Implementation of 128-Bit AES Algorithm in MATLAB
Implementation of 128-Bit AES Algorithm in MATLAB
net/publication/301227113
CITATIONS READS
2 2,016
3 authors, including:
AR Reddy Jilani S A K
Madanapalle Institute of Technology & Science Madanapalle Institute of Technology & Science
51 PUBLICATIONS 69 CITATIONS 35 PUBLICATIONS 52 CITATIONS
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by AR Reddy on 04 August 2018.
The plaintext of size 128bits are given as measured encryption time is 12.56 ms for the first
input using a symmetric key enables to perform round.
four byte oriented operations to get the cipher text.
The four byte oriented operations involves C.Full encryption time: This is measured using the
substitution of bytes, shifting rows, mixing of method described in the one round encryption time
columns, and add-round key. This four byte measurement. The tic toc command used in the
oriented operations undergoes 10 rounds for beginning and the end of the main program. The
simulating 128bit input plaintext and gives the measured encryption time is 87.57ms for first
cipher text out so, encryption is done and then plaintext input shown in the Table 1. Likewise for
cipher text is given as input and then cipher-text is different eight inputs corresponding encryption
given as input to the decryption process then it times are tabulated.
performs the inverse process for 4-byte oriented
operations and then it undergoes ten rounds for D.Full decryption time: This is measured using the
getting the plaintext as decrypted output. The method described in the one round encryption time
number of rounds depends on the size of the key measurement. The tic toc command used in the
used in this process. So that encryption and beginning and the end of decryption main program.
decryption are evaluated and plotted. The key The measured decryption time is 88.007ms for
schedule time for this encryption and decryption is plaintext input shown in the Table 2. Likewise for
being tabulated in the experimental results section. different eight inputs corresponding decryption
The time of encryption and decryption for one times are tabulated.
round is also tabulated in the next section. All this
entire process is done in HP desktop 64-bit Table.2: Time of Encryption and Decryption for different inputs.
operating system with 4GB-RAM, i5 processor and
2.20 GHz frequency.
The above graph shows the time of His current research areas in Cryptography and its
encryption and decryption, blue colour indicates application to wireless systems and network
the encryption time and green colour indicates security. He has published and presented papers in
decryption time. journals, international and national level
On the x-axis the input values and on y- conferences.
axis time of encryption and decryption is taken, 3.Dr. S A K Jilani is working as the Professor and
first input has its own encryption and decryption project coordinator in the department of ECE,
time, like wise all for 8-inputs the corresponding Madanapalle Institute of Technology and Sciences,
outputs are plotted. Madanapalle. He has the teaching experience of
over -twelve years. He also worked as an R&D
E.Results and discussion: The measured results Professi- onal earlier in Electronics Industry. He
presented above are for MATLAB implementation obtained his PhD In the year 2002 and also
of AES on HP notebook 64bit OS, i5 processor. published more than 35 papers in different national
These results are compared with the results and international Journals. He has also guided more
published by Sambasiva Reddy et al [2]. The than 50 M.Tech, M.Sc, MCA, B.Tech Projects. His
MATLAB implementation is able execute within areas of interest are Artificial Intelligence,
88 ms, whereas Embedded Development Kit Computer Visions, Digital Signal Processing and
(EDK) requires 2.06 s [2]. Embedded Systems.