SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 5 (Nov. - Dec. 2013), PP 35-38
www.iosrjournals.org
www.iosrjournals.org 35 | Page
Implementation of AES Algorithm in MicroController Using
PIC18F452
Ali E. Taki El_Deen1
and Ahmed Mohamed Fanni2
1
IEEE Senior Member, Alexandria University, Egypt
2
Electronics and Communications Dept, Mansoura University,Egypt
Abstract: Security has become an increasingly important feature with the growth of electronic communication
which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the
encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is
famous for its ciphering strength and its strong defense against any attack for example the brute force attack.
Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future
[3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old
encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it
would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key".
In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more
speed in both the encryption and decryption of the files.
Keywords: AES, Cryptography, DES, NIST, Rijndael, Serpent.
I. Introduction:
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until
recent decades, it has been the story of what might be called classic cryptography — that is, of methods
of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention
of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more
sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing
has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and
paper[1].
The development of cryptography has been paralleled by the development of cryptanalysis — the
"breaking" of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of
encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann
Telegram triggered the United States' entry into World War I; and Allied reading of Nazi Germany's ciphers
shortened World War II, in some evaluations by as much as two years [4].
Before the modern era, cryptography was concerned solely with message confidentiality (i.e.,
encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again
at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the
key needed for decryption of that message). Encryption was used to (attempt to)
ensure secrecy in communications, such as those of spies, military leaders, and diplomats [7]. In recent decades,
the field has expanded beyond confidentiality concerns to include techniques for message integrity checking,
sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among
others [5].
Towards the close of the 20th century, the National Institute for Standards and Testing (NIST)acted on
the need for a new encryption algorithm capable of protecting top secret information[2].
NIST is part of the Department of Commerce. It is a non-regulatory agency that, promotes "U.S. innovation and
industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance
economic security and improve quality of life.
"Early in the development process, NIST decided to draw on the world's finest cryptographic minds
and asked them to submit candidates for the new algorithm because the aging Data Encryption Standard (DES)
has many weaknesses. DES has a relatively small 56-bit key which was becoming vulnerable to brute force
attacks. In addition, the DES was designed primarily for hardware and is relatively slow when implemented in
software. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it is
unsuitable for limited-resource platforms; and it may be affected by potential security issues connected with the
(today comparatively small) block size of 64 bits. In 1997 NIST published a formal call which read in part: It is
intended that the AES will specify an unclassified, publicly disclosed encryption algorithm available royalty-
free worldwide that is capable of protecting sensitive government information well into the next century.
Implementation of AES Algorithm in MicroController Using PIC18F452
www.iosrjournals.org 36 | Page
The purpose of this notice is to solicit candidate algorithms from the public, academic/research communities,
manufacturers, voluntary standards organizations, and Federal, state, and local government organizations.
Following the close of the submission period, NIST intends to make all submissions publicly available for
review and comment.
The entire process spanned five years. Fifteen competing algorithms with colorful names such as
Rijndael (the eventual winner), Twofish and Serpent (the runners up) were scrutinized over a three year period
[8].
AES is now the industry standard for encryption. The NSA employs it for protecting secret information
and industry uses the algorithm for creating commercially available encryption products[3].
File encryption and email encryption are two common applications for AES. File encryption protects the
information on your hard disk or thumb drive. With encryption, your data will be secure even if your computer
is hacked or your USB drive stolen. Email encryption protects your messages as they journey through the cloud
and keeps them from being read by unintended recipients.
II. AES algorithm overview:
AES Algorithm consists of 2 Main Parts:
1- Encryption or Decryption Process:
Encryption process contains 4 main parts:
I-Add Round Key:Each byte of the state is combined with the round key using bitwise Xor.
II-Shift Row: transposition step
III-Sub Byte: non-linear substitution step using Sbox
IIII-Mix Column: mixing operation of each column using GF
Encryption process: It starts with AddRoundKey with RoundKey0.
Then go to loop and do SubByte, ShiftRow,MixColumn and AddRoundKey in that order for 9 Rounds each
round with different RoundKey(1-9).
Then go to the final round (Round10) and repeat the same previous functions in the loop except MixColumn.
Decryption process: it’s the reverse of encryption process in every step which means the decryption 1st
round is
the 10th
round of the encryption and it uses the inverse functions of MixColumn, SubByte and ShiftRow and as
u can assume the Keys arrangement are reversed too as it starts with Roundkey10 instead of Roundkey0 as it
was in the encryption process [8] [3].
2-Key Generation (Key Expansion):
It involves RotWord, SubByte And Xor bitwise operation to generate enough keys for each round in the
Encryption, Decryption process.
Summary of both encryption and decryption process are shown in the Fig. 2.
Implementation of AES Algorithm in MicroController Using PIC18F452
www.iosrjournals.org 37 | Page
As each round works with different key generated from the key generation process.
III. Implementation of AES Software and Hardware
AES-128 has been implemented on PIC18f452 using MIKROC PRO FOR PIC and interfaced it with
Keypad, Alphanumeric LCD 4x20, leds, buttons and Xbee Module for wireless communication as shown in fig.
3.
PIC18F452 pin diagram [6] is shown in fig. 4.
Keypad is used as an input device to enter the Plaintext, LCD is used to display both encrypted and decrypted
text, Xbee Module is used to send or receive the encrypted file from or to another exact same device, Leds is
used to indicate that there is text being received or the text is done being transmitted. The device can either
receive or send the encrypted text to another same device.
Implementation of AES Algorithm in MicroController Using PIC18F452
www.iosrjournals.org 38 | Page
Overview on the code
1-SubByte
2-ShiftRow
3-MixColumn
4-AddRoundKey
IV. Advantage of Implementation
You will need to have the device to be able to decrypt the encrypted file because it uses custom Sbox
instead of the standard one to ensure more security and the security fuses in the PIC can be enabled so the PIC
won't be readable to protect the code hence protect the algorithm so even if the encrypted message got hacked
by any means in order to break the encrypted file you will need to have the device first and then guess the key
which is practically impossible.
V. Conclusion
In this paper the implementation of AES-128 has given it more encryption power and enhanced its
security even more thus make it harder for anyone to hack the ciphered information and decrypted it.
The device components are simple and cheap in price so the cost isn't a problem at all.
REFERENCES
[1] Hans Delfs, Helmut Knebl, “Introduction to Cryptography: Principles and Applications”, Second Edition, ISBN: 9783540492436,
2007.
[2] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 9781584886181, 2005.
[3] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013.
[4] Christophe RITZENTHALER, “Cryptology course”, 2nd Semester 2006.
[5] ChristofPaar, Jan Pelzl, “Understanding Cryptography”, ISBN: 9783642041006, 2010
[6] Microchip. 2006. PIC18F452 Data Sheet. Printed by Microchip Technology, Inc in the United States of America.
[7] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone,“Hand Book of Applied Cryptography”, 1997.
[8] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013.

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Mahmoud Abdeen
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
Shakas Technologies
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
IJARBEST JOURNAL
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
IJERA Editor
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
eSAT Journals
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
eSAT Publishing House
 
Cryptography
CryptographyCryptography
Cryptography
Sourabh Badve
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
gr9293
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
Christopher Dubois
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
Gopal Sakarkar
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
pijans
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGDATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
IJNSA Journal
 

What's hot (20)

Network security
Network securityNetwork security
Network security
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Pdf3
Pdf3Pdf3
Pdf3
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
Cryptography
CryptographyCryptography
Cryptography
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
10.1.1.44.6790
10.1.1.44.679010.1.1.44.6790
10.1.1.44.6790
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Network Security
Network SecurityNetwork Security
Network Security
 
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGDATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
 

Similar to Implementation of AES Algorithm in MicroController Using PIC18F452

Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
ijtsrd
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
Ben Catchpole
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
Cyber security
Cyber securityCyber security
Cyber security
Aman Pradhan
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantum
ijaia
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 

Similar to Implementation of AES Algorithm in MicroController Using PIC18F452 (20)

Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
L017136269
L017136269L017136269
L017136269
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantum
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 

Implementation of AES Algorithm in MicroController Using PIC18F452

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 5 (Nov. - Dec. 2013), PP 35-38 www.iosrjournals.org www.iosrjournals.org 35 | Page Implementation of AES Algorithm in MicroController Using PIC18F452 Ali E. Taki El_Deen1 and Ahmed Mohamed Fanni2 1 IEEE Senior Member, Alexandria University, Egypt 2 Electronics and Communications Dept, Mansoura University,Egypt Abstract: Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is famous for its ciphering strength and its strong defense against any attack for example the brute force attack. Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future [3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key". In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more speed in both the encryption and decryption of the files. Keywords: AES, Cryptography, DES, NIST, Rijndael, Serpent. I. Introduction: Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper[1]. The development of cryptography has been paralleled by the development of cryptanalysis — the "breaking" of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram triggered the United States' entry into World War I; and Allied reading of Nazi Germany's ciphers shortened World War II, in some evaluations by as much as two years [4]. Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). Encryption was used to (attempt to) ensure secrecy in communications, such as those of spies, military leaders, and diplomats [7]. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others [5]. Towards the close of the 20th century, the National Institute for Standards and Testing (NIST)acted on the need for a new encryption algorithm capable of protecting top secret information[2]. NIST is part of the Department of Commerce. It is a non-regulatory agency that, promotes "U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve quality of life. "Early in the development process, NIST decided to draw on the world's finest cryptographic minds and asked them to submit candidates for the new algorithm because the aging Data Encryption Standard (DES) has many weaknesses. DES has a relatively small 56-bit key which was becoming vulnerable to brute force attacks. In addition, the DES was designed primarily for hardware and is relatively slow when implemented in software. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it is unsuitable for limited-resource platforms; and it may be affected by potential security issues connected with the (today comparatively small) block size of 64 bits. In 1997 NIST published a formal call which read in part: It is intended that the AES will specify an unclassified, publicly disclosed encryption algorithm available royalty- free worldwide that is capable of protecting sensitive government information well into the next century.
  • 2. Implementation of AES Algorithm in MicroController Using PIC18F452 www.iosrjournals.org 36 | Page The purpose of this notice is to solicit candidate algorithms from the public, academic/research communities, manufacturers, voluntary standards organizations, and Federal, state, and local government organizations. Following the close of the submission period, NIST intends to make all submissions publicly available for review and comment. The entire process spanned five years. Fifteen competing algorithms with colorful names such as Rijndael (the eventual winner), Twofish and Serpent (the runners up) were scrutinized over a three year period [8]. AES is now the industry standard for encryption. The NSA employs it for protecting secret information and industry uses the algorithm for creating commercially available encryption products[3]. File encryption and email encryption are two common applications for AES. File encryption protects the information on your hard disk or thumb drive. With encryption, your data will be secure even if your computer is hacked or your USB drive stolen. Email encryption protects your messages as they journey through the cloud and keeps them from being read by unintended recipients. II. AES algorithm overview: AES Algorithm consists of 2 Main Parts: 1- Encryption or Decryption Process: Encryption process contains 4 main parts: I-Add Round Key:Each byte of the state is combined with the round key using bitwise Xor. II-Shift Row: transposition step III-Sub Byte: non-linear substitution step using Sbox IIII-Mix Column: mixing operation of each column using GF Encryption process: It starts with AddRoundKey with RoundKey0. Then go to loop and do SubByte, ShiftRow,MixColumn and AddRoundKey in that order for 9 Rounds each round with different RoundKey(1-9). Then go to the final round (Round10) and repeat the same previous functions in the loop except MixColumn. Decryption process: it’s the reverse of encryption process in every step which means the decryption 1st round is the 10th round of the encryption and it uses the inverse functions of MixColumn, SubByte and ShiftRow and as u can assume the Keys arrangement are reversed too as it starts with Roundkey10 instead of Roundkey0 as it was in the encryption process [8] [3]. 2-Key Generation (Key Expansion): It involves RotWord, SubByte And Xor bitwise operation to generate enough keys for each round in the Encryption, Decryption process. Summary of both encryption and decryption process are shown in the Fig. 2.
  • 3. Implementation of AES Algorithm in MicroController Using PIC18F452 www.iosrjournals.org 37 | Page As each round works with different key generated from the key generation process. III. Implementation of AES Software and Hardware AES-128 has been implemented on PIC18f452 using MIKROC PRO FOR PIC and interfaced it with Keypad, Alphanumeric LCD 4x20, leds, buttons and Xbee Module for wireless communication as shown in fig. 3. PIC18F452 pin diagram [6] is shown in fig. 4. Keypad is used as an input device to enter the Plaintext, LCD is used to display both encrypted and decrypted text, Xbee Module is used to send or receive the encrypted file from or to another exact same device, Leds is used to indicate that there is text being received or the text is done being transmitted. The device can either receive or send the encrypted text to another same device.
  • 4. Implementation of AES Algorithm in MicroController Using PIC18F452 www.iosrjournals.org 38 | Page Overview on the code 1-SubByte 2-ShiftRow 3-MixColumn 4-AddRoundKey IV. Advantage of Implementation You will need to have the device to be able to decrypt the encrypted file because it uses custom Sbox instead of the standard one to ensure more security and the security fuses in the PIC can be enabled so the PIC won't be readable to protect the code hence protect the algorithm so even if the encrypted message got hacked by any means in order to break the encrypted file you will need to have the device first and then guess the key which is practically impossible. V. Conclusion In this paper the implementation of AES-128 has given it more encryption power and enhanced its security even more thus make it harder for anyone to hack the ciphered information and decrypted it. The device components are simple and cheap in price so the cost isn't a problem at all. REFERENCES [1] Hans Delfs, Helmut Knebl, “Introduction to Cryptography: Principles and Applications”, Second Edition, ISBN: 9783540492436, 2007. [2] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 9781584886181, 2005. [3] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013. [4] Christophe RITZENTHALER, “Cryptology course”, 2nd Semester 2006. [5] ChristofPaar, Jan Pelzl, “Understanding Cryptography”, ISBN: 9783642041006, 2010 [6] Microchip. 2006. PIC18F452 Data Sheet. Printed by Microchip Technology, Inc in the United States of America. [7] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone,“Hand Book of Applied Cryptography”, 1997. [8] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013.