rijndael algorithm
Recently Published Documents


TOTAL DOCUMENTS

53
(FIVE YEARS 5)

H-INDEX

7
(FIVE YEARS 0)

Author(s):  
Surya Tej KR ◽  
Poornima N

The data owner may adapt attribute-based encryption to encrypt the stored information for attaining access control and keeping data secure, in the cloud. As a solution to this, an encryption-based algorithm with delegation can be used. Therefore, AES Rijndael algorithm is adapted to encrypt and decrypt the data using the same key with the digitization of traditional records, police stations encounter difficult problems, such as crime case summary storage and access. Managing department, spends considerable time querying the required data when accessing crime case summary. On this basis, this study proposes a case summary sharing scheme which uses ciphertext-based encryption to ensure data confidentiality and access control of crime case summary The officer may encrypt the stored information for attaining access control and keeping data secure. Therefore, AES Rijndael algorithm is used for encryption. This algorithm ensures security of information and enables Privacy.


2020 ◽  
Vol 8 (5) ◽  
pp. 2565-2571

Nowadays, the data encryption became very important because of the usage of the data transmission in all the filed. The Advanced Encryption Standard (AES) that known as Rijndael algorithm is one of the most common encryption algorithms. The AES consists of 9 rounds in addition to the initial and final rounds that makes the AES consumes much time for encrypting the data. Of course the time consumption is considered one of the problems that face the information security. The more time the encryption system consumes to encrypt the data, the more chances increase for the hackers to break into the system. In this work, we find a new technique that can be used to increase the performance speed of the advanced encryption standard. The proposed algorithm methodology depends on the pipelined processing method for the processing time reduction. The paper includes a discussion of the design, the analysis and the implementation using Field Programmable Gate Array (FPGA) of the pipelined method to reduce the consumed numbers of clocks and speed up the processes. The AES is used to protect information and encrypt sensitive data and used in satellites, missiles, military application and other critical application. The paper describes the AES encryption system algorithm and the implementation of both the normal processing and the pipelined processing, and finally a comparison between the two algorithms.


Author(s):  
Ade Chandra Saputra ◽  
Agus Sehatman Saragih

More and more abuse of digital images, data or information that is personal in nature can be easily known by others who are not entitled through digital images. This can cause material and immaterial losses to people whose personal information is misused by others. Then the application applies the Rijndael algorithm to secure digital image images which contain information or data that is personal in nature. In securing digital images, the Rijndael algorithm is used to protect the information contained in these images, this algorithm runs with processes such as SubBytes, ShiftRows, MixColumns, and AddRoundKey. The methodology applied is data collection methods such as field studies and literature studies, then methods of developing Waterfall software (Communication, Planning, Modeling, Construction, and Deployment) for system design. The results of the test analysis get an accuracy value of 100% from the 14 image files tested, all of them were successfully encrypted and decrypted so that it returned to the original form of the original image. For further development, this application can input the data files of other documents and increase the key length to 196 bits and 256 bits


Author(s):  
Ade Chandra Saputra ◽  
Agus Sehatman Saragih

The misuse of digital image images is increasing, data or information that is of a personal nature can easily be known by others who are not entitled through digital images. This can cause material and immaterial losses to people whose personal information is misused by others. Then the application applies the Rijndael algorithm to secure digital image images which contain information or data that is of a personal nature. In securing digital image images, Rijndael's algorithm is used to protect the information contained in the image, the algorithm runs with processes such as SubBytes, ShiftRows, MixColumns, and AddRoundKey. The methodology applied is data collection methods such as field studies and literature studies, then Waterfall software development methods (Communication, Planning, Modeling, Construction, and Deployment) for system design


Jurnal INFORM ◽  
2018 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Ilham Arnomo

The purpose of the research is to analyze the comparison of technology, network and security aspect between CDMA and GSM (Global System for Car communication). Using a comparative analysis research method between CDMA and GSM technologies that includes comparisons of network, technology, and security aspects. Using references from previous research on cellular telecommunications, the introduction of CDMA and GSM technologies to aspects of technology, networking and security. The results show that the technological aspect, CDMA used advanced spectrum technology that can provide superior sound quality and GSM uses a spectrum division technology that makes communication constant. From the network aspect, CDMA used direct-spreading spectrum (DS-CDMA) and GSM network is divided into three main systems: switching system (SS), base station system (BSS), and operating system and support (OSS). As well as security aspects, the GSM uses A3 and A8 algorithms for authentication and A5 algorithms were used in the process of sending information.But the security system using this algorithm, found weaknesses that allow data tapping or customer identity fraud. While CDMA offers aspects of network security by developing encryption algorithms.For encryption techniques used Rijndael algorithm is safe and very fast. A3 and A8 algorithms can recognize the customer's identity well, and the A5 algorithm can transmit the accuracy of information between MS and BTS.


2018 ◽  
Vol 18 (1) ◽  
pp. 33
Author(s):  
Ahmad Khoirul Umam ◽  
Ahmad Kamsyakawuni ◽  
Abduh Riski

Cryptography is the science of maintaining or securing an information by scrambling or hiding information so that it is difficult to analyze. The algorithm used in this study is the AES 128 algorithm that has been changed using the grayscale image. The AES algorithm is a modern algorithm that replaces the DES algorithm, and is an algorithm that is chosen to secure a data / message because it is efficient and has strong security. In the process, the grayscale image key is divided into 16 blocks of pixels, pixels are operated on each block with XOR operations so that one character will be obtained for each block. From the XOR process of pixels in 16 blocks, 16 characters or 128 bits long will be obtained. The data used in this study are plain images in the form of grayscale images and keys in the form of grayscale images as well. Grayscale (plain image) images will be encrypted with an image key that is also a grayscale image. Initially, the key will be taken from a grayscale image by dividing 16 blocks to get a 128-bit long key, then generating the key with the key generator in the AES algorithm so that it will get 10 sub-keys. Then encryption is done with 10 subkeys that were obtained using the AES algorithm. The results of the encryption process will produce an encoded image or cipher image that does not contain information from the plain image. The results of this algorithm are fairly safe against attacks because they have varied and sensitive keys. Keywords: Cryptography, AES, Rijndael Algorithm, Grayscale


Sign in / Sign up

Export Citation Format

Share Document