SlideShare a Scribd company logo
DESIGN AND IMPLEMENTATION
OF DATA SECURITY USING
ADVANCED ENCRYPTION
STANDARD(AES)
ABSTRACT
 The daily demands of 60 percent of the world's population include the
internet, which is a need in modern living. Data security and privacy are
issues when using the internet because hackers can use this data.
 Therefore, taking this into consideration, we proposed the advance custom
configurable algorithm for AES in this article.
 This is accomplished by adding an additional layer of protection to each letter
of a message so that hackers cannot encrypt it.
 We are adding a new layer of encryption that is already specified by the
algorithm, changing the keys for each letter and removing the vulnerability to
frequent attacks.
 The already more secure AES algorithm is protected by this new layer. Digital
encryption plays a crucial role in today's digital environment in protecting
electronic data transfers. This information consists of documents related to
finances and the law, to health, to automatic and online banking etc.
 The Advanced Encryption Standard (AES) for electrical data encryption can be
utilized to meet these requirements. Although no significant AES attacks have
been identified to far, Keywords:- AES(Advanced Encryption Standard
INTRODUCTION
Advanced Encryption Standard, also known as AES, is widely used symmetric
encryption technique. It is mostly utilized to encrypt and safeguard electronic
data. Because it is faster and more effective than DES (Data encryption standard),
it was used to replace DES. AES is a block cipher, and it comprises of three
different block ciphers that are used to provide data encryption.
Key sizes range from 128 to 256 bits. Data is encrypted in chunks of 128 bits.
Thus, from 128 bits of input, it produces 128 bits of encrypted cipher text as
output. The substitution-permutation network principle, which underlies AES's
functioning, involves a series of connected processes that replace and shuffle the
incoming data.
How the cipher works : Instead than operating on bits of data, AES operates
on data in bytes. The encryption examines 128 bits (or 16 bytes) of the incoming
data at a time since each block is 128 bits in size. According to the key length, the
number of rounds will vary as follows:
• 10 rounds with a 128-bit key
• 12 cycles for a 192-bit key
• 14 cycles for a 256-bit key
PROPOSED SYSTEM
ENCRYPTION :The sender, who wishes to send a text message to another
user known as the recipient, initiates the application. The Caesar cypher
is used to encrypt the plaintext, which is entered into a textbox and then
converted to an intermediate ciphertext when the "encrypt" button is
pressed. The last letter of the plaintext is used as the key in this
encryption, and depending on whether the string is odd or even in length,
it is inserted at a specific index in the ciphertext.
Decryption: Using a customised Caesar Cipher decryption configuration
and the AES approach in reverse, the user will be able to transform the
ciphertext into plaintext in this case. On the receiver's end, this is done
in the application. This is accomplished by using the JAVA programming
language and creating the AES algorithm's code. The plaintext is
converted to ciphertext and then stored in the database. The same
process is used for decryption as well, but in reverse. The ciphertext is
taken out of the database and made plaintext again. The military and
several top-secret government intelligence agencies will be the main
users of this application. Basically, this concept can be used by any
company that wants to exchange messages with high security.
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
PIPELINED ARCHITECTURE
• Three architectural optimization approaches can be used to speed up
the AES algorithm in non-feedback modes by duplicating hardware for
implementing each round, which is also called round unit.
• These architectures are based on pipelining, subpipelining and loop-
unrolling. The pipelined architecture is realized by inserting rows of
registers between each round unit.
• Similar to the pipelining, subpipelining also inserts rows of registers
among combinational logic, but registers are inserted both between
and inside each round unit.
• In pipelining and subpipelining, multiple blocks of data are processed
simultaneously. Comparatively, loop unrolled or unfolded architectures
can process only one block of data at a time, but multiple rounds are
processed in each clock cycle.
• Among these architectural optimization approaches, subpipelining can
achieve maximum speedup and optimum speed/area ratio in non-
feedback modes.
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
ARCHITECTURE FOR SUB-PIPELINED AES
WITH 128BIT KEY
It offers consumers exceptional security and may be deployed on both
hardware and software.
It is one of the top open source options available for encryption.
It is an extremely reliable algorithm.
CHARACTERISTICS
ADVANTAGES
· AES uses keys with
lengths of 128, 192,
and 256 bits.
· It is adaptable and
has software and
hardware
implementations.
· It offers strong
security and can
stop numerous
threats.
· Since it is
copyright-free,
anyone can use it
anywhere in the
world.
· For 128 bit keys,
there are 10
processing rounds.
LITERATURE SURVEY
• NIST (National Institute of Standards and Technology) created AES in 1997. It was
created to take the place of DES, which was slow and open to many attacks. In
order to fix DES's flaws, a new encryption algorithm was developed. AES was
subsequently released on November 26, 2001.
• N Sivasankari et al. (2017) report that both encryption and decryption have been
actualized into a single chip (FPGA-XC5VLX50T), and that they perform with
minimal resource utilisation and a high throughput of 38.65Gbps in their paper
"Implementation of Area Efficient 128-bit Based AES Algorithm in FPGA." Talari
Bhanu Teja et al. (2017

More Related Content

PDF
IRJET - Enhancement in AES Algorithm
PDF
Hybrid AES DES
PDF
Advanced Encryption Standard (AES) with Dynamic Substitution Box
PDF
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
PDF
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
PPTX
Symmetric--Cipher-Model-An-Overview.pptx
IRJET - Enhancement in AES Algorithm
Hybrid AES DES
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
International Journal of Engineering Research and Development (IJERD)
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
Symmetric--Cipher-Model-An-Overview.pptx

Similar to DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx (20)

PDF
IRJET- Comparative Analysis of Encryption Techniques
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
Tdp.a029a10
PDF
G04701051058
PDF
IRJET- Cloud Data Security using AES Algorithm
PPTX
CNS team 6.pptx
PDF
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
PDF
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
PDF
H0154448
PDF
A performance evaluation of common
PDF
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
PDF
Implementation of Cryptography Architecture with High Secure Core
PDF
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
PDF
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
PPTX
Difference between ECC and RSA PublicKey
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
PPTX
Advance Encryption Standard and its better performance
PDF
Advanced Encryption Standard (AES)
PDF
An Efficient VLSI Architecture for AES and It's FPGA Implementation
PDF
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Tdp.a029a10
G04701051058
IRJET- Cloud Data Security using AES Algorithm
CNS team 6.pptx
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
H0154448
A performance evaluation of common
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
Implementation of Cryptography Architecture with High Secure Core
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Difference between ECC and RSA PublicKey
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Advance Encryption Standard and its better performance
Advanced Encryption Standard (AES)
An Efficient VLSI Architecture for AES and It's FPGA Implementation
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database

Recently uploaded (20)

PPT
DATA COLLECTION METHODS-ppt for nursing research
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
How to run a consulting project- client discovery
PPTX
modul_python (1).pptx for professional and student
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PDF
annual-report-2024-2025 original latest.
PDF
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
PDF
Oracle OFSAA_ The Complete Guide to Transforming Financial Risk Management an...
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
Microsoft Core Cloud Services powerpoint
PDF
Introduction to Data Science and Data Analysis
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Pilar Kemerdekaan dan Identi Bangsa.pptx
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
DATA COLLECTION METHODS-ppt for nursing research
Introduction-to-Cloud-ComputingFinal.pptx
How to run a consulting project- client discovery
modul_python (1).pptx for professional and student
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
annual-report-2024-2025 original latest.
Data Engineering Interview Questions & Answers Batch Processing (Spark, Hadoo...
Oracle OFSAA_ The Complete Guide to Transforming Financial Risk Management an...
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Qualitative Qantitative and Mixed Methods.pptx
Microsoft Core Cloud Services powerpoint
Introduction to Data Science and Data Analysis
climate analysis of Dhaka ,Banglades.pptx
Pilar Kemerdekaan dan Identi Bangsa.pptx
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
STERILIZATION AND DISINFECTION-1.ppthhhbx

DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx

  • 1. DESIGN AND IMPLEMENTATION OF DATA SECURITY USING ADVANCED ENCRYPTION STANDARD(AES)
  • 2. ABSTRACT  The daily demands of 60 percent of the world's population include the internet, which is a need in modern living. Data security and privacy are issues when using the internet because hackers can use this data.  Therefore, taking this into consideration, we proposed the advance custom configurable algorithm for AES in this article.  This is accomplished by adding an additional layer of protection to each letter of a message so that hackers cannot encrypt it.  We are adding a new layer of encryption that is already specified by the algorithm, changing the keys for each letter and removing the vulnerability to frequent attacks.  The already more secure AES algorithm is protected by this new layer. Digital encryption plays a crucial role in today's digital environment in protecting electronic data transfers. This information consists of documents related to finances and the law, to health, to automatic and online banking etc.  The Advanced Encryption Standard (AES) for electrical data encryption can be utilized to meet these requirements. Although no significant AES attacks have been identified to far, Keywords:- AES(Advanced Encryption Standard
  • 3. INTRODUCTION Advanced Encryption Standard, also known as AES, is widely used symmetric encryption technique. It is mostly utilized to encrypt and safeguard electronic data. Because it is faster and more effective than DES (Data encryption standard), it was used to replace DES. AES is a block cipher, and it comprises of three different block ciphers that are used to provide data encryption. Key sizes range from 128 to 256 bits. Data is encrypted in chunks of 128 bits. Thus, from 128 bits of input, it produces 128 bits of encrypted cipher text as output. The substitution-permutation network principle, which underlies AES's functioning, involves a series of connected processes that replace and shuffle the incoming data. How the cipher works : Instead than operating on bits of data, AES operates on data in bytes. The encryption examines 128 bits (or 16 bytes) of the incoming data at a time since each block is 128 bits in size. According to the key length, the number of rounds will vary as follows: • 10 rounds with a 128-bit key • 12 cycles for a 192-bit key • 14 cycles for a 256-bit key
  • 4. PROPOSED SYSTEM ENCRYPTION :The sender, who wishes to send a text message to another user known as the recipient, initiates the application. The Caesar cypher is used to encrypt the plaintext, which is entered into a textbox and then converted to an intermediate ciphertext when the "encrypt" button is pressed. The last letter of the plaintext is used as the key in this encryption, and depending on whether the string is odd or even in length, it is inserted at a specific index in the ciphertext. Decryption: Using a customised Caesar Cipher decryption configuration and the AES approach in reverse, the user will be able to transform the ciphertext into plaintext in this case. On the receiver's end, this is done in the application. This is accomplished by using the JAVA programming language and creating the AES algorithm's code. The plaintext is converted to ciphertext and then stored in the database. The same process is used for decryption as well, but in reverse. The ciphertext is taken out of the database and made plaintext again. The military and several top-secret government intelligence agencies will be the main users of this application. Basically, this concept can be used by any company that wants to exchange messages with high security.
  • 6. PIPELINED ARCHITECTURE • Three architectural optimization approaches can be used to speed up the AES algorithm in non-feedback modes by duplicating hardware for implementing each round, which is also called round unit. • These architectures are based on pipelining, subpipelining and loop- unrolling. The pipelined architecture is realized by inserting rows of registers between each round unit. • Similar to the pipelining, subpipelining also inserts rows of registers among combinational logic, but registers are inserted both between and inside each round unit. • In pipelining and subpipelining, multiple blocks of data are processed simultaneously. Comparatively, loop unrolled or unfolded architectures can process only one block of data at a time, but multiple rounds are processed in each clock cycle. • Among these architectural optimization approaches, subpipelining can achieve maximum speedup and optimum speed/area ratio in non- feedback modes.
  • 8. ARCHITECTURE FOR SUB-PIPELINED AES WITH 128BIT KEY
  • 9. It offers consumers exceptional security and may be deployed on both hardware and software. It is one of the top open source options available for encryption. It is an extremely reliable algorithm. CHARACTERISTICS ADVANTAGES · AES uses keys with lengths of 128, 192, and 256 bits. · It is adaptable and has software and hardware implementations. · It offers strong security and can stop numerous threats. · Since it is copyright-free, anyone can use it anywhere in the world. · For 128 bit keys, there are 10 processing rounds.
  • 10. LITERATURE SURVEY • NIST (National Institute of Standards and Technology) created AES in 1997. It was created to take the place of DES, which was slow and open to many attacks. In order to fix DES's flaws, a new encryption algorithm was developed. AES was subsequently released on November 26, 2001. • N Sivasankari et al. (2017) report that both encryption and decryption have been actualized into a single chip (FPGA-XC5VLX50T), and that they perform with minimal resource utilisation and a high throughput of 38.65Gbps in their paper "Implementation of Area Efficient 128-bit Based AES Algorithm in FPGA." Talari Bhanu Teja et al. (2017