File dan End Of File merupakan salah satu dari banyaknya metode yang biasa digunakan pada Algoritma Steganografi.Umumnya,metodeFirst Of File dan End Of File tidak jauh berbeda. Metode First Of File akan menyisipkan pesan diawal file sedangkan End Of File akan menyisipkan pesan di akhir file. Teknologi ini juga dapat diaplikasikan kembali untuk tahun-tahun kedepannya. Penelitian ini menghasilkan gambaran setalah studi review penerapan algoritma steganografi FOF dan EOF , kecepatan steganografi dan juga perbedaan gambar setelah di steganografi dalam hal ukuran dan pixel gambar.


2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


2021 ◽  
Vol 15 (2) ◽  
pp. 65-75
Author(s):  
Maulyanda Az ◽  
Syafrial Fachri Pane ◽  
Rolly Maulana Awangga

Abstrak Penelitian ini membantu dalam melalukan proses Keamanan data atau informasi untuk menjamin kerahasiaan dan keaslian data atau informasi. Dalam perancangan ini menggunakan Kriptografi sebagai salah satu solusi dalam mengamankan data atau informasi. Metode kriptografi digunakan untuk mempersatukan algoritma Md5, Base64 serta AES (Advanced Encryption Standard). Kombinasi dari tiga algoritma menghasilkan ciphertext, yang dapat mengamankan data dari proses tag NFC. Penelitian ini menggunakan metodologi penelitian yang dapat menyatakan bahwa sistem yang dibangun dapat berfungsi dengan baik dan untuk keamanan nya aman digunakan, dari hasil penerapannya didapatkan hasil persentase keberhasilan 100%. Jadi, penelitian ini mampu menjawab permasalahan yang terjadi pada sistem keamanan data. Abstract This research helps in carrying out data or information security to ensure the confidentiality and authenticity of data or information. This design uses Cryptography as a solution in securing data or information. Cryptographic methods to unify the Md5, Base64, and AES (Advanced Encryption Standard) algorithms. The combination of the three algorithms produces ciphertext, which can secure data from the NFC tag process. This study uses a research methodology that can state that the system built can function correctly, and for security, it is safe to use because it has a 100% success percentage. So, this researchable to answer the problems that occur in the data security system.


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


In this paper, we propose a novel cryptographic algorithm namely Symmetric Random Biometric key (SRBK) algorithm. The key for this SRBK algorithm is obtained from two biometric features namely ear and lip. The key generated are flexible and can be altered based on the type of algorithm used. We also consider Advanced encryption standard (AES) algorithm for comparison with SRBK algorithm and finally it was proved that SRBK algorithm is better than AES algorithm on selected parameters.


2017 ◽  
Vol 26 (09) ◽  
pp. 1750141 ◽  
Author(s):  
Soufiane Oukili ◽  
Seddik Bri

Cryptography has an important role in data security against known attacks and decreases or limits the risks of hacking information, especially with rapid growth in communication techniques. In the recent years, we have noticed an increasing requirement to implement cryptographic algorithms in fast rising high-speed network applications. In this paper, we present high throughput efficient hardware implementations of Advanced Encryption Standard (AES) cryptographic algorithm. We have adopted pipeline technique in order to increase the speed and the maximum operating frequency. Therefore, registers are inserted in optimal placements. Furthermore, we have proposed 5-stage pipeline S-box design using combinational logic to reach further speed. In addition, efficient key expansion architecture suitable for our proposed design is also presented. In order to secure the hardware implementation against side-channel attacks, masked S-box is introduced. The implementations had been successfully done by virtex-6 (xc6vlx240t) Field-Programmable Gate Array (FPGA) device using Xilinx ISE 14.7. Our proposed unmasked and masked architectures are very fast, they achieve a throughput of 93.73 Gbps and 58.57 Gbps, respectively. The obtained results are competitive in comparison with the implementations reported in the literature.


2021 ◽  
Vol 5 (3) ◽  
pp. 806
Author(s):  
Muhammad Fadlan ◽  
Rosmini Rosmini ◽  
Haryansyah Haryansyah

Data security is an important thing that must be done in the cyber era. The use of various kinds of digital technology in helping various human activities needs to be balanced with adequate data security. One of the ways that can be used in securing data is through cryptography. Atbash cipher is one of the cryptographic techniques used in securing data. However, this algorithm has a weakness because it only uses the process of reversing the position of the characters to be secured. This study proposes a cryptographic model that can maximize data security from the atbash cipher. The proposed model is a combination of the atbash cipher with the autokey cipher. The tests carried out on the proposed model have a 100% success rate, meaning that the encrypted message resulting from the proposed encryption process has been successfully restored to its original form through the proposed decryption process. The results of this study indicate that the atbash cipher cryptographic algorithm, combined with the autokey cipher algorithm can produce an encrypted message that is more difficult to crack.


2018 ◽  
Vol 7 (2) ◽  
pp. 40-43
Author(s):  
Prakhar Agrawal ◽  
Arvind Upadhyay

Steganography and cryptography are two major aspects of data security . In this paper we are going to provide the survey of different techniques of LSB based Steganography that used cryptography algorithms to secure sensitive information. Steganography is used to hide data and Cryptography is used to encrypt the data. Although cryptography and steganography individually can provide data security, every of them has a drawback. Drawback associated with Cryptography is that, the cipher text looks meaningless, so the unintended user can interrupt the transmission or make more careful checks on the information from the sender to the receiver. Drawback associated with Steganography is that when the presence of hidden information is revealed or even suspected, the message is become known[1].By combining these two methods we can solve both of the above problem. First we encrypt the data using any cryptography technique and then embed the encrypted text into the image. Steganography is the process which hides the presence of secure data during communication. On the other hand cryptography is encrypting and decrypting of secure data and information with a secrete key so that no one can be understand the message directly.


Sign in / Sign up

Export Citation Format

Share Document