Submit Search
Upload
Novel Advanced Encryption Standard (AES) Implementation Approach using Genetic Algorithm
•
1 like
•
63 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i12/IRJET-V4I12172.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
Recommended
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
IRJET Journal
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
IRJET Journal
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
audeleypearl
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
IRJET Journal
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
ijtsrd
Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Development
ijtsrd
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
IRJET Journal
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Novel Advanced Encryption Standard (AES) Implementation Approach using Genetic Algorithm
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
IRJET Journal
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET Journal
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
audeleypearl
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
IRJET Journal
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
ijtsrd
Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Development
ijtsrd
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
IRJET Journal
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
Similar to Novel Advanced Encryption Standard (AES) Implementation Approach using Genetic Algorithm
(20)
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
IRJET- A Review on Various Secured Data Encryption Models based on AES Standard
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Reply needed 1Public Key Cryptography is a form of asymmetric en.docx
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Emoji Encryption Using AES Algorithm
Emoji Encryption Using AES Algorithm
Rijndael Algorithm for Multiple File Encryption Development
Rijndael Algorithm for Multiple File Encryption Development
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
maisarahman1
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
anil_gaur
Hostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Kamal Acharya
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
Magic Marks
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
BhangaleSonal
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
Employee leave management system project.
Employee leave management system project.
Kamal Acharya
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
Recently uploaded
(20)
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
Hostel management system project report..pdf
Hostel management system project report..pdf
Online electricity billing project report..pdf
Online electricity billing project report..pdf
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
School management system project Report.pdf
School management system project Report.pdf
Employee leave management system project.
Employee leave management system project.
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
Novel Advanced Encryption Standard (AES) Implementation Approach using Genetic Algorithm
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 912 Novel Advanced Encryption Standard (AES) Implementation approach using Genetic Algorithm Amit Nevase1, Nagnath Hulle2 1Student, Department of Electronics & Telecommunication, GHRIET, Pune, Maharashtra, India 2Vice Principal, Department of Electronics & Telecommunication, GHRIET, Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - During the last few years, in the field of electronic data transmissions cryptography has vital importance. Advanced Encryption Standard (AES)designated by National Institute of Standards and Technology (NIST), to overcome the disadvantages of Data Encryption Standard (DES). The AES is widely used encryption algorithm in different security applications. The AES standard useskeysize of 128, 192 and 256 bit to provide more secure data. AES generates keys through the properties of the Rijndael Algorithm instead of conventional method of the key generation. This paper introduces a new encryptiontechnique where the Genetic Algorithms are used for keygeneration, this generated key is used for formation of S-Box. This new approach for AES S-Box to enhance the complexity of the structure of S-Box, making AES stronger by using Dynamic S- Box. In the hardware aspect, larger key size also means large area and minimum throughput. Advance Encryption algorithm can be relatively efficiently implemented in software on general-purpose processors, there is still a need for selection of better architecture for implementation of Advanced Encryption Standard. Key Words: Advanced Encryption Standard (AES), Genetic Algorithm, Dynamic S-Box 1. INTRODUCTION "Cryptography" refers to the change of information presentation from its unique structure into one another distinctive structure. The main goal is to make information more secured. The two main procedures are involved in Cryptography; the principal procedure isthe encryption and decryption. Data Encryption Standard(DES)[12],theElliptic Curve Cryptography (ECC) [12], the Advanced Encryption Standard (AES) [12] are the different cryptographic algorithm. The brute force were attempted to break such algorithms. Also some and side channel attacks are used to break such algorithms. The brute force attacks break the data encryption standard and made it uncertain algorithm. To replace Data Encryption Standard, National Institute of Standards and Technology (NIST) searched for another algorithm and Rijndael Algorithm is selected as next AES. Nowadays,AdvancedEncryptionStandard wasmostsecured cryptographic algorithm, usedbyNISTafterData Encryption Standard. The Advanced Encryption Standard algorithmhas widely used in RFID cards, firewalls, routers, firmware, UART, ATM machines, cellular phones and big servers. The AES algorithm has vital importance and hence the main aim of project is to present new efficient and more secure hardware architecture implementation of AESalgorithm. To implement hardware of AES algorithm, Field programmable Gate Arrays (FPGA) are used because they provide cryptographic algorithm agility, physical security, better performance. The main aim is high throughput which supports security and high bandwidth for various applications. 2. OBJECTIVES AND BLOCK DIAGRAM The Advanced Encryption Standard is most secured cryptographic algorithm nowadays. After failure of Data Encryption Standard, National Institute of Standards & Technology adopts AES. It is widely used cryptographic algorithm. The main focus on high throughput which supports security and high bandwidth for various applications. Considering importance of this work following objectives are defined. 1. S-Box generation based on Round Key 2. Development of novel algorithm using Advanced Encryption Standard and Genetic Algorithm to increase security. 3. Study of different hardware platforms to select suitable hardware platform for implementation. KeyGenerationusing GeneticAlgorithm AES Cipher AES CipherPlaintext128Bits Ciphertext128 Bits Plaintext128Bits Generationof DynamicS-Box Generationof DynamicInverse S-Box DecryptionEncryption Figure 1 Modified Structure
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 913 3. LITERATURE REVIEW In [5], author presents a new optimizationalgorithm.The Genetic Algorithm is used. It is used for problem solving through genetic operators. In [6], author presents Genetic Algorithms for cryptanalysis. The classical cryptosystems are changed by using Genetic Algorithms.Thedifferentgenetic operatorsare used to make more secure algorithm. The genetic operators are mutation, selection. The best fit key is selected by using fitness function. In [7], author presents a new algorithm that focus on generation and expansion of encryptionkeyof theAdvanced Encryption Standard. The key generation is the most important process in cryptanalysis. Author presents a new architecture that generates different keys. The new key generator architecture includes Genetic algorithm and Linear feedback shift register. It improves performance and efficiency of new algorithm. To implement these Altera Cyclone II architecture is studied with VHDL language. In [10], this paper author proposes a new method of use of genetic algorithms along with pseudorandom sequence for encryption. High data security is the features of this new algorithm. Also it provides high feasibility. Hence it is useful in commercial multimedia applications.Resultsindicatethat proposed system gives high throughput and real time data security. In [13], author discusses the enhancement of the AES algorithm and describes the process, which involves the generation of dynamic S-boxes for Advance Encryption Standard. The newly generated key dependent Sboxismore dynamic. It is difficult for the linear and differential cryptanalysis. 4. ADVANCED ENCRYPTION STANDARD The two Scientists from Belgian Vincent Rijmen and John Daemen [1] was publish a cipher Rijndael in 1998. After the failure of Data Encryption Standard, the Rijndael [1] was selected as Advanced Encryption Standard. The AES overcomes the disadvantages of DES. Under the Federal Information Processing Standards Publication 197 (FIPS), the National Institute of Standards and Technology (NIST), discuses all the information of AES. The Advanced Encryption Standard has a data size 128 bits i.e. 16 bytes with different key sizes of 128 bits, 192 bits and 256 bits. The key size is depends upon the number of encryption rounds. The 128 bit key size for 10 round, 192 for 12 and 256 for 14 rounds. The 128 bit data is formed in 4 X 4 array, which is called State Array, is used in encryption process. The initial data is converted into state array during the encryption process, after each round these data is changing until reached to final cipher text. During the decryption process, these cipher text array is keep changing to obtain original data. In every round of encryption and decryption process, new round key is generated using the initial key applied. The round structure of Advanced Encryption Standard shown in fig. 2 Byte Substitution Shift Row Mix column Add round key Figure 2 AES Round Structure The Advanced Encryption Standard structure with round 0 through 10 is shown in Figure 3. Add Round Key Add Round Key Byte Substitution Shift Row Mix Column Byte Substitution Shift Row Add Round Key Key (Round 0) Key (Rounds 1-9) Key (Round 10) Repeat for Rounds 1,…..,9 Figure 3 AES Structure 5. GENETIC ALGORITHM In 1859 Charles Darwin (1809-82) [11] published an extremely controversial book of title is “On the origin of species by means of natural selection, or the preservation of favored races in the struggle for life”, which is popularly known as The origin of species. Around the same time, Gregor Mendel (1822-84) [11] investigated the inheritance of characteristics, or traits, in his experiments with pea plants. By examining hybrids from different strains of plant he obtained some notion of the interactions of characters. In spite of the fact that Mendel's investigations established the frameworks for the investigation of genetics, it was notuntil 30 years after his demise that Walter Sutton (1877-1916)
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 914 [11] found that genes were a part of chromosomes in the nucleus. However, Darwin's theory emphasized the role of continuous variation within species. Conversely, particular contrasts between species are not uncommon in nature, i.e. discontinuous variation. Hugo de Varis (1848-1935) [11] observed that in a population of developed plants, strikingly different variations would periodically show up. To clarify this discontinuous variation, de Varis built up a theory of mutation. Superficially, the new investigation of genetics appeared to support the mutation theory of advancement against conventional Darwinism. The Genetic algorithms are random search andoptimization methods based upon the analogy of natural biological origin. Genetic Algorithms are the part of the evolutionary algorithms which also includes evolutionary programming, evolution strategies and genetic programming.Evolutionary algorithms operates with a population of potential solutions to a problem. It uses principle of survival of best fit solution. Mutation and reproduction to produce solution. At every iteration of an Evolutionary Algorithm, a new generation of alternative solutions are created by the processes of selection and reproduction a) Elements of Genetic Algorithm The Goldberg evaluates simple genetic algorithm (SGA). It has three basic elements selection, crossover and mutation and is to illustrate in flow chart shown in figure 4. 1) Population Generation The procedure of Genetic Algorithms, for the most part, begins with a populace which is arbitrarily created and is made out of a few chromosomes. 2) Selection Selection is the process of findingtheparticularindividual or number of offspring, alternative solutions for reproduction. 3) Crossover After the generation of population, the important parameter of genetic algorithm is to connect generated population. Likewise there are distinctive sorts of crossover, for example, one point crossover or two point crossover or uniform crossover. Crossover operator is used to generate best fit generation than previous one. 4) Mutation The mutation is arbitrary process where one factorofa gene is replaced by different to generate a new genetic structure. Initial Population Generation Crossover Mutation Stopping condition met Selection Select the best fit key No Yes Figure 4 Elements in GA 6. RESULTS The novel algorithm has been simulated and the results are shown in figure. The results are showing of key generation using genetic algorithm. The results satisfy the encryption and decryption methodology. Figure 5 Key Generation using GA Figure 6 Encryption Figure 7 Decryption
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 915 7. CONCLUSIONS In this paper we present the Novel Advanced Encryption Standard implementationapproachusingGenetic Algorithm. The key generation will be takes place by major elements of Genetic Algorithms like crossover, mutation and selection. The generated key is used for the making the byte substitution key dependent and these newly generated S- Boxes are used in the different rounds in Advance Encryption Standard (AES) process. REFERENCES [1] Joan Daemen and Vincent Rijimen. The Design of Rijindael. Springer,2002, pp-31-50. [2] X. Zhang and K. K. Parhi, "Implementation approaches for the advanced encryption standard algorithm", IEEE Circuits Syst. Mag., vol. 2, no. 4, pp.24 -46 2002. [3] Alireza Hodjat, Ingrid Verbauwhede. “Area- Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors”. IEEE TRANSACTIONS ON COMPUTERS, VOL. 55, NO. 4, 366-372, APRIL 2006. [4] K. Gaj and P. Chodowiec, "Comparison of the hardware performance of the AES candidates using reconfigurable hardware", Proc. 3rd AES Conf. (AES3), 2000 [online] Available: item>http://csrc.nist.gov/encryption/aes/round2/ conf3/aes3papers.html</item> [5] Bethany Delman, Genetic Algorithms in Cryptography, MS Thesis 2004. [6] Karel P.Bergmann,RenateScheidler,Christian Jacob. “Cryptanalysis using Genetic Algorithms”, GECCO 2008. [7] Sliman Arrag, Abdellatif Hamdoun, Abderrahim Tragha. “Replace AES Key Expansion Algorithm By Modified Genetic Algorithm”. AppliedMathematical Sciences, Vol. 7, No. 144, 7161-7171, 2013. [8] Sindhuja K , Pramela Devi S. “A Symmetric Key Encryption Technique Using Genetic Algorithm”. (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1), 414-416, 2014. [9] Sania Jawaid, Adeeba Jamal. “Generating the Best Fit Key in Cryptography using Genetic Algorithm”. International Journal of Computer Applications, Volume 98 – No.20 33-39, July 2014 [10] Anil Kumar and M. K. Ghose, Overview of Information Security Using Genetic Algorithm and Chaos, Information Security Journal: A Global Perspective, 18:306–315, 2009. [11] A.M.S.Zalzala and P.J.Fleming. GeneticAlgorithmsin Engineering Systems. IEEE Control Engineering Series 55,1997, pp-1-41. [12] Serge Vaudenay. A Classical Introduction to Cryptography-Applications for Communications Security. Springer, 2006, pp-1-60. [13] Ashwak alabaichi and Adnan Ibrahem Salih. “Enhance Security of Advance Encryption Standard Algorithm Based on Key Dependent S-Box”, Digital Information Processing and Communications (ICDIPC), 2015 Fifth International Conference. Sierre, 2015, pp-44-53. BIOGRAPHIES Amit Nevase received B.E. (2010) in Electronics Engineering from Walchand College of Engineering, Sangli, Maharashtra, India. He is currently a Post graduate student of Electronics and Telecommunication Engineering in G. H. Raisoni Institute of Engineering and Technology, Pune, Maharashtra, India. Nagnath Hulle is currently Vice Principal of G. H. Raisoni Institute of Engineering and Technology, Pune, Maharashtra, India. He bagged second prize in Institution of Engineers (IE) Annual Technical Meet 2012. Also bagged First prize in Institution of Engineers (IE) Annual Technical Meet 2013. His research interests include Cryptography, Advanced Encryption Standard.
Download now