IJTRD22009
IJTRD22009
www.ijtrd.com
Analysis of AES and DES Algorithm
1
Yash Shah, 2Riddhi Rane, 3Siddhesh Kharade and 4Rutuja Patil,
1
Assistant Professor, 2,3,4Student,
1,2,3,4
Department of Information technology, Vidyalankar Institute of Technology, Mumbai, Maharashtra, India
Abstract—These days there is increased amount of digital data authorized user's information on a local operating
exchanged in every field, information security is becoming a system or within an authentication server.
crucial aspect of data transmission and storage. When we Privacy/Confidentiality: Ensuring that no one can read
transfer multimedia data such as images, audio, video etc over the message except the intended receiver.
the network the security of the data is provided by Integrity: Assuring the receiver that the received
cryptography. Cryptography is the process in which the sender message has not been altered in any way from the
encodes the data and sends it in such a way that only the original.
intended recipient could decode it and read it, for this process Non-repudiation: A mechanism to prove that the sender
we use various cryptographic algorithms.AES and DES are the really sent this message.
types of cryptographic algorithm which are more frequently
been used because of their popularity. In this paper we had a Cryptography is science and art of creating secrete code and
brief study of different set of algorithms and its cryptanalysis is art of breaking those codes. AES is the best and
implementations and we did examine it on some parameters strongest cryptographic algorithm, because of three areas:
which is time consumed, bit independence criteria and Security, Cost and Implementation.
avalanche effect. There are two types of cryptographic algorithms
Keywords-AES, DES, Avalanche effect, Cryptography. developed are as follows: