SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 115
SECURE IMAGE ENCRYPTION USING AES
P. Radhadevi1
, P. Kalpana2
1, 2
Assistant Professor, Computer Application, SNIST, AP, India
radhajitender@gmail.com, ParsiKalpana@sreenidhi.edu.in
Abstract
Security in transmission of digital images has its importance in today’s image communications, due to the increasing use of images in
industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a
critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been
investigated and developed to protect data and personal privacy. Encryption is probably the most obvious one. In order to protect
valuable information from undesirable readers, image encryption is essential. This paper presents an application of AES (Advanced
Encryption Standard) operations in image encryption and decryption. The encrypted cipher images always display the uniformly
distributed RGB pixels.
Index Terms: Security, Image Processing, AES, Encryption and Decryption
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
In recent years, the advances in communication technology
have seen strong interest in digital image transmission.
However, growth of computer processor possessing power and
storage illegal access has become easier. Encryption involves
applying special mathematical algorithms and keys to
transform digital data into cipher code before they are
transmitted and decryption involves the application of
mathematical algorithms and keys to get back the original data
from cipher code, scientific community have seen strong
interest in image transmission. However, illegal data or image
access has become more easy and prevalent in wireless and
general communication networks. Information privacy
becomes a challenging issue. In order to protect valuable data
or image from undesirable readers, data or image encryption /
decryption is essential, furthermore. As such in this paper, a
scheme based on encryption has been proposed for secure
image transmission over channels.
Digital images, accounting for 70% of the information
transmission on the internet, is an important parts of network
exchanges. However, the image information, which is
different from text message, has larger scale of data, higher
redundancy and stronger correlation between pixels.
Traditional encryption algorithms such as DES, IDES, are
against the text messages to be proposed, which are not
suitable for digital image encryption, therefore, an reliable
digital image with characteristics is in urgent need of the
encryption scheme AES is suitable for image encryption, and
decryption with is closely related to some dynamics of its own
characteristics.
2. DESCRIPTION
The AES algorithm gains wide application in our daily life,
such as smart cards, cell phones, automated teller machines
and WWW servers. AES encrypts a plaintext to become a
ciphertext, which can be decrypted back to the original
plaintext by using common private key, an example is shown
in Figure 1a, It can be seen the ciphertext is very different
from and gives no clue to the original plaintext. Figure 1a
shows the Encryption of AES operation using cipher key
Fig -1a: Encryption of AES operation
Plaintext
Cipher
key
ciphertext
Encryptor
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 116
For the applications of AES image encryption and decryption,
the encrypted image should be different from and give no clue
to the original one, an example figure1b is shows the
encrypted image and that encrypted image to original image.
Fig -1b: Example for AES Encryption and Decryption
3. AES ALGORITHM
Rijndael is a block cipher developed by Joan Daemen and
Vincent Rijmen. The algorithm is flexible in supporting any
combination of data and key size of 128, 192, and 256 bits.
However, AES merely allows a 128 bit data length that can be
divided into four basic operation blocks. These blocks operate
on array of bytes and organized as a 4×4 matrix that is called
the state[3]. For full encryption, the data is passed through Nr
rounds (Nr = 10, 12, 14) .These rounds are governed by the
following transformations:
Subbyte Transformation: Is a non linear byte
Substitution, using a substation table (s-box), which is
constructed by multiplicative inverse and Affine
Transformation.
Shift rows transformation: Is a simple byte transposition,
the bytes in the last three rows of the state are cyclically
shifted; the offset of the left shift varies from one to three
bytes.
Mix columns transformation: Is equivalent to a matrix
multiplication of columns of the states. Each column vector is
multiplied by a fixed matrix. It should be noted that the bytes
are treated as polynomials rather than numbers.
Add round key transformation: Is a simple XOR
between the working state and the round key. This
transformation is its own inverse.
Fig-2a : diagram of AES encryption algorithm
Expansion key: With AES encryption, the secret key is
known to both the sender and the receiver. The AES
algorithm remains secure, the key cannot be determined by
any known means, even if an eavesdropper knows the
plaintext and the cipher text. The AES algorithm is designed
to use one of three key sizes (Nk). AES-128, AES-196 and
AES-256 use 128 bit (16 bytes, 4 words), 196 bit (24 bytes, 6
words) and 256 bit (32 bytes, 8 words) key sizes
respectively. These keys, unlike DES, have no known
weaknesses. All key values are equally secured thus no value
will render one encryption more vulnerable than another. The
keys are then expanded via a key expansion routine for use in
the AES cipher algorithm. This key expansion routine can be
performed all at once or „on the fly‟ calculating words as they
are needed.
Strengths:
 AES is extremely fast compared to other block
ciphers. (Though there are tradeoff between size and
speed)
 The round transformation is parallel by design. This
is important in dedicated hardware as it allows even
faster execution.
 AES was designed to be amenable to pipelining.
 The cipher does not use arithmetic operations so has
no bias towards big or little endian architectures.
 AES is fully self-supporting. Does not use SBoxes of
other ciphers, bits from Rand tables, digits of or any
other such jokes.
 AES is not based on obscure or not well understood
processes.
 The tight cipher and simple design does not leave
enough room to hide a trap door.
Encryptio
n
KEY
Decryption
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 117
Cryptanalysis of AES:
So far, the only successful attacks against AES
implementations have been side channel attacks. Side channel
attacks do not attack the underlying cipher and so have
nothing to do with its security as described here, but attack
implementations of the cipher on systems which inadvertently
leak data. There are several such known attacks on certain
implementations of AES.
In April 2005, D.J. Bernstein announced a cache timing attack
that he used to break a custom server that used Open SSL‟s
AES encryption. The custom server was designed to give out,
as much timing information as possible, and the attack
required over 200 million chosen plaintexts. In October 2005,
Dag Arne Osvik, Adi Shamir and EranTromer presented a
paper demonstrating several cache timing attacks against AES.
One attack was able to obtain an entire AES key after only
800 operations triggering encryptions, in a total of 65
milliseconds. This attack requires the attacker to be able to run
programs on the same system that is performing AES.
CONCLUSIONS
The above approach offers enhanced security, it aims to
provide user satisfaction by transmitting personal and sensitive
image data securely. The Advanced Encryption Standard
offers the flexibility of allowing different key sizes 128 bit,
192 bit and 256-bit key and the security is based on the
various random key selections, different S-box and strong
transformations. Thus the algorithm provides many different
flexible implementations. Lastly, this intends to give an
insight in understanding the concepts of image cryptography
along with the importance of secure image transmission. Apart
from that, the paper can be used to be developed further by
researchers or programmers and acts as a template for
ensuring the protection of image using encryption.
REFERENCES
[1]. B. Schneier, Applied Cryptography. NY: John Wiley &
Sons, 1996.
[2]. Burr, W.E., Selecting the Advanced Encryption Standard:
Security & Privacy Magazine, IEEE Volume 1, Issue 2, Mar-
Apr 2003 Page(s):43 – 52.
[3]. Chi-Feng Lu , Fast implementation of AES cryptographic
algorithms in smart cards; Yan-Shun Kao; Hsia-Ling Chiang;
Chung-Huang Yang; Security Technology, 2003.
[4]. FIPS PUB 197, Advanced Encryption Standard (AES),
National Institute of standards and Technology.
[5]. A.Menezes, P. van Oorschot, and S. Vanstone, Handbook
of Applied Cryptography, CRC Press, New York, 1997, p. 81-
83.
[6] Daniel J Bernstein Preliminary version of report “Cache-
Timing attacks on AES “ to National Science Foundation,
grant CCR-9983950.
[7] W.Stallings, Cryptography and Network Security. NJ:
Prentice Hall, 2003.
[8] Wikipedia, Page Title: Block cipher modes of operation
http://en.wikipedia.org/ wiki/Cipher_block_chaining.
[9] William Stallings, “Cryptography and Network Security
Principles and Practices”, Fourth Edition.
BIOGRAPHIES:
P. Radha Devi is working as Assistant
Professor, in the Dept of CA, Sreenidhi
Institute of Science and Technology,
Hyderabad. She has completed MTech
(CSE) from JNTU, Hyderabad. She is
having around 3 years of teaching
experience. She is interested in
Information Security and Web
Technologies.
P. Kalpana has completed her M.Tech
(CSE) from JNTU, Hyderabad. She is
having around 10 years of teaching
experience . She is working as Assistant
Professor in Sreenidhi Institute of Science
and Technology, Hyderabad. She received
a gold model from Nishitha Degree and
PG college. She is especially interested in
Cloud Computing, Information Security
and Network Security. She has already
some papers to her credit in various international journals.

More Related Content

What's hot

Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
Alexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
Alexander Decker
 

What's hot (18)

Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452Implementation of AES Algorithm in MicroController Using PIC18F452
Implementation of AES Algorithm in MicroController Using PIC18F452
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
319 325
319 325319 325
319 325
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
177 181
177 181177 181
177 181
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
331 340
331 340331 340
331 340
 
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA AlgorithmDual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
 

Viewers also liked

Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
eSAT Publishing House
 
Concrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbiaConcrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbia
eSAT Publishing House
 
Study of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositesStudy of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced composites
eSAT Publishing House
 
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
eSAT Publishing House
 
Usability guidelines for usable user interface
Usability guidelines for usable user interfaceUsability guidelines for usable user interface
Usability guidelines for usable user interface
eSAT Publishing House
 

Viewers also liked (20)

Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &Comparison of glass fiber reinforced concrete &
Comparison of glass fiber reinforced concrete &
 
Seasonal variation in greywater quality for a real life system
Seasonal variation in greywater quality for a real life systemSeasonal variation in greywater quality for a real life system
Seasonal variation in greywater quality for a real life system
 
Smart digital and analogue ambience control and
Smart digital and analogue ambience control andSmart digital and analogue ambience control and
Smart digital and analogue ambience control and
 
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
Radio frequency optimization of mobile networks in abeokuta, nigeria for impr...
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
Seismic response of circuit breakers
Seismic response of circuit breakersSeismic response of circuit breakers
Seismic response of circuit breakers
 
Modeling monthly average daily diffuse radiation for
Modeling monthly average daily diffuse radiation forModeling monthly average daily diffuse radiation for
Modeling monthly average daily diffuse radiation for
 
Concrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbiaConcrete based on alkali activated fly ash from one power plant in serbia
Concrete based on alkali activated fly ash from one power plant in serbia
 
Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...
 
Study of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced compositesStudy of properties of banana fiber reinforced composites
Study of properties of banana fiber reinforced composites
 
Cast metal flow analysis of intermediate flange
Cast metal flow analysis of intermediate flangeCast metal flow analysis of intermediate flange
Cast metal flow analysis of intermediate flange
 
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...Natural disasters vulnerability assessment of gondia district, maharashtra, i...
Natural disasters vulnerability assessment of gondia district, maharashtra, i...
 
A fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for anA fuzzy logic controlled dc dc converter for an
A fuzzy logic controlled dc dc converter for an
 
Usability guidelines for usable user interface
Usability guidelines for usable user interfaceUsability guidelines for usable user interface
Usability guidelines for usable user interface
 
Integrated grid inverter with frequency control scheme for wind mill applicat...
Integrated grid inverter with frequency control scheme for wind mill applicat...Integrated grid inverter with frequency control scheme for wind mill applicat...
Integrated grid inverter with frequency control scheme for wind mill applicat...
 
Overview of energy grid in india
Overview of energy grid in indiaOverview of energy grid in india
Overview of energy grid in india
 
Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
 
A low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter controlA low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter control
 

Similar to Secure image encryption using aes

PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 

Similar to Secure image encryption using aes (20)

AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES AlgorithmEmoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
H42054550
H42054550H42054550
H42054550
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 

Secure image encryption using aes

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 115 SECURE IMAGE ENCRYPTION USING AES P. Radhadevi1 , P. Kalpana2 1, 2 Assistant Professor, Computer Application, SNIST, AP, India radhajitender@gmail.com, ParsiKalpana@sreenidhi.edu.in Abstract Security in transmission of digital images has its importance in today’s image communications, due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access, Image security has become a critical issue. The difficulties in ensuring individuals privacy become increasingly challenging. Various methods have been investigated and developed to protect data and personal privacy. Encryption is probably the most obvious one. In order to protect valuable information from undesirable readers, image encryption is essential. This paper presents an application of AES (Advanced Encryption Standard) operations in image encryption and decryption. The encrypted cipher images always display the uniformly distributed RGB pixels. Index Terms: Security, Image Processing, AES, Encryption and Decryption -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION In recent years, the advances in communication technology have seen strong interest in digital image transmission. However, growth of computer processor possessing power and storage illegal access has become easier. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code, scientific community have seen strong interest in image transmission. However, illegal data or image access has become more easy and prevalent in wireless and general communication networks. Information privacy becomes a challenging issue. In order to protect valuable data or image from undesirable readers, data or image encryption / decryption is essential, furthermore. As such in this paper, a scheme based on encryption has been proposed for secure image transmission over channels. Digital images, accounting for 70% of the information transmission on the internet, is an important parts of network exchanges. However, the image information, which is different from text message, has larger scale of data, higher redundancy and stronger correlation between pixels. Traditional encryption algorithms such as DES, IDES, are against the text messages to be proposed, which are not suitable for digital image encryption, therefore, an reliable digital image with characteristics is in urgent need of the encryption scheme AES is suitable for image encryption, and decryption with is closely related to some dynamics of its own characteristics. 2. DESCRIPTION The AES algorithm gains wide application in our daily life, such as smart cards, cell phones, automated teller machines and WWW servers. AES encrypts a plaintext to become a ciphertext, which can be decrypted back to the original plaintext by using common private key, an example is shown in Figure 1a, It can be seen the ciphertext is very different from and gives no clue to the original plaintext. Figure 1a shows the Encryption of AES operation using cipher key Fig -1a: Encryption of AES operation Plaintext Cipher key ciphertext Encryptor
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 116 For the applications of AES image encryption and decryption, the encrypted image should be different from and give no clue to the original one, an example figure1b is shows the encrypted image and that encrypted image to original image. Fig -1b: Example for AES Encryption and Decryption 3. AES ALGORITHM Rijndael is a block cipher developed by Joan Daemen and Vincent Rijmen. The algorithm is flexible in supporting any combination of data and key size of 128, 192, and 256 bits. However, AES merely allows a 128 bit data length that can be divided into four basic operation blocks. These blocks operate on array of bytes and organized as a 4×4 matrix that is called the state[3]. For full encryption, the data is passed through Nr rounds (Nr = 10, 12, 14) .These rounds are governed by the following transformations: Subbyte Transformation: Is a non linear byte Substitution, using a substation table (s-box), which is constructed by multiplicative inverse and Affine Transformation. Shift rows transformation: Is a simple byte transposition, the bytes in the last three rows of the state are cyclically shifted; the offset of the left shift varies from one to three bytes. Mix columns transformation: Is equivalent to a matrix multiplication of columns of the states. Each column vector is multiplied by a fixed matrix. It should be noted that the bytes are treated as polynomials rather than numbers. Add round key transformation: Is a simple XOR between the working state and the round key. This transformation is its own inverse. Fig-2a : diagram of AES encryption algorithm Expansion key: With AES encryption, the secret key is known to both the sender and the receiver. The AES algorithm remains secure, the key cannot be determined by any known means, even if an eavesdropper knows the plaintext and the cipher text. The AES algorithm is designed to use one of three key sizes (Nk). AES-128, AES-196 and AES-256 use 128 bit (16 bytes, 4 words), 196 bit (24 bytes, 6 words) and 256 bit (32 bytes, 8 words) key sizes respectively. These keys, unlike DES, have no known weaknesses. All key values are equally secured thus no value will render one encryption more vulnerable than another. The keys are then expanded via a key expansion routine for use in the AES cipher algorithm. This key expansion routine can be performed all at once or „on the fly‟ calculating words as they are needed. Strengths:  AES is extremely fast compared to other block ciphers. (Though there are tradeoff between size and speed)  The round transformation is parallel by design. This is important in dedicated hardware as it allows even faster execution.  AES was designed to be amenable to pipelining.  The cipher does not use arithmetic operations so has no bias towards big or little endian architectures.  AES is fully self-supporting. Does not use SBoxes of other ciphers, bits from Rand tables, digits of or any other such jokes.  AES is not based on obscure or not well understood processes.  The tight cipher and simple design does not leave enough room to hide a trap door. Encryptio n KEY Decryption
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 01 Issue: 02 | Oct-2012, Available @ http://www.ijret.org 117 Cryptanalysis of AES: So far, the only successful attacks against AES implementations have been side channel attacks. Side channel attacks do not attack the underlying cipher and so have nothing to do with its security as described here, but attack implementations of the cipher on systems which inadvertently leak data. There are several such known attacks on certain implementations of AES. In April 2005, D.J. Bernstein announced a cache timing attack that he used to break a custom server that used Open SSL‟s AES encryption. The custom server was designed to give out, as much timing information as possible, and the attack required over 200 million chosen plaintexts. In October 2005, Dag Arne Osvik, Adi Shamir and EranTromer presented a paper demonstrating several cache timing attacks against AES. One attack was able to obtain an entire AES key after only 800 operations triggering encryptions, in a total of 65 milliseconds. This attack requires the attacker to be able to run programs on the same system that is performing AES. CONCLUSIONS The above approach offers enhanced security, it aims to provide user satisfaction by transmitting personal and sensitive image data securely. The Advanced Encryption Standard offers the flexibility of allowing different key sizes 128 bit, 192 bit and 256-bit key and the security is based on the various random key selections, different S-box and strong transformations. Thus the algorithm provides many different flexible implementations. Lastly, this intends to give an insight in understanding the concepts of image cryptography along with the importance of secure image transmission. Apart from that, the paper can be used to be developed further by researchers or programmers and acts as a template for ensuring the protection of image using encryption. REFERENCES [1]. B. Schneier, Applied Cryptography. NY: John Wiley & Sons, 1996. [2]. Burr, W.E., Selecting the Advanced Encryption Standard: Security & Privacy Magazine, IEEE Volume 1, Issue 2, Mar- Apr 2003 Page(s):43 – 52. [3]. Chi-Feng Lu , Fast implementation of AES cryptographic algorithms in smart cards; Yan-Shun Kao; Hsia-Ling Chiang; Chung-Huang Yang; Security Technology, 2003. [4]. FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of standards and Technology. [5]. A.Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997, p. 81- 83. [6] Daniel J Bernstein Preliminary version of report “Cache- Timing attacks on AES “ to National Science Foundation, grant CCR-9983950. [7] W.Stallings, Cryptography and Network Security. NJ: Prentice Hall, 2003. [8] Wikipedia, Page Title: Block cipher modes of operation http://en.wikipedia.org/ wiki/Cipher_block_chaining. [9] William Stallings, “Cryptography and Network Security Principles and Practices”, Fourth Edition. BIOGRAPHIES: P. Radha Devi is working as Assistant Professor, in the Dept of CA, Sreenidhi Institute of Science and Technology, Hyderabad. She has completed MTech (CSE) from JNTU, Hyderabad. She is having around 3 years of teaching experience. She is interested in Information Security and Web Technologies. P. Kalpana has completed her M.Tech (CSE) from JNTU, Hyderabad. She is having around 10 years of teaching experience . She is working as Assistant Professor in Sreenidhi Institute of Science and Technology, Hyderabad. She received a gold model from Nishitha Degree and PG college. She is especially interested in Cloud Computing, Information Security and Network Security. She has already some papers to her credit in various international journals.