A Comparative Study of AES Encryption Decryption
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 4, April 2014

A Comparative Study of AES Encryption Decryption

Gurpreet Kaur, Nishi Madaan

AES (Advanced Encryption Standard) is an effective encryption algorithm in applications like internet to provide cyber security and also in smart cards. In November 2001, the National Institute of Standard and Technology (NIST) of the United States choose the Rijndael algorithm as the suitable Advanced Encryption Standard (AES) to replace the Data Encryption Standard (DES) algorithm. AES is used in almost all network based applications to ensure security. The core computation of AES, which is performed on data blocks of 128 bits, is iterated for several rounds, depending on the key size. The strength of AES is proportional to the number of rounds applied. The number of rounds is fixed to 10, 12 and 14 for a key size of 128, 192 and 256 bits respectively. The AES functional calculations include four transformation stages, which are Sub Bytes, Shift Rows, MixColoumns and AddRoundKey. In this paper, we have critically analyzed various AES techniques and also have covered AES overview such that its Structure, Transformation Functions and Key Expansion.

Keywords: AES, DES, Encryption Algorithm, Rijndael, FPGA, Throughput

Edition: Volume 3 Issue 4, April 2014

Pages: 279 - 283

Share this Article

How to Cite this Article?

Gurpreet Kaur, Nishi Madaan, "A Comparative Study of AES Encryption Decryption", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=9041405, Volume 3 Issue 4, April 2014, 279 - 283

104 PDF Views | 93 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'AES'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2784 - 2789

CAMP: Cloud Assisted Mobile Health Care System with Privacy

R. Abirami, Dr. S. T. Deepa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Similar Articles with Keyword 'DES'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Similar Articles with Keyword 'Encryption Algorithm'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 842 - 846

An Efficient Technique of Steganography

Latika, Yogita Gulati

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1420 - 1422

AHCS (Advanced Hybrid Cryptographic System)

Mohit Prakash

Share this Article

Similar Articles with Keyword 'Rijndael'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 733 - 736

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2225 - 2229

A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud

Sunita, Shridevi Soma

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 279 - 283

A Comparative Study of AES Encryption Decryption

Gurpreet Kaur, Nishi Madaan

Share this Article

Similar Articles with Keyword 'FPGA'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 681 - 684

Preparation of Test Data from the Simulated and Test Beam Data for Testing the ATLAS New Small Wheel FPGA-Based Trigger Processor

Jayasree S, Reshmy V R, Dr. Lorne Levinson

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 12, December 2018

Pages: 1192 - 1197

Using Magnetic Tunnel Junction to Model of SRAM as a Non Volatile SRAM

Veronica Sheran.E

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 394 - 396

FPGA Based Diabetic Patient Health Monitoring Using Fuzzy Neural Network

Akanksha Nilosey

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 279 - 283

A Comparative Study of AES Encryption Decryption

Gurpreet Kaur, Nishi Madaan

Share this Article

Similar Articles with Keyword 'Throughput'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 679 - 682

Optimized Energy Conservation in WLAN Using Dynamic Sleep Scheduling

Ajesh. P. A, R. Gowthamani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article
Top