A Comparative Study On AES 128 BIT AND AES 256 BIT
A Comparative Study On AES 128 BIT AND AES 256 BIT
net/publication/327701053
CITATIONS READS
7 2,696
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Toa Bi Irie guy-cedric on 17 September 2018.
I. INTRODUCTION keep the private key as secret. This paper analyses the
difference between AES-128 and AES-256 that is
Nowadays security concern grows with cloud adoption at explained with the implementation research to show their
organizations level, data center, current users and efficiency. The rest of the paper is organized as follows. In
cryptography algorithms has a tremendous impact security Section II, we briefly describes Advanced Encryption
concern. Indeed cryptography algorithms are used for Standards (AES). In Section III, contain Proposed AES
ensuring confidentiality, data protection, communication, algorithm implementation. Comparisons and analysis are
authorization and non-repudiation and play a major role in shown in Section IV and finally, we conclude this paper in
security software and hardware. It includes two groups, Section V.
symmetric and asymmetric algorithm. Cryptography is a
technique to transform data into secret data meaning only
authorized users can read it. It based on the mathematics
and the process to convert data is called encryption by
using a key during the process to encrypt and decrypt. See
Figure 1 [1].
SubBytes (state)
ShiftRows (state)
AddRoundKey (state, w[Nr*Nb, (Nr+1)*
Nb-1])
Out = state
end
Nr = Number of round
Nk = Number of key word
Cypher (byte in [4*Nb], byte out Figure 4. Comparative decryption time of AES-128 and
[4*Nb], word w[Nb*(Nb+1)] AES-256
REFERENCES