KED-AES algorithm: combined key encryption decryption and advance encryption standard algorithm
نویسندگان
چکیده
منابع مشابه
An image encryption and decryption using AES algorithm
Abstract— These In today’s world data security is the major problem which is to be face. In order to secure data during communication, data storage and transmission we use Advance encryption standard(AES). AES is a symmetric block cipher intended to replace DES for commercial applications.it uses 128-bit block size and a key size of 128, 192, or 256 bits. The AES algorithmis use to secure data ...
متن کاملAccelerating Encryption/decryption Using Gpu’s for Aes Algorithm
Technology has done a great deal for changing the way we live and do business today. We can see the use of computers from the vegetable shop to large scale businesses. In this fast moving world we need something essential for fast computation. So here comes the Graphics Processing unit for fastest computation through means of its parallel architecture. Along with the popular use of computer, in...
متن کاملData Encryption and Decryption Using ANZL Algorithm
What is the ANZL Algorithm? It is a genuine result of our work which is theoretically and practically proved. By using the ANZL Algorithm, we can test whether a given number belongs to Lucas’s series. It can also be used to find a sequence of Lucas’s numbers, starting from any number . If a given number completes the relation , we can say that it is a Lucas number and we mark it as . From the p...
متن کاملA VHDL implementation in FPGA on Advance Encryption Standard (AES) by using Rijndael Algorithm
Cryptography was and still is one of the hot research areas. The growing demand for cryptography arises from the desire to secure networks and data against potential intruders. This paper presents the VHDL implementation in FPGA on Advance Encryption Standard (AES) in Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel. It prote...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advances in Applied Sciences
سال: 2019
ISSN: 2252-8814
DOI: 10.11591/ijaas.v8.i1.pp44-53