aes algorithm in cryptography-technology

CUDA compatible GPU as an efficient hardware accelerator for AES cryptography
free download

This section describes two completely different approaches to address the AES problem on the implementations do not focus on computing the key scheduling but on the main cryptography algorithm The same algorithms was developed and tested in GLSL , Cg and ARB

DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis
free download

Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for

A modified AES based algorithm for image encryption
free download

The AES algorithm is used in some applications that require fast processing such as smart cards for any cryptographic system is its susceptibility to possible attacks against the encryption algorithm such as Block cipher symmetric algorithms ; allow different ciphering mode

A study of encryption algorithms (RSA, DES, 3DES and AES ) for information security
free download

to research done and literature survey it can be found that AES algorithm is most by these algorithms can be enhanced further, if more than one algorithm is applied , Performance Evaluation of DES and Blowfish Algorithms , IEEE International

Proposed System for data hiding using Cryptography and Steganography
free download

The three types of algorithms are described: (i) Secret Key Cryptography (SKC):Uses a single key for both encryption and decryption (ii)Public Key Cryptography (PKC): Uses 2.1.1 Advantages of using AES algorithm 2.2 DCT -frequency domain algorithm for Steganography

Comparative analysis of AES and RC4 algorithms for better utilization
free download

for cryptography algorithms on encryption and decryption time. a) Encryption time based on different packet size In Graph 1, we show the performance of cryptographic algorithms in terms of encryption time. Here, we compare the encryption time of AES and RC4 algorithm over

Simulation of image encryption using AES algorithm
free download

The AES algorithm defined by the National Institute of Standard and Technology(NIST) of Cryptography provides a method for securing and authenticating the transmission of information over of digital data resulted in large quantities of different encryption algorithms which are

Hardware implementation of AES algorithm
free download

The AES algorithm was implemented in FPGA using the development board Celoxica RC1000 and development a helpful initial assessment of the performance of FPGA implementations of algorithms described in

An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists
free download

develop a Federal Information Processing Standard (FIPS) for the Advanced En- cryption Standard ( AES ), specifying an Advanced Encryption Algorithm to replace Encryption Standard (DES) which expired in 1998 . NIST has solicited candi- date algorithms for inclusion

Enhancement of cloud computing security with secure data storage using AES
free download

AES encryption algorithm has minimal storage space and high performance without any weaknesses and limitations while other symmetric algorithms have some weaknesses and differences in performance and storage space. REFERENCES

Design and implementation of a private and public key crypto processor and its application to a security system
free download

DES algorithms , and enables fast scalar multiplication and exponentiation operations for the ECC and RSA crypto algorithms for the S-box and SI- box used in the implementation of the AES crypto block of Reg A are saved in Reg A. To make the KASUMI algorithm applicable to

Enhancing cloud computing security using AES algorithm
free download

we provide a mechanism for achieving maximum security by leveraging the capabilities of cryptography Cryptographically, many algorithms provide insufficient security; especially proprietary algorithms should not be trusted The encryption process is done using AES algorithm

A novel secure combination technique of steganography and cryptography
free download

The three types of algorithms are described In cryptography , this system is used AES algorithm with its symmetric key and the cipher text is converted into two extra keys for high security, then the steganography is implemented to the (a) For Cryptography Crypto Creation Step

Survey and analysis of hardware cryptographic and steganographic systems on FPGA
free download

CRYPTOGRAPHY ON FPGA So many architectures have been proposed in the past in the area of software based cryptographic algorithm design We discuss DES, AES and HASH cryptographic algorithms and their past FPG A implementations

Evaluating the performance of symmetric encryption algorithms .
free download

A third point that can be noticed that AES has an advantage over other 3DES, DES, RC2 Figure 4: Throughput of each encryption algorithm (Megabyte/Sec) Encryption Throughput In the previous section, the comparison between en- cryption algorithms has been conducted at

Network security using cryptographic techniques
free download

HM; Emarah, A.-AM; Hagras, EAA, A New Secure Hash Dynamic Structure Algorithm (SHDSA) for AES : Asymmetric key

A new algorithm to construct secure keys for AES
free download

injective functions, the proposed algorithm performs better as compared to other algorithms which use

Comparative analysis of performance efficiency and security measures of some encryption algorithms
free download

Cryptographic Algorithms for Secure

Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
free download

This article concentrates on implementations of the advanced encryption standard ( AES ), the international data encryption algorithm (IDEA) and certain hash algorithms . These algorithms represent both private-key cryptographic algorithms and hash algorithms , thus giving a

How well are high-end DSPs suited for the AES algorithms
free download

There are a few papers that deal with public-key cryptography 5 Conclusions How well are high-end DSPs suited for the AES algorithms was the main question that we asked ourselves as a motivation to write this paper Brian Gladman. AES Algorithm Efficiency, 2000


COMMENT technology

2017 papers
2016 papers
2015 papers