An Approach to Rijndael Algorithm
DOI:
https://doi.org/10.53555/nncse.v2i1.508Keywords:
Rijndael algorithm, DES, AES, Blowfish, Encryption, Decryption, Rijndael, encryptiondecryptionAbstract
Rijndael or Advanced Encryption Standard (AES) is the most secure symmetric encryption technique and is available in many different encryption packages. The AES based on the Rijndael Algorithm is an efficient cryptographic technique that includes generation of ciphers for encryption and inverse ciphers for decryption. High security and speed of encryption and decryption is ensured by various operations. It has been standardized by the National Institute of Standards and Technology of the United States (NIST) and comprises three block ciphers, AES-128, AES-192 and AES-256 and it is adopted from Rijndael algorithm. This paper presents a encryption and decryption process of the rijindael algorithm. The paper also explains the comparative study of various rijindael algorithms with other algorithms based on the various parameters.
References
Renjith V Ravi, Dr.R. Mahalakshmi, “Simulation and Error Analysis of Rijndael Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 5, May 2014.
Jayanta Gope, Prakash Kumar Shah,“Advanced and Secured Rijndael Hardware Realization Using Single Electron Transistor Technology”, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 ,Volume-3, Issue-5, May 2014.
Manjesh.K.N, R K Karunavathi, “Secured High throughput implementation of AES Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013.
M.Gnanambika, S.Adilakshmi,Dr.Fazal Noorbasha,“AES-128 Bit Algorithm Using Fully Pipelined Architecture for Secret Communication”, International Journal of Engineering Research and Applications (IJERA), pp.166-169, Vol. 3, Issue 2, March -April 2013.
Shylashree.N, Nagarjun Bhat and V. Shridhar,”Fpga Implementations Of Advanced EncryptionStandard: A Survey, International Journal of Advances in Engineering & Technology, May 2012.
Nitin K. Jharbade and Rajesh Shrivastava, “Network based Security model using Symmetric Key Cryptography (AES 256– Rijndael
Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)”, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012
Vishwa gupta,Gajendra Singh ,Ravindra Gupta, “Advance cryptography algorithm for improving data security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012
Jawahar Thakur, Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance
Analysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, December 2011.
P.Karthigaikumar, Soumiya Rasheed, “Simulation of Image Encryption using AES Algorithm”, IJCA Special Issue on “Computational Science - New Dimensions & Perspectives” NCCSE, 2011
Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath, “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm”, IEEE International Conference on Communication Systems and Network Technologies, 2011.
A.Nath, S.Ghosh, M.A.Mallik, “Symmetric key cryptography using random key generator”, Proceedings of International conference on SAM, 12-15 Vol-2,P-239-244, July,2010.
A.Nath, S.Das, A.Chakrabarti, “Data Hiding and Retrieval”, Proceedings of IEEE International conference on Computer Intelligence and Computer Network, Nov, 2010.
Jayanta Gope, et.al., “Cellular Automata Based Data Security Scheme in Computer Network using Single Electron Device”, International Conference [ACCTA-2010], 3-5 August 2010.
Chen-Hsing Wang, Chieh-Lin Chuang, and Cheng-Wen Wu, “An Efficient Multimode Multiplier Supporting AES and Fundamental
Operations of Public-Key Cryptosystems”, IEEE Transactions on Very Large Scale Integration Systems (VLSI), Vol.18, No.4, pp.553-563, 2010.
Shtewi,A.M., “An Efficient Modified Advanced Encryption Standard (MAES) adapted for image cryptosystems”, IJCSNS International
Journal of Computer Science and Network Security, VOL.10 No.2, pp 226-232, February 2010.
Yan Wang and Ming Hu,“Timing evaluation of the known cryptographic algorithms”, IEEE International Conference on Computational Intelligence and Security, 2009.
Ashwini M. Deshpande, Mangesh S. Deshpande and Devendra N. Kayatanavar, “FPGA implementation of AES Encryption and
Decryption“, International Conference on Control, Automation, Communication and Energy Conservation, 4th-6th June 2009.
D.Dia, M.Zeghid, M.Atri, B.Bouallegue, M.Machhout and R.Tourki, “DWT-AES Processor for a Reconfigurable Secure Image Coding”, Inter-national Journal of Computer Science and Engineering,vol.1,no.2, June 2009.
A. E. Rohiem, F. M. Ahmed and A. M. Mustafa, “FPGA Implementa-tion of Reconfigurable Parameters AES Algorithm”, 13th
International Conference on Aerospace Sciences and Aviation Technology, ASAT- 13, May 26 –28, 2009.
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M.A. Matin “Effect of Security Increment to Symmetric Data
Encryption through AES Methodology”, Ninth ACIS IEEE International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008.
N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, “A Systematic Evaluation of Compact Hardware Implementations for the
Rijndael SBox”, In Alfred Menezes, editor, CTRSA, volume 3376 of LNCS, pages323-333. Springer, 2005.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.