Jasmine Shafi Farha, M.Yamini, N.Sandhya,M.Puneeth

2y ago
22 Views
3 Downloads
1.05 MB
5 Pages
Last View : 21d ago
Last Download : 3m ago
Upload by : Aydin Oneil
Transcription

International Journal of Engineering, Management & Sciences (IJEMS)ISSN-2348 –3733, Volume-2, Issue-6, June 2015AES Algorithm Using MATLABJasmine Shafi Farha, M.Yamini, N.Sandhya,M.Puneeth Abstract— Now a days cryptanalyst’s are increasing day byday so in order to maintain privacy or secrecy for information, asecurity encryption algorithm is required in order to send thedata confidentially, AES (Advanced Encryption Standard) is analgorithm that which replaced DES and 3DES because of theirsmaller block size, AES is having the larger block size, goodsecurity and efficiency so in our paper we are going to generate astructure withs-boxes, expanded key, encryption anddecryption arrays of AES using Mat lab softwareIndex Terms—decryption, encryption, key, DES, AESI.INTRODUCTIONinitial round will contain only an Add round key. In case ofRounds step it consists of substitution bytes, shift rows, Mixcolumns and Add round key. The final round will perform theoperations of substitution bytes, shift rows and add round key[6]. A 128 bit block is given as the input for the process ofencryption and the process of decryption algorithm This 128bit blocks are portrayed into square matrix of bytes, in statearray this block is copied, at each stage of the encryptionprocess and the decryption process this block is modified,intoan output matrix state is copied after the final stage ,in thesame manner the 128 bit key is portrayed as a bytes of squarematrix the expansion of key takes place into an array whichhas schedule words of key each key word is having 4 bytes,for the 128 bit key the total key schedule is having 44 wordsAdvanced Encryption standard replaced the DES and 3DES,because of two reasons these are having 64 bit block size andthe another one is 3 DES is having three times more roundsthan DES, which is slower correspondingly so that forsecurity and efficiency there should be a larger block size sothat in order to rectify these drawbacks AES came intoexistence.Rijndael was a block cipher and it was developed by JoanDaemen and Vincent Rijmen[5]AES is a symmetric block cipher which is having the blocksize of 128 bits and the key length of 128,192 and 256 bits.AES is having the high computational efficiency so that AEScan be used in broad band links and high speedapplications.AES is flexible and suitable for different types ofsoftware and hardware applications.AES is designed in such away that it has resistance over all the known attacks,simplicity design and compactness of code on different typesof platforms. Providing security for data is an important factorfor embedded appliances [2]II. ENCRYPTION AND DECRYPTION OF AESAES implementation can be done in the following waythere are four steps in implementing the AES they are initialround, Rounds, final round, modifications [1].The keyexpansion will be done with the help of key schedule .TheManuscript received June 20, 2014.Jasmine Shafi Farha, Department of ECE, KLuniversity,Vaddeswaram,IndiaM.Yamini, Department of ECE, KLuniversity, vaddeswaram, IndiaN.Sandhya, Department of ECE, KLuniversity, vaddeswaram, IndiaM.Puneeth, Department of ECE, KLuniversity, vaddeswaram, India17Fig1: encryption and decryption of AESOrdering of bytes are noted in the matrix are by its columnAES is having a non Feistal structure,one half of the datablock is used for modification of the other half of the datawww.alliedjournals.com

AES algorithm using matlabblock. Firstly government of US adopted this AES but nowthe whole world is using this Advanced Encryption Standard.The main principle of AES is Permutations and substitutionsand combining the substitution and permutation,AES worksvery faster in case of both hardware and software. The numberof keys used in AES are depended upon the number of cyclesused for 128 bit keys repetition of 10 cycles takes place ,for192 bit keys repetition of 12 cycles takes place, for 256 bits 14cycles of repetition takes place every round in AES hasseveral steps of processing.There are four different types of stages like substitution bytes,shift rows, Mix columns, Add Round key are used in AESFig 3:AES Encryption RoundThe key will be used by only the ADD round key, the startingand the ending of the key will be taken place at the ADDround key only. The expanded key will be used by thedecryption algorithm the expanded key will be used in reverseorder, at the final stage for the process of encryption and forthe process of decryption there are only three stagesFig 2: input state array and output, key and expanded keyIII. SUBSTITUTION BYTES TRANSFORMATIONA.Substitution bytes: For performing a byte to bytesubstitution an s-box is usedB.Shift rows: Shift rows is a simple type of permutationC.Mix columns: In mix columns the substitution uses anarithmetic of GF(8th power of 2)D.ADD round key: ADD round key is used as a XOR for thecurrent block by using an expanded key.This structure is very simple for the process of encryption anddecryption, the cipher starts by ADD round key ,the ninerounds that which has the four stages follows the Add roundkeyThe AES encryption standard contains the AES encryptionround in which the process of encryption takes place, in thisprocess of encryption and in the process of decryption thereare different number of transformations, thesetransformations are consecutively applied at the data blocksThis encryption process contains a number of iterations thatwhich are fixed these are called as rounds, these number ofiterations or rounds are depended upon the key length for theprocess of encryption .10 iterations are required for keylength of 128 bits. The key will be used by only the ADDround key, the starting and the ending of the key will be takenplace at the ADD round key only. The expanded key will beused by the decryption algorithm the expanded key will beused in reverse order, at the final stage for the process ofencryption and for the process of decryption there are onlythree stagesA. Forward and Inverse transformationIn the Forward substitution byte transformation, the bytes ofsubstitution that which are used for substitution, A matrix of16 X 16 bytes are defined by AES in a box that which is calledas S BOXRijndael S-BOX is nothing but a matrix that which is usedin AES and it is based on cryptographic algorithm of AES,thesubstitution box is served as a look up tableRijndael algorithm has a very good flexibility for workingwith a key and size of block for that which it has any multiplesof 32 bit with the minimum number of bits of 128 bits andmaximum number of bits 256 bits [3]A.Forward S-Box:The generation of S-Box takes place with the determiningmultiplicative inverse of the number that which is givenGF(8th power of 2) GF(2)[x]/(x8 x4 x3 x 1),Themapping of 0 will be done if the number is not inverse ,thetransformation of multiplicative inverse is done using theaffine transformationThe affine transformation is defined as the addition ofnumber of rotations on byte, the sum used here is the XOR18www.alliedjournals.com

International Journal of Engineering, Management & Sciences (IJEMS)ISSN-2348 –3733, Volume-2, Issue-6, June 2015operationThe calculation of matrix multiplication can be done by usingthe following algorithm, the multiplicative inverse of twoinput numbers is stored in two 8-bit temporary variables a andb, the one bit value of a is rotated to the left, if the ‘a’ value ishigher bit of the one then make the low bit of one a, if not thelow bit value of a is zero,the value of ‘a’ should be XORedwith the ‘b’ so that the value will be stored in ‘a’the sameprocess will be repeated for two or three times now the finalresult will have a result that which is obtained by themultiplication,after the multiplication of matrix is completedthen the value will be XORed by the decimal number which is99 now a S-BOX with hexa decimal notation is obtainedTable 2: Inverse SboxIV. SHIFT ROWS AND MIX COLUMNSTable 1: SboxB.Inverse S-BOXThe inverse S-Box can be defined as the inverse of theS-Box, the calculation of inverse S-Box will take place by thecalculation of inverse affine transformation of an Input valuethat which is followed by multiplicative inverseA.Shift rowsThe shift rows are used to operate on state of rows, thebytes that which are present in each row are shifted by certainoffset. In case of AES there is no change in first row, the bytesthat which are present in the second row are shifted to the leftside, in the same manner the third and fourth rows are shiftedby using two, three offsets. In case of block sizes such as for128 bits and for 192 bits the pattern of the shifting is same,row r is circularly left shifted by r-1 bytes, In this manner byusing the shift rows technique the output of one column isconverted into the input state of another columnFig 4:Shift RowsThe representation of Rijndael's inverse S-box is asfollows19B.Mix columnsIn case of Mix columns four bytes that which are present ineach column in a state are mixed with the help of invertiblelinear transformation. The function of mix columns will takeinput as four bytes and output as four bytes, each and everyinput byte will affect the all four output bytes that present, atthis time of operation each column will be transformed withthe help of fixed matrix. The mixed column layer is anoperational matrix layer in which a column of 4 byte isconsidered as a vector and then it is multiplied by a matrix of4X4 [4].www.alliedjournals.com

AES algorithm using matlabVII. RESULTSFig 5:Mix columnsV. ADD ROUND KEYIn case of Add round key the combination of substitution keyand state takes place, for every round from the main keysubstitution byte will be derived with the help of Rijndael’skey schedule, substitution key and the state will have samesize, the substitution key will be added by the combination ofeach byte from the state with corresponding byte that which ispresent in the substitution key with the help of bitwise XORFig 6: Add round key in AEsFig 7:S-Box creation in matlabFig 8: Inverse Sbox creation in matlabVI. CONCLUSIONBy using matlab software we have generated a structure withs-boxes, expanded key, encryption and decryption arrays ofAESFig 9:R-Con creation in matlab20www.alliedjournals.com

International Journal of Engineering, Management & Sciences (IJEMS)ISSN-2348 –3733, Volume-2, Issue-6, June 2015[5]. Chandra Prakash Dewangan, Shashikant Agrawal, “A Novel Approachto Improve Avalanche Effect of AES Algorithm”, Volume 1, Issue 8,October 2012[6]. O. Prasanthi, M. Subba Reddy, “Enhanced AES Algorithm”, volume2,issue 2,June 2012, International Journal of Computer Applications inEngineering SciencesJasmine Shafi Farha. Graduating B-tech in Electronics andcommunications at KLuniversity,published one journal on RSA andModified RSA using c programming ,member in IETEM.Yamini. Graduating B-tech in Electronics and communications atKLuniversity, ,published one journal on RSA and Modified RSA using cprogramming member in IETEN.Sandhya. Graduating B-tech in Electronics and communications atKLuniversity, ,published one journal on RSA and Modified RSA using cprogramming member in IETEFig 10: key expansion of AES inmatlabM.Puneeth Graduating B-tech in Electronics and communications atKLuniversity, published three International Journals on steganography usingmatlab ,Different types of aperture antennas using HFSS and RSA andModified RSA using c programming ,member in IETEFig 11:Poly Mat creation of AES in matlabREFERENCES[1]. Minal Moharir1 and Dr A V Suresh ,“A Novel Approach UsingAdvanced Encryption Standard to Implement Hard Disk Security” Vol.4,No.1, January 2012, International Journal of Network Security & ItsApplications (IJNSA)[2]. Samir El Adib and Naoufal Raissouni, “AES Encryption AlgorithmHardware Implementation: Throughput and Area Comparison of 128, 192and 256-bits Key”, Vol. 1, No. 2, July 2012, “International Journal ofReconfigurable and Embedded Systems (IJRES)”[3]. Hamdan.O.Alanazi, B.B.Zaidan, A.A.Zaidn, Hamid A.Jalab, M.Shabbirand Y. Al-Nabhani, “New Comparative Study Between DES, 3DES andAES within Nine Factors” VOLUME 2, ISSUE 3, MARCH 2010,JOURNAL OF COMPUTING[4]. Amish Kumar, Mrs. Namita Tiwari, “EFFECTIVEIMPLEMENTATION AND AVALANCHE EFFECT OF AES”, Vol. 1, No3/4, August 2012, International Journal of Security, Privacy and TrustManagement (IJSPTM)21www.alliedjournals.com

B.Inverse S-BOX The inverse S-Box can be defined as the inverse of the S-Box, the calculation of inverse S-Box will take place by the calculation of inverse affine transformation of an Input value that which is followed by multiplicative inverse The representation of Rijndael's inverse S-box is as follows Table 2: Inverse Sbox IV.

Related Documents:

kuhusu suala la utendaji wameshughulikia utendaji katika fasihi simulizi, tamthilia na sanaa za maonyesho. Ingawa riwaya imetafitiwa kwa kina, tafiti nyingi ni zile zinazoegemea fani na maudhui. Tofauti na tafiti hizi, utafiti huu umejikita katika utendaji wa kidrama katika riwaya, mintarafu riwaya ya Haini ya Shafi Adam Shafi

Robert “Mac” Stone . Jennifer Taylor . C. Reuben Walker . . Yesterday we heard from Dr. Temple Grandin on animal . Yamini, Dr. Yamini, and Dr. Sue Anderson, both of FDA. A note to the board. We don’t have direct back and forth communication with the technology this morning. We're going to be conveying the questions back

relationship in the flower marketing. In Karnataka the jasmine flower cultivation has been taken up in almost all districts. Thus, a study has been designed to assess the cost and returns structure of jasmine cultivation, identifying the marketing channel and to ascertain the problems in production and

1. Chandragudem Jasmine Collection Center Mylavaram is well-known for jasmine production. Local commission traders in the village of Chandragudem in Mylavaram collect jasmine flowers from farmers and send them to commission traders located at big agriculture market yards. Visit date: 21 October 2016 (FPO not registered at the time of visit)

Planet Money Makes a T-Shirt- People Why Workers Like Jasmine Are Getting A Raise This is the world behind our T-shirt: women like Jasmine and Doris working long hours in difficult conditions, dreaming of better lives for their families. Jasmine Akhter, 23, (center) began working in the garment industry when she was 16. (Joshua Davis for NPR)

Horticulture is a science, as well as, an art of production, utilisation and improvement of horticultural crops, such as fruits and vegetables, spices and condiments, . jasmine Rajasthan Pomegranate, onion, jasmine, tuberose Western . Flower cultivation Horticulture is perhaps the most important branch of agriculture. It is further divided into

Jasmine Rice in the Weeping Plain: . production and fair-trade marketing with farmers in Yasothorn Province. Compared with conventional chemical-based farming, . Seedlings flower and grow Harvest jasmine rice Climate now Starts raining Little or no rain Rain comes at the end of August, heavy in September Rain continues

AGMA American Gear Manufacturers Association AIA American Institute of Architects. AISI American Iron and Steel Institute ANSI American National Standards Institute, Inc. AREA American Railway Engineering Association ASCE American Society of Civil Engineers ASME American Society of Mechanical Engineers ASTM American Society for Testing and .