0% found this document useful (0 votes)
108 views5 pages

A Comparative Study On AES 128 BIT AND AES 256 BIT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views5 pages

A Comparative Study On AES 128 BIT AND AES 256 BIT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/327701053

A Comparative Study on AES 128 BIT AND AES 256 BIT

Article  in  INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING · September 2018


DOI: 10.26438/ijsrcse/v6i4.3033

CITATIONS READS
7 2,696

1 author:

Toa Bi Irie guy-cedric


Jain University
7 PUBLICATIONS   13 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Threats on cloud computing View project

All content following this page was uploaded by Toa Bi Irie guy-cedric on 17 September 2018.

The user has requested enhancement of the downloaded file.


International Journal of Scientific Research in _______________________________ Research Paper .
Computer Science and Engineering
Vol.6, Issue.4, pp.30-33, August (2018) E-ISSN: 2320-7639

A Comparative Study on AES 128 BIT AND AES 256 BIT


Toa Bi Irie Guy-Cedric1*, Suchithra. R.2
1
Research scholar, Jain University, Bangalore-560043, India
2
Head of Department of MSc IT, Jain University, Bangalore-560043, India

*Corresponding Author: guy-ced@hotmail.fr


Available online at: www.isroset.org
Accepted: 15/Aug/2018, Online: 31/Aug/2018
Abstract— Cloud computing present a new thinking to apply security since basic administrations are regularly outsourced to
the cloud vendor. The current encryption techniques are regularly exposed to threats. Therefore it is important to study the
features of the existing algorithm. This paper studies AES 128 and AES 256 based on various parameters and compare their
performance that may suggest in development of better encryption technique.

Keywords— Cryptography, Cloud Computing, AES

I. INTRODUCTION keep the private key as secret. This paper analyses the
difference between AES-128 and AES-256 that is
Nowadays security concern grows with cloud adoption at explained with the implementation research to show their
organizations level, data center, current users and efficiency. The rest of the paper is organized as follows. In
cryptography algorithms has a tremendous impact security Section II, we briefly describes Advanced Encryption
concern. Indeed cryptography algorithms are used for Standards (AES). In Section III, contain Proposed AES
ensuring confidentiality, data protection, communication, algorithm implementation. Comparisons and analysis are
authorization and non-repudiation and play a major role in shown in Section IV and finally, we conclude this paper in
security software and hardware. It includes two groups, Section V.
symmetric and asymmetric algorithm. Cryptography is a
technique to transform data into secret data meaning only
authorized users can read it. It based on the mathematics
and the process to convert data is called encryption by
using a key during the process to encrypt and decrypt. See
Figure 1 [1].

Symmetric cryptography: Symmetric algorithm is one of


encryption algorithm using one key to encrypt and decrypt
the message. That key is called secret shared key or private
key. Nowadays most symmetric algorithm validate by
peers and used is Advanced Encryption Standards (AES)
proposed by Vincent Rijmen, Joan Daemen (Rijndael). It
has been standardized in Federal Information Processing
Standard (FIPS) 192, published in November 2001 [2, 3].
AES is based on a substitution–permutation network and
works on 128 bit fixed block with three variant
respectively depending of the key size as 128, 192 and 256
bits.

Asymmetric cryptography: Asymmetric cryptography uses


two key during the process of cryptography like Rivest–
Shamir–Adleman (RSA) with one key for encryption
known as public key and one key for decryption known as
private key. Indeed the secrecy of asymmetric Figure 1: Cryptography Family
cryptography depends on how receiver of the message

© 2018, IJSRCSE All Rights Reserved 30


Int. J. Sci. Res. in Computer Science and Engineering Vol.6(4), Aug 2018, E-ISSN: 2320-7639

II. AES OVERVIEW III. PROCESS OF ENCRYPTION AND


DECRYPTION
Advanced Encryption Standards (AES) was introduced in
2000 by Vincent Rijmen, Joan Daemen (Rijndael), to The standard process of AES encryption and decryption is
replace Data Encryption Standard (DES). AES is a block shown on figure 2 AES-128 bits algorithm [4]. Indeed the
cypher algorithm that encrypt data on a per-block basis process is composed of different rounds depending on the
(block matrix) and supports key size of 128, 192 and 256 size of key expansion and each round follows an iterative
bits and block size of 128 bits. It is based on Substitution process [5].
Permutation Networks (SPN). SPN has been introduced by
Shannon to protect cypher against statistical cryptanalysis In encryption process each round follows four steps:
attack. SPN is a consecutive series of mathematical
operations (substitution and linear transformation) which is  SubBytes – is a process who performs a non-
used in block cipher. Let’s define some key words for a linear substitution step by replacing each byte
better understand of how AES works. with another value from substitution box (S-box)

 Round  ShiftRows – is called a row-wise step by


performing a circular shifts on the last three rows
A round is a transformation process used during encryption of the state, respectively line 2= 1, line 3= 2 and
process that include some function substitution, line 4= 3.
transposition and mixing, with the achievement to have a
higher output cipher text. Each key size is associated with  Mixcolumns is a linear transformation. It is a
the number of round which provide a high secure system. matrix product using the four bytes of a column.
As shown in table 1. Columns are treated as polynomials as shown in
that formula (1):
AES Data Matrix Number of
TYPES + Block Block Round GF (28) and multiplied modulo x4 + 1 with fixed
Key Size Size polynomials
AES-128 128 4*4 10
AES-192
AES-256
128
128
4*6
4*8
12
14
c 0 , i   2 3 1 1  b 0 , i 
 c1, i  1 2 3 1   b1, i 
Table 1: Structure of AES  =   for 0 ≤
 Block Cipher  c 2 , i  1 1 2 3 b 2 , i 
    
A Block Cipher is a method to encrypt data by group at
time and uses the same key in decryption and encryption.  c 3, i  3 1 1 2  b 3 , i 
Indeed the purpose of block cypher method is to avoid the i≤3 (1)
similarity of ciphertext during encryption even if the same
message is encrypted again. Table 2 gives a representation  AddRoundKey – is to apply XOR operation on
of 128 in block matrix 4 × 4 column-major output of the previous three steps combined the
round key which is generated from the cipher key
Table2: Representation of AES 128 in block matrix 4 × 4 as shown in that formula (2):
column major
c0, i = ({2} ● b0, i ) ⊕ ({3} ● b ) ⊕ b ⊕ b
1, i 2, i 3, i
b0,0 b0,1 b0,2 b0,3
c1, i = b0, i ⊕ ({2} ● b ) ⊕ ({3} ● b ) ⊕ b
1, i 2, i 3, i
b1,0 b1,1 b1,2 b1,3
c 2, i = b0, i ⊕ b ⊕ ({2} ● b ) ⊕ ({3} ● b
1, i 2, i 3, i )
b2,0 b2,1 b2,2 b2,3
c3, i = ({3} ● b0, i ) ⊕ b ⊕ b ⊕ ({2} ● b
1, i 2, i 3, i )
b3,0 b3,1 b3,2 b3,3

© 2018, IJSRCSE All Rights Reserved 31


Int. J. Sci. Res. in Computer Science and Engineering Vol.6(4), Aug 2018, E-ISSN: 2320-7639

For decryption process each round follows four steps: begin


 Inverse ShiftRows
 Inverse substitute bytes Byte state [4, Nb]
 AddRoundKey key State = in
 Inverse mix columns. AddRoundKey (state, w[0, Nb-1])

for round = 1 step 1 to Nr-1


SubBytes (state)
ShiftRows (state)
MixColumns (state)
AddRoundKey (state, w[round*Nb,
(round1)*Nb-1])
end for

SubBytes (state)
ShiftRows (state)
AddRoundKey (state, w[Nr*Nb, (Nr+1)*
Nb-1])

Out = state
end

Figure 2: Encryption and Decryption process

IV. Proposed AES algorithm implementation

This section discuss the results of our implementation


between AES-128 bits and AES-256 bits is taken by
varying the amount of file size being between (100 kb,
500kb and 1024 kb ) selected and the checking time for
Figure 3. Comparative encryption time of AES-128 and
encryption and decryption . The obtained results are
AES-256
tabulated as well as given in the form of graphs.

 Checking the time of encryption and decryption


based on some documents.

AES Standard Algorithm

AES algorithm (128,192 and 256) is outline form [6]:

With: Nb = 4(nb) number of columns

Nr = Number of round
Nk = Number of key word

Cypher (byte in [4*Nb], byte out Figure 4. Comparative decryption time of AES-128 and
[4*Nb], word w[Nb*(Nb+1)] AES-256

© 2018, IJSRCSE All Rights Reserved 32


Int. J. Sci. Res. in Computer Science and Engineering Vol.6(4), Aug 2018, E-ISSN: 2320-7639

IV. DISCUSSION Authors Profile


Mr. Toa Bi Irie Guy-Cedric pursed Bachelor of Science from
The results in figure 3 & 4 shown how the time of Institut National Polytechnique Felix Houphouet-Boigny, of Cote
encryption varies alongside with the key choose. However d’Ivoire in 2011 and Master of Information Technology from
when the key is strong and long, the encryption time take Shridhar University, India in year 2013. He is currently pursuing
more time in both types of AES. Ph.D. in Computer Science from Jain University, India. He has
Conversely, AES-256bit are more robust because of this published many research papers in reputed international journals
architecture rounds and take more time to decrypt file and conferences. His main research work focuses on
while of AES-128bit has an average decryption time
Cryptography Algorithms, Network Security, Cloud Security and
(around30 milliseconds). Nowadays AES has shown be
Privacy.
more secure and robust than other cryptography algorithm
used when this one is properly implemented. Dr. Suchithra R pursed Bachelor of Commerce, Master of
Computer Application and Ph.D in Computer Science from
Manonmaniam Sundaranar University , India in year 2009. She
V. CONCLUSION worked as Associate Professor and Head of MS (IT) Department
in Jain university since 2010. She has published more than 20
Security is an important part of cloud data center, while research papers in reputed international journals including
cryptography is one of the main technics used for data Thomson Reuters (SCI & other) and conferences and it’s also
security. This paper briefly describes the different types of available online. Her main research work focuses on Network
AES encryption model and present some highlight. It was Security, Cloud Security and Privacy, Big Data Analytics, Data
observed from the experiment that the time of encryption Mining, IoT and Programming. She has 15 years of teaching
and decryption process is tied with the size of key and also experience and 6 years of Research Experience.
the hardware used. However some studies on security issue
have shown one particular attack is more efficient to crack
hardware or software based on AES.

REFERENCES

[1]. Samiul Islam “Comparative Analysis of AES Algorithms and


Implementation of AES in Arduino” 20.12.2015
[2]. V. R. Joan Daemen. AES Proposal: Rijndael, version 2, AES
submission. 1999.
[3]. Joan Daemen, Steve Borg and Vincent Rijmen.”The Design of
Rijndael: AES The Advanced Encryption Standard”, Springer,
2002.
[4]. Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid, “Symmetric
Algorithm Survey: A Comparative Analysis” May 2, 2014
[6] cs.utsa.edu/~wagner/laws/AESintro.html
[5]. csrc.nist.gov/publications/fips/fips197/fips 197.pdf. NIST_SP-
500-291_Version-2_2013_June18_FINAL
[7]. Chenhui Jin, Ting Cu “Classification of SPN Structures From
the Viewpoint of Structural Cryptanalysis” IEEE, December 27,
2017
[8] Umer Farooq, M. Faisal Aslam “Comparative analysis of
different AES implementation techniques for efficient resource
usage and better performance of an FPGA”, Journal of King
Saud University – Computer and Information Sciences, 10
January 2016, sciencedirect
[9]. Arash Karimi, Hadi Shahriar Shahhoseini “Cryptanalysis of a
Substitution-Permutation Network Using Gene Assembly in
Ciliates” Int'l J. of Communications, Network and System
Sciences Vol. 5 No. 3 ,2012.

© 2018, IJSRCSE All Rights Reserved 33

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy