An Approach to Rijndael Algorithm
DOI:
https://doi.org/10.53555/nncse.v2i1.508Keywords:
Rijndael algorithm, DES, AES, Blowfish, Encryption, Decryption, Rijndael, encryptiondecryptionAbstract
Rijndael or Advanced Encryption Standard (AES) is the most secure symmetric encryption technique and is available in many different encryption packages. The AES based on the Rijndael Algorithm is an efficient cryptographic technique that includes generation of ciphers for encryption and inverse ciphers for decryption. High security and speed of encryption and decryption is ensured by various operations. It has been standardized by the National Institute of Standards and Technology of the United States (NIST) and comprises three block ciphers, AES-128, AES-192 and AES-256 and it is adopted from Rijndael algorithm. This paper presents a encryption and decryption process of the rijindael algorithm. The paper also explains the comparative study of various rijindael algorithms with other algorithms based on the various parameters.
References
Renjith V Ravi, Dr.R. Mahalakshmi, “Simulation and Error Analysis of Rijndael Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, May 2014.
Jayanta Gope, Prakash Kumar Shah,“Advanced and Secured Rijndael Hardware Realization Using Single Electron Transistor Technology”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 ,Volume-3, Issue-5, May 2014.
Manjesh.K.N, R K Karunavathi, “Secured High throughput implementation of AES Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013.
M.Gnanambika, S.Adilakshmi,Dr.Fazal Noorbasha,“AES-128 Bit Algorithm Using Fully Pipelined Architecture for Secret Communication”, International Journal of Engineering Research and Applications (IJERA), pp.166-169, Vol. 3, Issue 2, March -April 2013.
Shylashree.N, Nagarjun Bhat and V. Shridhar,”Fpga Implementations Of Advanced EncryptionStandard: A Survey, International Journal of Advances in Engineering & Technology, May 2012.
Nitin K. Jharbade and Rajesh Shrivastava, “Network based Security model using Symmetric Key Cryptography (AES 256– Rijndael
Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012
Vishwa gupta,Gajendra Singh ,Ravindra Gupta, “Advance cryptography algorithm for improving data security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012
Jawahar Thakur, Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance
Analysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, December 2011.
P.Karthigaikumar, Soumiya Rasheed, “Simulation of Image Encryption using AES Algorithm”, IJCA Special Issue on “Computational Science - New Dimensions & Perspectives” NCCSE, 2011
Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath, “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm”, IEEE International Conference on Communication Systems and Network Technologies, 2011.
A.Nath, S.Ghosh, M.A.Mallik, “Symmetric key cryptography using random key generator”, Proceedings of International conference on SAM, 12-15 Vol-2,P-239-244, July,2010.
A.Nath, S.Das, A.Chakrabarti, “Data Hiding and Retrieval”, Proceedings of IEEE International conference on Computer Intelligence and Computer Network, Nov, 2010.
Jayanta Gope, et.al., “Cellular Automata Based Data Security Scheme in Computer Network using Single Electron Device”, International Conference [ACCTA-2010], 3-5 August 2010.
Chen-Hsing Wang, Chieh-Lin Chuang, and Cheng-Wen Wu, “An Efficient Multimode Multiplier Supporting AES and Fundamental
Operations of Public-Key Cryptosystems”, IEEE Transactions on Very Large Scale Integration Systems (VLSI), Vol.18, No.4, pp.553-563, 2010.
Shtewi,A.M., “An Efficient Modified Advanced Encryption Standard (MAES) adapted for image cryptosystems”, IJCSNS International
Journal of Computer Science and Network Security, VOL.10 No.2, pp 226-232, February 2010.
Yan Wang and Ming Hu,“Timing evaluation of the known cryptographic algorithms”, IEEE International Conference on Computational Intelligence and Security, 2009.
Ashwini M. Deshpande, Mangesh S. Deshpande and Devendra N. Kayatanavar, “FPGA implementation of AES Encryption and
Decryption“, International Conference on Control, Automation, Communication and Energy Conservation, 4th-6th June 2009.
D.Dia, M.Zeghid, M.Atri, B.Bouallegue, M.Machhout and R.Tourki, “DWT-AES Processor for a Reconfigurable Secure Image Coding”, Inter-national Journal of Computer Science and Engineering,vol.1,no.2, June 2009.
A. E. Rohiem, F. M. Ahmed and A. M. Mustafa, “FPGA Implementa-tion of Reconfigurable Parameters AES Algorithm”, 13th
International Conference on Aerospace Sciences and Aviation Technology, ASAT- 13, May 26 –28, 2009.
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M.A. Matin “Effect of Security Increment to Symmetric Data
Encryption through AES Methodology”, Ninth ACIS IEEE International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008.
N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, “A Systematic Evaluation of Compact Hardware Implementations for the
Rijndael SBox”, In Alfred Menezes, editor, CTRSA, volume 3376 of LNCS, pages323-333. Springer, 2005.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.