Downloads: 130 | Views: 272 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 7.2 / 10
An Introduction of Advanced Encryption Algorithm: A Preview
Asfiya Shireen Shaikh Mukhtar, Ghousiya Farheen Shaikh Mukhtar
Abstract: In a recent era, Network security is playing the important role in communication system. Almost all organization either private or government can transfer the data over internet. So the security of electronic data is very important issue. Cryptography is technique to secure the data by using Encryption and Decryption Process. Cryptography is science of secret information it is the art of hiding the information by Encryption and Decryption. Encryption is the process to convert the Plaintext into unreadable format known ciphertext. and Decryption is the process to convert cipher text into plaintext. Numbers of algorithm used for encryption and Decryption like DES, 2DES, 3DES, RSA, RC2, RC4, RSA, IDEA, Blowfish, AES but AES algorithm is more efficient and Effective AES algorithm is 128 bit block oriented symmetric key encryption algorithm. In this paper I describe the brief introduction of AES algorithm. My paper is divide into following Section. In I Section I Present the brief introduction of AES (Advance Encryption Standard) Algorithm, In II Section I Present the different Cryptography algorithm, In III Section I Present comparison of AES algorithm with different cryptography algorithm, In IV Section I Present the Modified AES algorithm and Text and Image Encryption by using AES algorithm, In V Section I Present Future Enhancement of AES algorithm and Conclusion.
Keywords: AES, DES RC2, RC4, Blowfish
Edition: Volume 3 Issue 12, December 2014
Pages: 662 - 665
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1925 - 1927Survey on Secured Association Rule Mining in Partitioned Database
Gurpreet Kaur Bhatti, Prof. Ravi Patki
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1844 - 1847A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication
Kale Rohitkumar Bhausaheb, R.L.Paikrao
Downloads: 110
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, Kenya, Volume 6 Issue 3, March 2017
Pages: 1702 - 1708Enhanced Secure Data Storage in Cloud Computing Using Hybrid Cryptographic Techniques (AES and Blowfish)
Fortine Mata, Michael Kimwele, George Okeyo
Downloads: 111
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1251 - 1253Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream
Vaibhav Sonyabapu Barve, S. S. Bere