Advanced Encryption Standard (AES) Cryptography Application Design

Allwine Allwine, Sandi Badiwibowo Atim, Muhammad Afdhaluddin

Abstract


As technology advances, the need for secure data transmission and storage increases. Encryption and decryption are essential processes to ensure data confidentiality and integrity. Encryption transforms original data into unreadable form during transmission, while decryption restores it to its original state for the recipient. This guarantees that unauthorized parties cannot access the data. Cryptosystems have evolved over time, and with the rapid growth of communication technologies, stronger standards are needed. AES (Advanced Encryption Standard), based on the Rijndael algorithm, has become the current standard for encryption. AES can encrypt and decrypt 128-bit data blocks with key lengths of 128, 192, or 256 bits, addressing the limitations of older algorithms and providing enhanced data security to protect confidentiality in modern cryptosystems.

Keywords


AES;Encryption – Decryption; Data confidentiality; Cryptosystem

Full Text:

PDF

References


Abood, O. G., & Guirguis, S. K. (2018). A Survey on Cryptography Algorithms. International Journal of Scientific and Research Publications (IJSRP), 8(7), 495–516. https://doi.org/10.29322/ijsrp.8.7.2018.p7978

Aldossary, S., & Allen, W. (2016). Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. International Journal of Advanced Computer Science and Applications, 7(4). https://doi.org/10.14569/ijacsa.2016.070464

Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256–272.

Allwine, A., & Sitorus, J. H. P. . (2019). KEAMANAN DATA DENGAN SKEMA MULTI-KEY HIERARCHICAL IDENTITY-BASED SIGNATURE. Jurnal Bisantara Informatika, 3(1), 17. https://doi.org/10.21131/jbi.v3i1.7

Bucerzan, D., & Cr, M. (2010). 1 Introduction Design of a Stream Cipher. V(4), 483–489.

Bujari, D., & Aribas, E. (2017). Comparative Analysis Of Block Cipher Modes Of Operation. International Advanced Researches & Engineering Congress, November 2017, 2–5. https://www.researchgate.net/publication/322294203_Comparative_Analysis_of_Block_Cipher_Modes_of_Operation

Ekert, Artur K; Huttner, Bruno; Palma, M. P. A. (1994). Eavesdropping-on-quantum-cryptographical-systems.pdf. Physical Review A, 50 (2), 1047–1056. https://doi.org/https://doi.org/10.1103/physreva

El Adib, S., & Raissouni, N. (2012). AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key. International Journal of Reconfigurable and Embedded Systems (IJRES), 1(2). https://doi.org/10.11591/ijres.v1i2.551

Fouque, P., Jean, J., Peyrin, T., Fouque, P., Jean, J., Peyrin, T., & Evaluation, S. (2014). Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 To cite this version : HAL Id : hal-01094302 Structural Evaluation of AES and Chosen-Key Distinguisher of.

Hutabarat, A., & Sawitri, R. (2024). Text Data Embedding into Images Using Chaotic Least Significant Bit Encod-ing Steganography. Jurnal Pepadun, 5(3), 286–298. https://doi.org/10.23960/pepadun.v5i3.246

Kawle, P., Hiwase, A., Bagde, G., Tekam, E., & Kalbande, R. (2014). Modified Advanced Encryption Standard. International Journal of Soft Computing and Engineering (IJSCE), 4(1), 21–23.

Parnas, D. L. (1969). On the use of transition diagrams in the design of a user interface for an interactive computer system. Proceedings of the 1969 24th National Conference, ACM 1969, 379–385. https://doi.org/10.1145/800195.805945

Rabah, K. (2005). Theory and Implementation of Data Encryption Standard: A Review. Information Technology Journal, 4(4), 307–325. https://doi.org/10.3923/itj.2005.307.325

Sarkar, P., & Noel, M. S. (2020). Cipher: Encryption & Decryption. International Research Journal of Engineering and Technology, 731–737. www.irjet.net

Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78(December), 964–975. https://doi.org/10.1016/j.future.2016.11.031

Vasanth, S., & Dhikhi, T. (2016). Secure data transmission using steganography and encryption techniques. International Journal of Pharmacy and Technology, 8(4), 21130–21139. https://doi.org/10.5121/ijcis.2012.2314

Wang, G., & Wayne, F. (2014). Embedded System Software Design With State Diagrams. International Journal of Embedded Systems Volume, 1, 28–34.




DOI: https://doi.org/10.30596/jcositte.v6i1.22746

Refbacks

  • There are currently no refbacks.