Design of Advanced Encryption Standard Algorithm | IEEE Conference Publication | IEEE Xplore

Design of Advanced Encryption Standard Algorithm


Abstract:

With the AES algorithm is used in almost all the digital communication for transmitting the data. Many of the researchers have designed the AES algorithm for ensuring mor...Show More

Abstract:

With the AES algorithm is used in almost all the digital communication for transmitting the data. Many of the researchers have designed the AES algorithm for ensuring more secured communication between the end users. In this research work an approach is made to design the AES algorithm in hardware by using the VHDL language by using 128 bits. The use of encryption and decryption process will be faster for any of the application as compared to the other 128 bits algorithm. The design also shows the significant improvement in the parameters like time period, faster output, etc
Date of Conference: 26-27 August 2022
Date Added to IEEE Xplore: 16 January 2023
ISBN Information:

ISSN Information:

Conference Location: Pune, India

I. Introduction

In today's world, data is an important entity. Throughout the world, all the human being generates and exchange huge amounts of data amongst themselves. The data should be securely transferred to the end user. Cryptography is the technique used to authenticate the secure transmission of data within the channel. It also deals with the protected way of data transfer between the source and destination. With the help of cryptography technique, the destination user can only see the actual contents of the data sent by the source user. In cryptography, the text is jumbled and additional content is added, which is known only to the source user and destination user. In cryptography, text data is encrypted at the source end and the encrypted data is transmitted through the channel. Later, at the destination end, the data is decrypted and original text data is recovered. In short, cryptography is a mechanism to transmit data in the specific format recognised by the allowed users. There are various ways to carry out the encryption and decryption process.

Contact IEEE to Subscribe

References

References is not available for this document.