0% found this document useful (0 votes)
19 views6 pages

IJSRET V10 Issue2 195

Uploaded by

SUBHASHREE BASU
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views6 pages

IJSRET V10 Issue2 195

Uploaded by

SUBHASHREE BASU
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/379871849

A Review of Encryption and Decryption of Text Using the AES Algorithm

Article in International Journal of Scientific Research and Engineering Trends · April 2024

CITATIONS READS

2 1,088

2 authors, including:

Manikandaprabhu P
Amrita Vishwa Vidyapeetham
36 PUBLICATIONS 82 CITATIONS

SEE PROFILE

All content following this page was uploaded by Manikandaprabhu P on 17 April 2024.

The user has requested enhancement of the downloaded file.


International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X

A Review of Encryption and Decryption of Text Using


the AES Algorithm
Assistant Professor Dr.P. Manikandaprabhu, Ms. M. Samreetha
Department of Computer Science
Sri Ramakrishna College of Arts & Science Coimbatore, India

Abstract- In a time where preserving data privacy is vital, encryption serves a pivotal role in protecting information from
unauthorized intrusion. This review examines its application in encrypting and decrypting text data, shedding light on its
mechanisms and practical implications. The encryption algorithm utilizes advanced cryptographic techniques to safeguard the
confidentiality of messages exchanged. The purpose of cryptography encryption and decryption method leveraging for secure
communication. This review provides a comprehensive overview of AES encryption and decryption, highlighting its strengths,
weaknesses, and practical considerations. It effectively communicates the importance of AES in securing text data while
acknowledging its limitations and areas for improvement.

Index Terms- AES Algorithm, Cyber Security, Data Protection, Data Security, Decryption, Encryption, Key Generation, Secret
Code

I. INTRODUCTION attacks, thereby bolstering the security posture of the


encrypted data.
In the realm of cybersecurity and information protection,
symmetric cryptography stands as a foundation, stimulating Once the secret key emerges from the crucible of key
the data and upholding the purity of confidentiality [19]. At its generation, it assumes a mantle of confidentiality, shared
core, symmetric cryptography revolves around the pivotal solely between the sender and the intended recipient. This
process of secret key generation elemental procedure that secret key exchange embodies the cornerstone of symmetric
reinforces secure communication and data encryption. This cryptography, orchestrating a symbiotic relationship between
paper delves into the complex domain of symmetric security and accessibility [4]. By entrusting the secret key
cryptography, unraveling the essence of secret key generation exclusively to authorized entities, the sanctity of encrypted
and its indispensable role in safeguarding digital information data is preserved, shielding it from the prying eyes of
[1]. Symmetric cryptography relies on a single shared key for malevolent adversaries. Symmetric cryptography epitomizes
both encrypting and decrypting data. The genesis of this a delicate balance between robust security measures and
shared key lies within the meticulous procedure of key operational efficiency. The clandestine exchange of secret
generation. This essential process initiates with the utilization keys engenders a realm of trust between communicative
of a random number generator, employed to craft a unique entities, fostering an environment conducive to secure data
cryptographic key. This key serves as the linchpin of data transmission. However, this symbiotic relationship is
security, furnishing the mechanism to transform plaintext into contingent upon the impregnability of the secret key testament
ciphertext and vice versa. to the pivotal role of key generation in fortifying data security.

Ensuring that this key remains clandestine and impervious to II. AES ALGORITHM
unauthorized access is paramount to preserving the integrity
and confidentiality of encrypted data [2]. The significance of The Advanced Encryption Standard (AES) superseded the
the secret key within symmetric cryptography cannot be Data Encryption Standard (DES) due to its superior speed and
overstated. Serving as the conduit through which information efficacy in securing electronic data [2]. AES utilizes three
is shielded from prying eyes, the secret key encapsulates the block ciphers to encrypt data, ensuring formidable protection
essence of secure communication. Its generation algorithm is against unauthorized access. Operating on a secret key shared
meticulously crafted to thwart adversarial attempts at guessing by both sender and receiver, AES employs mathematical
or reverse-engineering the key. This algorithmic sophistication transformations, including a substitution-permutation
ensures that the key remains resilient against cryptographic network, to obscure data. Through multiple encryption rounds,
AES further complicates the scrambled data, enhancing

© 2024 IJSRET
400
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X

security. Its adaptability to various key lengths provides Tayde, S., & Siledar, S. al [3] presented that the widespread
flexible security levels, making it a widely employed method use of smartphones and digital devices has heightened
for safeguarding sensitive information in digital concerns about data security. Encryption, a crucial technique,
communications and stored data. AES stands as a pivotal tool safeguards sensitive information during transmission.
in preventing unauthorized access and manipulation of digital Symmetric encryption relies on just one key for both
data. encrypting and decrypting data, while asymmetric encryption
uses two separate keys—one for encrypting and another for
III. HISTORY OF AES ALGORITHM decrypting.: public and private. Notable symmetric algorithms
include DES, 3DES, and AES
In the late 20th century, as the demand for heightened security
in encryption arose, the U.S. National Institute of Standards Agrawal, M., & Mishra, P. al [4] projected that ensuring
and Technology (NIST) initiated a competition in 1997 to accurate and secure information exchange is paramount.
replace the aging Data Encryption Standard (DES). Numerous Cryptography safeguards data during transit, preventing
submissions flooded in, including the Rijndael algorithm unauthorized access and tampering. It converts messages into
crafted by Belgian cryptographers Vincent Rijmen and Joan unreadable formats for transmission over insecure channels,
Daemen. Rijndael stood out for its formidable security and deterring unauthorized interception. Symmetric key
efficient performance across diverse computing platforms. algorithms, like RSA, offer faster processing and lower
Following rigorous evaluation, NIST declared Rijndael as the memory requirements compared to asymmetric ones.
successor to DES in October 2000, officially naming it the Moreover, symmetric encryption provides heightened security,
Advanced Encryption Standard (AES). Renowned for its ensuring that only intended recipients can decipher messages.
reliability, adaptability, and resilience, AES swiftly became This crucial role of cryptography ensures confidential and
the bedrock of contemporary cryptographic practices. Its reliable communication, crucial for seamless enterprise
widespread adoption across industries ensures the operations and mitigating potential economic losses due to
safeguarding of sensitive data during digital transmission and unauthorized access or tampering.
storage
Mahajan, P., & Sachdeva, A.al [5] introduced Encryption
IV. RELATED WORK algorithms that are classified into Symmetric (private) and
Asymmetric (public) key types. Symmetric encryption uses a
Padate, R., & Patel, A. al. [1] presented that data security is a single key for both encryption and decryption, whereas
top concern as most information is transferred online, making Asymmetric encryption employs two keys: a public key for
it vulnerable to attacks. Encryption, like AES, scrambles data encryption and a private key for decryption (e.g., RSA).
so only intended recipients can access it. AES is highly Asymmetric encryption resolves key distribution challenges
secure, with no known weaknesses besides brute force attacks, but is slower and computationally demanding. Commonly
which are impractical due to the vast number of possible keys. assessed encryption methods include AES, DES, and RSA.
Cryptography ensures data remains confidential and integral Research indicates that AES exhibits the shortest encryption
during storage or transmission, safeguarding sensitive time, while RSA demonstrates the longest. AES decryption
information effectively. surpasses other methods. Future efforts aim to further
compare AES, DES, and RSA, with a focus on enhancing
Abdullah, A. M. [2] explored the Internet communication is encryption and decryption speeds, especially for image and
crucial for transmitting large amounts of data, but it's prone to audio data.
security risks. Cryptography, including encryption and
decryption, is vital for safeguarding sensitive information. Ghoradkar, S., & Shinde, A. al [6] proposed the internet and
Encryption converts data into unreadable ciphertext to prevent wireless communication's widespread use, ensuring privacy
unauthorized access, while decryption reverses this process. and security is crucial. Cryptography, essential for reliability,
Modern cryptography ensures confidentiality, integrity, is integral in embedded system designs.
nonrepudiation, and authentication.
Symmetric key cryptography (shared key) and asymmetric
There are symmetric and asymmetric cryptography methods, key cryptography (distinct keys) are prevalent. Symmetric
with symmetric being faster. The Advanced Encryption systems like DES and AES use identical keys, with AES
Standard (AES) is a commonly used type of encryption offering robust security with 128, 192, or 256-bit keys. AES,
method that falls under the category of symmetric algorithms, with its 256-bit key, ensures high security, particularly in
providing robust security compared to older algorithms like image encryption and decryption. Its future applications
Data Encryption Standard (DES). include military communication, forensics, and intelligent
systems, promising secure data transmission and usage across
diverse domains.

© 2024 IJSRET
401
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X

Dworkin, M. J., al [8] This standard outlines the Rijndael 1. Encryption: Safeguarding Information in the Digital
algorithm, referred to as "the AES algorithm," a symmetric Age
block cipher processing 128-bit data blocks. It supports cipher In today's interconnected world, where digital communication
keys of 128, 192, and 256 bits, known as "AES-128," "AES- and data storage have become ubiquitous, the concept of
192," and "AES-256" respectively. The specification covers encryption stands as a bulwark against unauthorized access,
definitions, notation, mathematical properties, and algorithm data breaches, and privacy violations. Encryption, a process of
details including key expansion, encryption, and decryption. converting readable information into an unreadable format
Implementation aspects like key length support and known as ciphertext, plays a pivotal role in securing sensitive
restrictions are discussed. Appendices offer step-by-step data and communication channels. This comprehensive
examples and reference lists. This comprehensive standard exploration will delve into the intricacies of encryption, its
ensures clarity and consistency in utilizing AES for secure mechanisms, applications, challenges, and future trends.
data processing, offering flexibility and robustness in
encryption practices. Algorithms
Encryption algorithms are mathematical procedures that
V. IMPLEMENTATION OF AES dictate the specific steps involved in encrypting and
ALGORITHMS decrypting data. These algorithms employ complex
mathematical operations, including substitution, permutation,
In cryptography, some important terms are given below, and bitwise operations, are utilized to transform the plaintext
into ciphertext and vice versa, effectively scrambling and
 Plaintext: Plaintext refers to the original text intended for
unscrambling the data. Common encryption algorithms
encryption.
include symmetric and asymmetric encryption techniques.
 Cipher Text: Cipher Text is the result of encrypting the
plaintext. It's the encoded text obtained using a specific
Keys
key.
Encryption keys are crucial cryptographic elements that
 Encryption: Encryption involves converting data into a govern the encryption and decryption procedures. In
coded format using a specific method. symmetric encryption, a single key is employed for both
 Decryption: Decryption is the process of converting encryption and decryption, requiring secure distribution of
encrypted data back to its original form. this key among communicating entities. On the other hand,
 Crypto Analyst: A Crypto Analyst is an individual asymmetric encryption employs a pair of keys: a public key
skilled in analyzing and deciphering codes. for encryption and a private key for decryption. This removes
the necessity for secure key exchange and facilitates secure
communication across untrusted channels.

2. Decryption: Unveiling the Secrets of Encrypted Data


In the realm of cybersecurity, encryption serves as a
formidable barrier against unauthorized access and data
breaches. However, encryption is only one-half of the
equation. Decryption, the process of transforming encrypted
data back into its original form, is essential for accessing and
utilizing protected information. This exploration will delve
into the intricacies of decryption, its mechanisms,
applications, challenges, and future trends.

Understanding Decryption
Key Retrieval
To decrypt encrypted data, the recipient must possess the
appropriate decryption key. In symmetric encryption, the same
key used for encryption is also used for decryption.
Conversely, in asymmetric encryption, the recipient uses their
private key to decrypt data encrypted with their public key.

Decryption Algorithm
Decryption algorithms are mathematical procedures
Figure 1: Process of Encrypt and Decrypt of text specifically crafted to undo the encryption process, effectively
transforming ciphertext back into plaintext. These algorithms

© 2024 IJSRET
402
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X

employ cryptographic techniques, such as inverse substitution, REFERENCES


permutation, and modular arithmetic, to restore the original
data from its encrypted form. 1. Padate, R., & Patel, A. (2014). Encryption and decryption
of text using the AES algorithm. International Journal of
Decryption Process Emerging Technology and Advanced Engineering, 4(5),
During the decryption process, the recipient applies the 54-9
decryption algorithm and the corresponding decryption key to 2. Abdullah, A. M. (2017). Advanced encryption standard
the encrypted data. This process reverses the cryptographic (AES) algorithm to encrypt and decrypt data.
transformations applied during encryption, resulting in the Cryptography and Network Security, 16(1), 11.
recovery of the original plaintext. 3. Tayde, S., & Siledar, S. (2015). File encryption, and
decryption using AES algorithm in Android phones.
Types of Decryption International Journal of Advanced Research in computer
Symmetric Decryption science and software engineering, 5(5).
In symmetric decryption, the identical key utilized for 4. Agrawal, M., & Mishra, P. (2012). A comparative survey
encryption is also employed for decryption. This key, termed on symmetric key encryption techniques. International
the symmetric key or secret key, demands confidentiality and Journal on Computer Science and Engineering, 4(5), 877.
secure distribution among the parties involved in 5. Mahajan, P., & Sachdeva, A. (2013). A study of
communication. Symmetric decryption algorithms reverse the encryption algorithms AES, DES, and RSA for security.
cryptographic transformations applied during encryption, Global journal of computer science and technology,
restoring the original plaintext from the cip her text. 13(15), 15-22.
6. Ghoradkar, S., & Shinde, A. (2015). Review on image
Asymmetric Decryption encryption and decryption using the AES algorithm.
Asymmetric decryption, also referred to as public-key International Journal of Computer Applications, 975,
decryption, utilizes a duo of keys: a public key and a private 8887.
key. When decrypting data encrypted with their public key, the 7. Rijmen, V., & Daemen, J. (2001). Advanced encryption
recipient employs their private key. Asymmetric decryption standard. Proceedings of federal information processing
algorithms utilize mathematical relationships between the standards publications, National Institute of standards and
public and private keys to reverse the encryption process and Technology, 19, 22.
recover the original plaintext. 8. Dworkin, M. J., Barker, E. B., Nechvatal, J. R., Foti, J.,
Bassham, L. E., Roback, E., & Dray Jr, J. F. (2001).
VI. CONCLUSION Advanced encryption standard (AES).
9. Mandal, A. K., Parakash, C., & Tiwari, A. (2012, March).
In this paper, we have studied how encryption stands as a vital Performance evaluation of cryptographic algorithms:
tool in protecting data privacy amidst growing concerns over DES and AES. In 2012 IEEE Students' Conference on
unauthorized access. This review delves into its role in Electrical, Electronics and Computer Science (pp. 1-5).
securing text data, emphasizing its significance in maintaining IEEE.
confidentiality during communication. The encryption 10. Kumar, P., & Rana, S. B. (2016). Development of
algorithm employs sophisticated cryptographic methods to modified AES algorithm for data security. Optik, 127(4),
ensure the privacy of exchanged messages, contributing to 2341-2345.
secure communication channels. Specifically, the focus on 11. Soliman, S. M., Magdy, B., & Abd El Ghany, M. A.
AES encryption and decryption underscores its importance in (2016, September). Efficient implementation of the AES
safeguarding text data, acknowledging both its strengths and algorithm for security applications. In 2016 29th IEEE
weaknesses. While AES effectively addresses many security International System-on-Chip Conference (SOCC) (pp.
challenges, there remain areas for improvement and ongoing 206-210). IEEE.
evaluation. Its widespread adoption underscores its reliability, 12. Liu, H. (2024). Designing And Implementing a Chat
yet awareness of its limitations is crucial for informed System with Enhanced Security Via AES Encryption
decision-making. Overall, this review underscores the pivotal Methods. Highlights in Science, Engineering and
role of encryption, particularly AES, in fortifying data privacy Technology, 85, 480-486.
measures. By comprehensively examining its mechanisms and 13. Sood, R., & Kaur, H. (2023). A literature review on rsa,
practical implications, it underscores the importance of robust des and aes encryption algorithms. Emerging Trends in
encryption practices in today's digital landscape. Moving Engineering and Management, 57-63.
forward, continual refinement and adaptation of encryption 14. Suwarni, M., Wahyudi, J., & Khairil, K. (2023).
techniques will be essential in meeting evolving security Comparison of the DES Cryptographic Algorithm and the
demands and ensuring the integrity of sensitive information.

© 2024 IJSRET
403
International Journal of Scientific Research & Engineering Trends
Volume 10, Issue 2, Mar-Apr-2024, ISSN (Online): 2395-566X

AES Algorithm in Securing Document Files. Jurnal


Media Computer Science, 2(1), 41-48.
15. Olutola, A., & Olumuyiwa, M. (2023). Comparative
analysis of encryption algorithms. European Journal of
Technology, 7(1), 1-9.
16. Goyal, R., & Khurana, M. (2017). Cryptographic security
using various encryption and decryption method.
International Journal of Mathematical Sciences and
Computing (IJMSC), 3(3), 1-11.
17. Al-Mahdi, H., Alruily, M., Shahin, O. R., & Alkhaldi, K.
(2019). Design and analysis of DNA encryption and
decryption technique based on asymmetric cryptography
system. International Journal of Advanced Computer
Science and Applications, 10(2).
18. Ezeofor, C. J., & Ulasi, A. G. (2014). Analysis of network
data Encryption & Decryption techniques in
communication systems. International Journal of
Innovative Research in Science, Engineering and
Technology, 3(12), 17797-17807.
19. Sun, C. C., Hahn, A., & Liu, C. C. (2018). Cyber security
of a power grid: State-of-the-art. International Journal of
Electrical Power & Energy Systems, 99, 45-56.

© 2024 IJSRET
404

View publication stats

You might also like