SlideShare a Scribd company logo
1 of 16
DESIGN AND IMPLEMENTATION OF
DATA ENCRYPTION SOFTWARE
Presented By
AYANDA DEMILADE ISAAC
B.Sc.inComputerScience
Supervisor: Mrs T.TSalau
Background of Study
• Data has historically been used primarily to
protect mission critical data, government
records and has been used increasingly over
many years by financial industry to protect
money transfers; by business to protect credit
card information for electronic commerce, and
by corporation to secure sensitive transmission
of proprietary information. (Oaks, 2000)
• Also, the use of encryption/decryption is as old
as the art of communication.
• In wartime, a cipher, often incorrectly called a
"code," can be employed to keep the enemy
from obtaining the contents of transmissions.
(Technically, a code is a means of representing a
signal without the intent of keeping it secret;
examples are Morse code and ASCII.) Simple
ciphers include the substitution of letters for
numbers, the rotation of letters in the alphabet,
and the "scrambling" of voice signals by
inverting the sideband frequencies. (Java
Security, 2001)
Statement of Problem
• There is need for protection and security which
include system protection against hardware or
software malfunction (or crashes) and security
protection against unauthorized or malicious
access. This requires some data not available to
other user. However, the structure of data files is
embedded in the application programs, so any
changes to the structure of a file may require
changing all programs that access that file.
Aims & Objectives
The aim of this dissertation is to compare three
encryption techniques which are Data
Encryption Standard (DES),. and Rijndael and
see which is more efficient. The objectives are:
• To consider their similarity functions and
differences.
• To provide a system based on the Rijndael
Algorithm.
Literature Review
Author Works Limitations
AES (Uli Kretzschmar.,
2009)
The elegance and
efficiency of the system
makes it suitable for either
hardware or software
systems.
Not safe because of its short
key with a length of only 56
bits.
IBM The algorithm encrypts a
64-bit plaintext using a 56-
bit key.
It has now become
increasingly feasible to break
a DES-encrypted ciphertext.
Rijndael
RSA (Ronald Rivest, Adi
Shamir and Leonard
Adleman)
Data is encrypted one
block at a time and is
decrypted with a different
key. RSA is embedded in
many popular software
products E.g Windows,
Netscape, Navigator.
RSA is much slower than RC4
and RC2
Literature Review
Author Works Limitation
Data Encryption Standard
(DES) in 1972 NBS
(National Bureau of
Standards)
Encrypting unclassified and
sensitive information.
A shortened key length &
were much more resistant
to the attack and slow
operation
TDES (TripleDES) by
Shantanu Bhadoria
It implemented to store
data in addition to the
initial use of encrypting
data in transit.
Run 3 times slower than
DES
Blowfish Ciper (Bruce
Schneier 1993)
It provides a good
encryption rate in
software.
Key limited to 256 bits
Research Methodology
• A comparative analysis is staged by critically
observing the responsive technique between the
RC4, Triple DES technique and AES using Rijndael
as the Secret-Key encryption system.
• The following factors are considered to
benchmark the performance of each techniques
based on vulnerabilities and reconnaissance i.e.
loopholes and fast hash-key:
• Structure
• Key length
Research Methodology
• Block length
• Operations
• Security
• Implementation
• Similarity
• Cipher type
• Cryptanalysis resistance and possible keys.
Result
Figure 1 Showing a plain text
Result
Figure 2 Showing a Cipher
Conclusion
• It has presented a new comparative analysis in
this study between Data Encryption Algorithm
of the Data Encryption Standard, and Rijndael
algorithm of the new Advanced Encryption
Standard (AES) in factors. These factors are
Rijndael is more efficient than DEA and is yet
to be rendered “broken”.
Conclusion
• The program can be incorporated in a
networked system which will have a central
database e.g. SQL Server or Oracle Server. This
program will help to retrieval files especially
text with secret key before and after access.
FUTURE WORK
• It is hereby recommended that a further
research for comparative analysis is fostered
in order to benchmark performance
evaluations other techniques using media
data such videos, audio etc. Rijndael is
suitable and economical for cryptal-analysis, it
is utmost necessary a continuous research
spans across its (Rijndael) applicability.
THANK YOU
QUESTIONS??

More Related Content

What's hot

Data encryption standard
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreLuisa Francisco
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computingRauf Wani
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmIRJET Journal
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.pptreshmy12
 
Container intrusions Do You Even IDS
Container intrusions Do You Even IDSContainer intrusions Do You Even IDS
Container intrusions Do You Even IDSAlfredo Hickman
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption TechniquesDel Elson
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmIJARIIT
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityDeris Stiawan
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletionvitam,berhampur
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityNeel Chakraborty
 
Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)maheshh1947
 

What's hot (20)

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Week13
Week13Week13
Week13
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Sujit
SujitSujit
Sujit
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Container intrusions Do You Even IDS
Container intrusions Do You Even IDSContainer intrusions Do You Even IDS
Container intrusions Do You Even IDS
 
Encryption Techniques
Encryption TechniquesEncryption Techniques
Encryption Techniques
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 
The Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network SecurityThe Challenges, Gaps and Future Trends: Network Security
The Challenges, Gaps and Future Trends: Network Security
 
Confidential data storage and deletion
Confidential data storage and deletionConfidential data storage and deletion
Confidential data storage and deletion
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud Security
 
Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)Cofidential data storage and deletion 2003 (2)
Cofidential data storage and deletion 2003 (2)
 

Similar to DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE

B03302007012
B03302007012B03302007012
B03302007012theijes
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm076TalathUnNabiAnik
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET Journal
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 

Similar to DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE (20)

B03302007012
B03302007012B03302007012
B03302007012
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 

DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE

  • 1. DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE Presented By AYANDA DEMILADE ISAAC B.Sc.inComputerScience Supervisor: Mrs T.TSalau
  • 2. Background of Study • Data has historically been used primarily to protect mission critical data, government records and has been used increasingly over many years by financial industry to protect money transfers; by business to protect credit card information for electronic commerce, and by corporation to secure sensitive transmission of proprietary information. (Oaks, 2000) • Also, the use of encryption/decryption is as old as the art of communication.
  • 3. • In wartime, a cipher, often incorrectly called a "code," can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. (Java Security, 2001)
  • 4. Statement of Problem • There is need for protection and security which include system protection against hardware or software malfunction (or crashes) and security protection against unauthorized or malicious access. This requires some data not available to other user. However, the structure of data files is embedded in the application programs, so any changes to the structure of a file may require changing all programs that access that file.
  • 5. Aims & Objectives The aim of this dissertation is to compare three encryption techniques which are Data Encryption Standard (DES),. and Rijndael and see which is more efficient. The objectives are: • To consider their similarity functions and differences. • To provide a system based on the Rijndael Algorithm.
  • 6. Literature Review Author Works Limitations AES (Uli Kretzschmar., 2009) The elegance and efficiency of the system makes it suitable for either hardware or software systems. Not safe because of its short key with a length of only 56 bits. IBM The algorithm encrypts a 64-bit plaintext using a 56- bit key. It has now become increasingly feasible to break a DES-encrypted ciphertext. Rijndael RSA (Ronald Rivest, Adi Shamir and Leonard Adleman) Data is encrypted one block at a time and is decrypted with a different key. RSA is embedded in many popular software products E.g Windows, Netscape, Navigator. RSA is much slower than RC4 and RC2
  • 7. Literature Review Author Works Limitation Data Encryption Standard (DES) in 1972 NBS (National Bureau of Standards) Encrypting unclassified and sensitive information. A shortened key length & were much more resistant to the attack and slow operation TDES (TripleDES) by Shantanu Bhadoria It implemented to store data in addition to the initial use of encrypting data in transit. Run 3 times slower than DES Blowfish Ciper (Bruce Schneier 1993) It provides a good encryption rate in software. Key limited to 256 bits
  • 8. Research Methodology • A comparative analysis is staged by critically observing the responsive technique between the RC4, Triple DES technique and AES using Rijndael as the Secret-Key encryption system. • The following factors are considered to benchmark the performance of each techniques based on vulnerabilities and reconnaissance i.e. loopholes and fast hash-key: • Structure • Key length
  • 9. Research Methodology • Block length • Operations • Security • Implementation • Similarity • Cipher type • Cryptanalysis resistance and possible keys.
  • 10. Result Figure 1 Showing a plain text
  • 12. Conclusion • It has presented a new comparative analysis in this study between Data Encryption Algorithm of the Data Encryption Standard, and Rijndael algorithm of the new Advanced Encryption Standard (AES) in factors. These factors are Rijndael is more efficient than DEA and is yet to be rendered “broken”.
  • 13. Conclusion • The program can be incorporated in a networked system which will have a central database e.g. SQL Server or Oracle Server. This program will help to retrieval files especially text with secret key before and after access.
  • 14. FUTURE WORK • It is hereby recommended that a further research for comparative analysis is fostered in order to benchmark performance evaluations other techniques using media data such videos, audio etc. Rijndael is suitable and economical for cryptal-analysis, it is utmost necessary a continuous research spans across its (Rijndael) applicability.