scholarly journals Development of the Advanced Encryption Standard

Author(s):  
Miles E. Smid

Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development of Federal Information Processing Standards Publication (FIPS) 197, which specifies a cryptographic algorithm known as the Advanced Encryption Standard (AES). The AES was the result of a cooperative multiyear effort involving the U.S. government, industry, and the academic community. Several difficult problems that had to be resolved during the standard’s development are discussed, and the eventual solutions are presented. The author writes from his viewpoint as former leader of the Security Technology Group and later as acting director of the Computer Security Division at the National Institute of Standards and Technology, where he was responsible for the AES development.

2021 ◽  
Author(s):  
Nicky Mouha

The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).


A novel cryptographic algorithm, namely Significant Secure Biometric Key (SSBK) algorithm is proposed.The novel algorithm is compared with the existing cryptographic algorithms like Advanced Encryption Standard (AES), key exchange algorithm like Diffie-Helman and also with Symmetric Random Biometric Key (SRBK) algorithm, and finally we prove the proposed algorithm is superior than existing algorithm based on few parameters. A sample plain text is taken and converted to cipher text and the key from the biometric feature is used for encryption and decryption. In the key generation process, the bi-modal biometrics, namely Ear and Lip features are taken. The concatenated key values obtained from ear and lip can be of minimum 8 bits to the maximum of 1024 bits based on the type of algorithm used.


Author(s):  
Rachel K. Smith ◽  
R. Edward Bashaw

One of the most visible retailing phenomena of the past two decades has been the increase in sales of private labels (PL), or retail brands. Driven by retail consolidation, attractive margins, consumer sophistication, supply chain efficiencies, merchandising strategies, and pricing, PL offer a wider assortment of price and merchandise options for both retailer and consumer. An important part of the overall merchandising mix in the U.S. and Europe for decades, PL have only recently begun to make inroads in other parts of the world. Using the information processing theory, this paper outlines how retailers in three big emerging markets should use the theory in practice to enhance their PL branding strategy.


2013 ◽  
Vol 21 (3) ◽  
pp. 171-184
Author(s):  
Kenichi Arai ◽  
Hiroyuki Okazaki

Summary In this article, we formalize the Advanced Encryption Standard (AES). AES, which is the most widely used symmetric cryptosystem in the world, is a block cipher that was selected by the National Institute of Standards and Technology (NIST) as an official Federal Information Processing Standard for the United States in 2001 [12]. AES is the successor to DES [13], which was formerly the most widely used symmetric cryptosystem in the world. We formalize the AES algorithm according to [12]. We then verify the correctness of the formalized algorithm that the ciphertext encoded by the AES algorithm can be decoded uniquely by the same key. Please note the following points about this formalization: the AES round process is composed of the SubBytes, ShiftRows, MixColumns, and AddRoundKey transformations (see [12]). In this formalization, the SubBytes and MixColumns transformations are given as permutations, because it is necessary to treat the finite field GF(28) for those transformations. The formalization of AES that considers the finite field GF(28) is formalized by the future article.


Author(s):  
P. SAVEETHA ◽  
S. ARUMUGAM

The Network Security means to protect data during their transmission over channel of networks similarly Internet Security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots of cryptographic algorithms available to protect our data from intruders.RSA also one of effective the public key cryptographic algorithm which needs time and memory. Many research papers submitted on this cryptographic algorithm. Each paper has different perspective.


Author(s):  
Amir Mahmud Hasibuan

Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information). Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text.


2020 ◽  
Vol 7 (1) ◽  
pp. 14-21
Author(s):  
Adrián Alfonso Peñate ◽  
Pablo Freyre Arrozarena

Abstract— With the approve of the cryptographic algorithm Rijndael as the AES (Advanced Encryption Standard) and a collection of works exists with the purpose that one or several of its internal functions depend on the selected key. In this work we will study a fault analysis model against the algorithm AES, and then we will analyze for dynamic (in the key-dependency sense) cryptographic algorithms based on AES, in the which ones the internal function ShiftRows is randomly selected in every round, how strong is this attack.Tóm tắt— Với việc thuật toán mã hóa Rijndael được chấp nhận là Tiêu chuẩn mã hóa nâng cao (Advanced Encryption Standard - AES), và một loạt các công trình nghiên cứu về một hoặc một số chức năng bên trong của thuật toán phụ thuộc vào khóa đã được công bố. Bài báo này trình bày về nghiên cứu mô hình phân tích lỗi dựa trên thuật toán AES và phân tích các thuật toán mã hóa động (theo nghĩa phụ thuộc khóa) dựa trên AES. Trong đó, các hàm nội bộ ShiftRows được chọn ngẫu nhiên trong mỗi vòng, để đánh giá mức độ nguy hiểm của cuộc tấn công.


Author(s):  
A. Tsygankov ◽  
P. Tsygankov

The article contributes to the recent discussion of roles played by the global core and periphery in forming knowledge about the world. As the world moves away from the U.S. political hegemony, the global scholarship on international relations too reflects a greater cultural diversity. The recent attempts by International Relations scholars to create room for knowledge from the perspective of the “non-American” and “non-Western” periphery have implications for Western, particularly American, intellectual hegemony. While inviting a dialogue across the globe, new voices from Asia, Africa, and Latin America are challenging the position of the West’s ideological and cultural dominance. The increasingly multipolar world may be becoming multicultural as well. The (re)emergence of discussion in International Relations theory on roles played by the global core and periphery in forming knowledge about the world raises important questions about the potential of “non-Western” cultures to contribute to global academic developments. If the world is indeed moving away from the U.S. political and intellectual hegemony, what role would local cultures have in knowledge formation? As a “semi-peripheral” nation, Russia may speak on behalf of both the center and peripheral parts of the world, thereby becoming an important voice in the global conversation. This paper reviews discussions among Russian scholars by identifying the dominant schools as Universalist and Pluralist. Both are in favor of Russia’s continued integration with the global IR community, but stress different sides of such integration. While Universalists argue for the ontological and epistemological unity of the world, Pluralists emphasize social, cultural, and intellectual diversity. Based on a survey among those teaching IR theory in Russian educational institutions, the paper also reviews development of the discipline as viewed by the Russian academic community. Russian academics assess the state of IR theory as a crisis relative to intellectual developments in the country’s recent past and abroad. The progress of Russian IR depends on its continued global integration and the development of indigenous Russian political thought.


2003 ◽  
Vol 33 (1) ◽  
pp. 153-160

The separation wall, one of the largest civil engineering projects in Israel's history, has been criticized even by the U.S. administration, with Condoleezza Rice stating at the end of June 2003 that it ““arouses our [U.S.] deep concern”” and President Bush on 25 July calling it ““a problem”” and noting that ““it is very difficult to develop confidence between the Palestinians and Israel with a wall snaking through the West Bank.”” A number of reports have already been issued concerning the wall, including reports by B'Tselem (available at www.btselem.org), the UN Office for the Coordination of Humanitarian Affairs (available at www.palestinianaid.info), and the World Bank's Local Aid Coordination Committee (LACC; also available at www.palestinianaid.info). UNRWA's report focuses on the segment of the wall already completed and is based on field visits to the areas affected by the barriers, with a special emphasis on localities with registered refugees. Notes have been omitted due to space constraints. The full report is available online at www.un.org/unrwa.


Sign in / Sign up

Export Citation Format

Share Document