Advanced Encryption Standard
@inproceedings{Miller2009AdvancedES, title={Advanced Encryption Standard}, author={Frederic P. Miller and Agnes F. Vandome and John McBrewster}, year={2009} }
In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES…
508 Citations
Study of the IEEE Standard 1619.1: Authenticated Encryption with Length Expansion for Storage Devices
- Computer Science, Mathematics
- 2009
This Thesis will analyze the standard 1619.1 published by the IEEE to provide authenticated encryption to stored data with AES algorithm working in XTS mode, a 128-bit block cipher characterized by the use of two AES encryptions with two different keys of the same size.
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
- Computer Science, Mathematics
- 2013
The result shows that the new nonlinear implementation of the AES S-Box by using Verilog provides enhanced security with good enough speed for encryption and decryption.
AES: Current security and efficiency analysis of its alternatives
- Computer Science, Mathematics2011 7th International Conference on Information Assurance and Security (IAS)
- 2011
This paper reviews existing attacks on the AES and evaluates the efficiency of recent block cipher proposals as alternatives to the AES to patch the AES against the related-key type of attack.
VLSI IMPLEMENTATION FOR SECURITY PARADIGM OF AES INCLUDING DPA ATTACKS
- Computer Science, Mathematics
- 2014
To protect FPGAs from DPA attack, the problem of randomized execution in a loop has been comparatively analysed and a few algorithms to randomize the implementation in aloop has been proposed.
Proposing of Developed Advance Encryption Standard
- Computer Science, Mathematics2011 Developments in E-systems Engineering
- 2011
This paper presents a variant of Advance Encryption Standard (AES) cipher that is depending on the same structure of the original AES Substitution Permutation Network (SPN) and the same mathematical…
A Survey on Authenticated Encryption--ASIC Designer’s Perspective
- Computer Science, MathematicsACM Comput. Surv.
- 2018
This work presents a comprehensive survey of hardware performance of the most commonly used AE schemes in the literature, and reveals 13%--30% performance boost in permutation-based AE compared to conventional schemes, and can be used as a benchmark in the ongoing AE competition CAESAR.
Efficiency of AES finalist candidate algorithms
- Computer Science
- 2010
The paper evaluates three AES algorithms which are Rijndael, Serpent, and Twofish and finds that Rij secondael is the best.
Development AES Algorithm to Encryption Images and Sounds Files
- Computer Science
- 2012
The implement algorithm with a sample of histogram was used to ensure that the data is not changed throughout this study, by comparing the block size of images or sounds files through the encrypting or decrypting system by scanning bit to bit operations.
FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL
- Computer Science, Mathematics
- 2014
A unique feature of the proposed pipelined design is that the round keys, which are consumed during different iterations of encryption, are generated in parallel with the encryption process, which lowers the delay associated with each round of encryption and reduces the overall encryption delay of a plaintext block.
Enhanced Security of Rijndael Algorithm using Two Secret Keys
- Computer Science
- 2013
There is an attempt to Enhance the security of rijndael algorithm by adding another key in both encryption and decryption operations to increase the strength of security and keep the performance close to traditional algorithm as much as possible.