IJSRET V10 Issue2 195
IJSRET V10 Issue2 195
net/publication/379871849
Article in International Journal of Scientific Research and Engineering Trends · April 2024
CITATIONS READS
2 1,088
2 authors, including:
Manikandaprabhu P
Amrita Vishwa Vidyapeetham
36 PUBLICATIONS 82 CITATIONS
SEE PROFILE
All content following this page was uploaded by Manikandaprabhu P on 17 April 2024.
Abstract- In a time where preserving data privacy is vital, encryption serves a pivotal role in protecting information from
unauthorized intrusion. This review examines its application in encrypting and decrypting text data, shedding light on its
mechanisms and practical implications. The encryption algorithm utilizes advanced cryptographic techniques to safeguard the
confidentiality of messages exchanged. The purpose of cryptography encryption and decryption method leveraging for secure
communication. This review provides a comprehensive overview of AES encryption and decryption, highlighting its strengths,
weaknesses, and practical considerations. It effectively communicates the importance of AES in securing text data while
acknowledging its limitations and areas for improvement.
Index Terms- AES Algorithm, Cyber Security, Data Protection, Data Security, Decryption, Encryption, Key Generation, Secret
Code
Ensuring that this key remains clandestine and impervious to II. AES ALGORITHM
unauthorized access is paramount to preserving the integrity
and confidentiality of encrypted data [2]. The significance of The Advanced Encryption Standard (AES) superseded the
the secret key within symmetric cryptography cannot be Data Encryption Standard (DES) due to its superior speed and
overstated. Serving as the conduit through which information efficacy in securing electronic data [2]. AES utilizes three
is shielded from prying eyes, the secret key encapsulates the block ciphers to encrypt data, ensuring formidable protection
essence of secure communication. Its generation algorithm is against unauthorized access. Operating on a secret key shared
meticulously crafted to thwart adversarial attempts at guessing by both sender and receiver, AES employs mathematical
or reverse-engineering the key. This algorithmic sophistication transformations, including a substitution-permutation
ensures that the key remains resilient against cryptographic network, to obscure data. Through multiple encryption rounds,
AES further complicates the scrambled data, enhancing
© 2024 IJSRET
400
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X
security. Its adaptability to various key lengths provides Tayde, S., & Siledar, S. al [3] presented that the widespread
flexible security levels, making it a widely employed method use of smartphones and digital devices has heightened
for safeguarding sensitive information in digital concerns about data security. Encryption, a crucial technique,
communications and stored data. AES stands as a pivotal tool safeguards sensitive information during transmission.
in preventing unauthorized access and manipulation of digital Symmetric encryption relies on just one key for both
data. encrypting and decrypting data, while asymmetric encryption
uses two separate keys—one for encrypting and another for
III. HISTORY OF AES ALGORITHM decrypting.: public and private. Notable symmetric algorithms
include DES, 3DES, and AES
In the late 20th century, as the demand for heightened security
in encryption arose, the U.S. National Institute of Standards Agrawal, M., & Mishra, P. al [4] projected that ensuring
and Technology (NIST) initiated a competition in 1997 to accurate and secure information exchange is paramount.
replace the aging Data Encryption Standard (DES). Numerous Cryptography safeguards data during transit, preventing
submissions flooded in, including the Rijndael algorithm unauthorized access and tampering. It converts messages into
crafted by Belgian cryptographers Vincent Rijmen and Joan unreadable formats for transmission over insecure channels,
Daemen. Rijndael stood out for its formidable security and deterring unauthorized interception. Symmetric key
efficient performance across diverse computing platforms. algorithms, like RSA, offer faster processing and lower
Following rigorous evaluation, NIST declared Rijndael as the memory requirements compared to asymmetric ones.
successor to DES in October 2000, officially naming it the Moreover, symmetric encryption provides heightened security,
Advanced Encryption Standard (AES). Renowned for its ensuring that only intended recipients can decipher messages.
reliability, adaptability, and resilience, AES swiftly became This crucial role of cryptography ensures confidential and
the bedrock of contemporary cryptographic practices. Its reliable communication, crucial for seamless enterprise
widespread adoption across industries ensures the operations and mitigating potential economic losses due to
safeguarding of sensitive data during digital transmission and unauthorized access or tampering.
storage
Mahajan, P., & Sachdeva, A.al [5] introduced Encryption
IV. RELATED WORK algorithms that are classified into Symmetric (private) and
Asymmetric (public) key types. Symmetric encryption uses a
Padate, R., & Patel, A. al. [1] presented that data security is a single key for both encryption and decryption, whereas
top concern as most information is transferred online, making Asymmetric encryption employs two keys: a public key for
it vulnerable to attacks. Encryption, like AES, scrambles data encryption and a private key for decryption (e.g., RSA).
so only intended recipients can access it. AES is highly Asymmetric encryption resolves key distribution challenges
secure, with no known weaknesses besides brute force attacks, but is slower and computationally demanding. Commonly
which are impractical due to the vast number of possible keys. assessed encryption methods include AES, DES, and RSA.
Cryptography ensures data remains confidential and integral Research indicates that AES exhibits the shortest encryption
during storage or transmission, safeguarding sensitive time, while RSA demonstrates the longest. AES decryption
information effectively. surpasses other methods. Future efforts aim to further
compare AES, DES, and RSA, with a focus on enhancing
Abdullah, A. M. [2] explored the Internet communication is encryption and decryption speeds, especially for image and
crucial for transmitting large amounts of data, but it's prone to audio data.
security risks. Cryptography, including encryption and
decryption, is vital for safeguarding sensitive information. Ghoradkar, S., & Shinde, A. al [6] proposed the internet and
Encryption converts data into unreadable ciphertext to prevent wireless communication's widespread use, ensuring privacy
unauthorized access, while decryption reverses this process. and security is crucial. Cryptography, essential for reliability,
Modern cryptography ensures confidentiality, integrity, is integral in embedded system designs.
nonrepudiation, and authentication.
Symmetric key cryptography (shared key) and asymmetric
There are symmetric and asymmetric cryptography methods, key cryptography (distinct keys) are prevalent. Symmetric
with symmetric being faster. The Advanced Encryption systems like DES and AES use identical keys, with AES
Standard (AES) is a commonly used type of encryption offering robust security with 128, 192, or 256-bit keys. AES,
method that falls under the category of symmetric algorithms, with its 256-bit key, ensures high security, particularly in
providing robust security compared to older algorithms like image encryption and decryption. Its future applications
Data Encryption Standard (DES). include military communication, forensics, and intelligent
systems, promising secure data transmission and usage across
diverse domains.
© 2024 IJSRET
401
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X
Dworkin, M. J., al [8] This standard outlines the Rijndael 1. Encryption: Safeguarding Information in the Digital
algorithm, referred to as "the AES algorithm," a symmetric Age
block cipher processing 128-bit data blocks. It supports cipher In today's interconnected world, where digital communication
keys of 128, 192, and 256 bits, known as "AES-128," "AES- and data storage have become ubiquitous, the concept of
192," and "AES-256" respectively. The specification covers encryption stands as a bulwark against unauthorized access,
definitions, notation, mathematical properties, and algorithm data breaches, and privacy violations. Encryption, a process of
details including key expansion, encryption, and decryption. converting readable information into an unreadable format
Implementation aspects like key length support and known as ciphertext, plays a pivotal role in securing sensitive
restrictions are discussed. Appendices offer step-by-step data and communication channels. This comprehensive
examples and reference lists. This comprehensive standard exploration will delve into the intricacies of encryption, its
ensures clarity and consistency in utilizing AES for secure mechanisms, applications, challenges, and future trends.
data processing, offering flexibility and robustness in
encryption practices. Algorithms
Encryption algorithms are mathematical procedures that
V. IMPLEMENTATION OF AES dictate the specific steps involved in encrypting and
ALGORITHMS decrypting data. These algorithms employ complex
mathematical operations, including substitution, permutation,
In cryptography, some important terms are given below, and bitwise operations, are utilized to transform the plaintext
into ciphertext and vice versa, effectively scrambling and
Plaintext: Plaintext refers to the original text intended for
unscrambling the data. Common encryption algorithms
encryption.
include symmetric and asymmetric encryption techniques.
Cipher Text: Cipher Text is the result of encrypting the
plaintext. It's the encoded text obtained using a specific
Keys
key.
Encryption keys are crucial cryptographic elements that
Encryption: Encryption involves converting data into a govern the encryption and decryption procedures. In
coded format using a specific method. symmetric encryption, a single key is employed for both
Decryption: Decryption is the process of converting encryption and decryption, requiring secure distribution of
encrypted data back to its original form. this key among communicating entities. On the other hand,
Crypto Analyst: A Crypto Analyst is an individual asymmetric encryption employs a pair of keys: a public key
skilled in analyzing and deciphering codes. for encryption and a private key for decryption. This removes
the necessity for secure key exchange and facilitates secure
communication across untrusted channels.
Understanding Decryption
Key Retrieval
To decrypt encrypted data, the recipient must possess the
appropriate decryption key. In symmetric encryption, the same
key used for encryption is also used for decryption.
Conversely, in asymmetric encryption, the recipient uses their
private key to decrypt data encrypted with their public key.
Decryption Algorithm
Decryption algorithms are mathematical procedures
Figure 1: Process of Encrypt and Decrypt of text specifically crafted to undo the encryption process, effectively
transforming ciphertext back into plaintext. These algorithms
© 2024 IJSRET
402
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X
© 2024 IJSRET
403
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X
© 2024 IJSRET
404