Open Access Open Access  Restricted Access Subscription or Fee Access

Integrated Design of AES Encrypter and Decrypter of Communication in a Secure and Fast method

Vaibhav Sharma, Saksham Garg, Samarth Bansal

Abstract


Information security has been a serious concern in recent decades. Because there is a desire for stronger
encryption and decryption that is difficult to penetrate, encrypting and decrypting data has recently been
extensively researched and developed. Cryptography plays a critical role in meeting these requirements.
Many academics have suggested encryption and decryption algorithms such as AES and others in recent
years. We show an encryption/decryption application that can deal with any form of file, such as image
files, data files, documentation files, and so on. The encryption technique is simple enough but strong
enough to meet the demands of students and faculty in a small college. The application employs a basic
key generation mechanism for generating random numbers and combining them. The ultimate encryption
is a binary one that rotates bits and performs an XOR operation upon every data block in every file using
a symmetric decimal key. After hitting the encryption button, the system generates the keys and encrypts
the data with complete transparency to the user. The encrypted binary file is decrypted with the same
encryption key,


Full Text:

PDF

References


. Anita Dashti, Hashem Alvandi Kheradmand, and Mohammad Davarpanah Jazi, "Comparison Of

Three Modes Of Cryptography Operation For Providing Security and Privacy Based on Important

Factors," International Journal of Information Technology and Electrical Engineering,ITEE, 5(3), pp. 7-

, June 2016.

. "Modes of Operation of The AES Algorithm," The 10th Conference for Informatics and Information

Technology (CIIT 2013), pages 212-216. Dobre Blazhevski, Adrijan Bozhinovski, Biljana Stojchevska,

Veno Pachovski

View publication stats

. Mohan H.S. and A. Raji Reddy, "Revised AES And Its Modes Of Operation," International Journal

of Information Technology and Knowledge Management, Volume 5, Issue 1, pp. 31-36, January-June

. P Boominathan, K Marimuthu, D Ganesh Gopal, Harshita Mehta, and Aditya Rajan, "A Novel Way

Of Integrating Voice Recognition With String key To Prevent Password Phishing Attacks," International

Journal of Distributed and Parallel Systems (IJDPS), Vol. 5, No. 4, July 2014.

. Mohsen Gerami, Satar Ghiasvand,"String key via E-mail id ", Bulletin de la Société Royale des

Sciences de Liège, Vol. : 85, 2016, p. 106-113

. Getting Started with Plivo, https://www.plivo.com/docs/getting-started/

. PyQT4 Reference Guide, https:// pyqt.sourceforge.net

D. Seth, L. Ramanathan, and A. Pandey, “Security enhancement: Combining cryptography and

steganography,” International Journal of Computer Applications (0975–8887) Volume, 2010.

. H. Abdulzahra, R. AHMAD, and N. M. NOOR, “Combining cryptography and steganography for

data hiding in images,” ACACOS, Applied Computational Science, pp. 978–960, 2014.

. J. V. Karthik and B. V. Reddy, “Authentication of secret information in image stenography,”

International Journal of Computer Science and Network Security (IJCSNS), vol. 14, no. 6, p. 58, 2014.

. M. H. Rajyaguru, “Crystography-combination of cryptography and steganography with rapidly

changing keys,” International Journal of Emerging Technology and Advanced Engineering, ISSN, pp.

–2459, 2012.

. M. K. I. Rahmani and N. P. Kamiya Arora, “A crypto-steganography: A survey,” International

Journal of Advanced Computer Science and Application, vol. 5, pp. 149–154, 2014.

. Mr. Vikas Tyagi(2012), “Data Hiding in Image Using least significant bit with cryptography”,

International Journal of Advanced Research in computer science and Software Engineering, Volume 2,

Issue 4.

. P. R. Ekatpure and R. N. Benkar, “A comparative study of steganography & cryptography,” 2013.

. R. Poornimal and J. Iswarya (2013) “An Overview of Digital Image Steganography”, International

Journal of Computer Science & Engineering Survey Vol.4,NO.1,February.




DOI: https://doi.org/10.37628/ijece.v8i2.1930

Refbacks

  • There are currently no refbacks.