Pages

This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.

Monday 11 November 2019

Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization

Data and network security is one among the foremost necessary factors in today’s business world. In recent, businesses and firms like financial institutions, law firms, schools, health sectors, telecommunications, mining and a number of government agencies want a strategic security technique of managing its data. Organizations managing bigger monetary information, bio-data and alternative relevant info are losing its valuable information or data at rest, in usage or in motion to unauthorized parties or competitors as a result of activities of hackers. Organizations are losing millions of dollars as a result of unprotected data that gets into the hands of malicious persons. Data protection in an organization has become vital in today’s business. In order to possess secure information, this information should be protected in order that although malicious persons get access to the info, it becomes wealthless and useless to them. Advanced Encryption Standard (AES), could be a scientific discipline rule that may be used for secured data and communication in an organization, it uses same key that's isobilateral key for transmission additionally as reception. The AES rule is capable of using cryptographic keys of 128, 192, and 256 bits, this paper implement AES block cipher of 256-bits and 256-bit key size, developed with C# as a front-end client machine and MS SQL used for the database as a back-end machine.

Keywords: Cryptography; AES algorithm; Decryption; Encryption; Cipher; 256-bit-key

Sunday 10 November 2019

Implementation of 128, 192 & 256 bits Advanced Encryption Standard on Reconfigurable Logic

Implementation of 128, 192 & 256 bits Advanced Encryption Standard on Reconfigurable Logic
Monika Gupta1 , Swapnil Mahto 2 , Ambresh Patel 3
M.tech Scholar1, Assistant Professor 2, Assistant Professor 3
Sri Satya Sai College of Engineering Bhopal M.P. India
Abstract - Advanced encryption standard is adopted by NIST to replace data encryption standard, which was affected by several attacks. In this paper implementation of all three modes namely 128, 192 and 256 of advanced encryption standard is discussed for reconfigurable logic. All these modes are implemented using four design architectures namely: 2 stage sequential, 3 stage sequential , combinational and pipelined.
Keywords - Advanced encryption standard, Sequential, combinational, pipelined, encryption,
cryptography

Source:http://www.ijettjournal.org/


Saturday 9 November 2019

SMS ENCRYPTION USING AES ON ANDROID APPLICATION

Encryption is of great importance once the confidentiality of information is to be maintained over the network. SMS being one of the major means of data exchange among the mobile users.xSecurityxofxSMS is one of the major issues that must be handled during data transmission. So, by using Android technology an application has been developed by us which permits the sender to encode the messages before they are sent over the network. For the encryption and decryption process we have used Advanced Encryption Standard (AES) as the cryptographic algorithm. The application allows the user to input the key and the message which has to be encrypted and hence generate an encrypted message which can be decrypted by the receiver. The encrypted text so developed by the app is also resistant to Brute-Force attacks we have used AES.

Source: 122.252.232.85


Sunday 3 November 2019

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14 Rounds

An Improved AES Cryptosystem Based Genetic Method on S-Box, With, 256 Key Sizes and 14 Rounds
Ashutosh Pandey1
, Umesh Kumar Lilhore2
1 M.Tech Scholar, Dept. of CSE, NIIST Bhopal, India
2 NIIST Bhopal, A.P Dept. of CSE, NIIST Bhopal, India

Abstract— Cryptography methods are widely used in digital communication for secure data transactions. Cryptography methods have two categories symmetric and asymmetric. Both types of encrypting have their own importance and limitations. In Symmetric key-based encryption same key is used for encryption and decryption process. One of the most popular and widely used symmetric encryption methods is (AES) Advanced encryption standard, which attracts researchers to develop a more efficient AES cryptosystem. In this research work, we are presenting an improved AES encryption method “IAES”. The proposed IAES method uses a modified S-Box by employing a Genetic algorithm (GA) with a key size of 256 bit. In proposed method IAES, GA will be used in the S-box to perform various pipelined operations such as substitution, shifting of rows, mixing of a column and to perform Add Round Key in the AES rounds. In this work proposed IAES and existing AES method both are implemented over MATLAB simulator and various comparison parameters such as encryption time, speed and decryption time and speed are calculated. The high level of system integration along with high speed and high throughput makes the proposed IAES based cryptosystem a perfect choice for a spread of application.
Keywords— Cryptography, Symmetric, AES, S-box, Sbox, Genetic Algorithm
Source:https://media.neliti.com

Saturday 2 November 2019

[PAPER CRYPTOGRAPHY] AES Encryption and Decryption Using Direct3D 10 API

AES Encryption and Decryption Using Direct3D 10 API
Adrian Marius Chiuţă
Computer Science Department, IT&C Security Master
Cybernetics and Economic Informatics
Academy of Economic Studies
Calea Dorobanţilor, Nb. 15-17, Room 2315, Sector 1, Bucharest
ROMANIA
achiuta@tessera.com, http://ism.ase.ro

Abstract: Current video cards (GPUs – Graphics Processing Units) are very programmable have become much more powerful than the CPUs and they are very affordable. In this paper, we present an implementation for the AES algorithm using Direct3D 10 certified GPUs. The graphics API Direct3D 10 is the first version that allows the use of integer operations, making from the traditional GPUs (that works only with floating-point numbers), General Purpose GPUs that can be used for a large number of algorithms, including encryption. We present the performance of the symmetric key encryption algorithm – AES, on a middle-range GPU and on a middle-range quad-core CPU. On the testing system, the developed solution is almost 3 times faster on the GPU than on one single-core CPU, showing that the GPU can perform as an efficient cryptographic accelerator

Source:https://arxiv.org/
Download Full Paper

Friday 1 November 2019

Secure Data Encryption Through a Combination of AES, RSA, and HMAC

Secure Data Encryption Through a Combination of AES, RSA, and HMAC
Eman Salim Ibrahim Harba
Computer Unit and Internet
College of Arts, University of Baghdad
Baghdad, Iraq
emanharba_121212@coart.uobaghdad.edu.iq

Abstract—Secure file transfer based upon well-designed file encryption and authorization systems expend considerable effort to protect passwords and other credentials from being stolen. Transferring and storing passwords in plaintext form leaves them at risk of exposure to attackers, eavesdroppers and spyware. To avoid such exposure, powerful encryption/authentication systems use various mechanisms to minimize the possibility that unencrypted credentials will be exposed, as well as be sure that any authentication data that does get transmitted and stored will be of minimal use to an attacker. In this paper, we proposed a method to protect data transferring by three hybrid encryption techniques: symmetric AES the algorithm used to encrypt files, asymmetric RSA used to encrypt AES password and HMAC to encrypt a symmetric password and/or data to ensure a secure transmitting between server-client or client-client from verifying in-between client and server and make it hard to attack by common attacked methods.
Keywords: Cryptography; Data Encryption; AES; RSA; HMAC

Source: https://www.etasr.com/

[PAPER CRYPTOGRAPHY ] Image encryption and decryption using AES algorithm

Image encryption and decryption using AES algorithm
Priya Deshmukh

Abstract— In today’s world data security is the major problem which is to face. In order to secure data during communication, data storage and transmission we use Advance encryption standard(AES). AES is a symmetric block cipher intended to replace DES for commercial applications.it uses 128-bit block size and a key size of 128, 192, or 256 bits. The AES algorithm is used to secure data from unauthorized user. The available AES algorithm is used for text data as well as for image data. In this paper an image is given as input to the AES encryption algorithm which gives encrypted output. This encrypted output is given as input to the AES decryption algorithm and the original image is regained as output. The AES algorithm for image encryption and decryption which synthesizes and simulated with the help of MATLAB software 

Index Terms— AES, cipher, DES, image encryption, image decryption, MATLAB

Source:https://www.ijser.org
Download Full Paper