Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
This paper discusses the effective coding of Rijndael algorithm, Advanced Encryption Standard (AES) in Hardware Description Language, Verilog. In this work we analyze the structure and design of new AES, following three criteria: a) resistance against all known attacks; b) speed and code compactness on a wide range of platforms; and c) design simplicity; as well as its similarities and dissimilarities with other symmetric ciphers. On the other side, the principal advantages of new AES with respect to DES, as well as its limitations, are investigated. Thus, for example, the fact that the new cipher and its inverse use different components, which practically eliminates the possibility for weak and semi-weak keys, as existing for DES, and the non-linearity of the key expansion, which practically eliminates the possibility of equivalent keys, are two of the principal advantages of new cipher. Finally, the implementation aspects of Rijndael cipher and its inverse are treated. Thus, although Rijndael is well suited to be implemented efficiently on a wide range of processors and in dedicated hardware, we have concentrated our study on 8-bit processors, typical for current Smart Cards and on 32-bit processors, typical for PCs.
Authors and Affiliations
Prof. N. . Penchalaiah , Dr. R. Seshadri
Palmprint Recognition in Eigen-space
This paper proposes a novel technique for palmprint recognition in context to biometric identification of a person. Palmprints are images of the inner portion of a person’s palm and consist of a complex pattern of random...
Improved FCM algorithm for Clustering the IRIS data
In this paper we present clustering method is very sensitive to the initial center values, requirements on the data set too high, and cannot handle noisy data the proposal method is using information entropy to initializ...
Generalisation of RSA Scheme using fundamental groups and ZKIP
We address the problem of computation involved in RSA algorithm namely exponentiation under modulo arithmetic and various mathematical and timing attacks in RSA. The computation is made easy and quick by assigning elemen...
Drag and Drop: Influences on the Design of Reusable Software Components
The fundamental unit of large scale software construction is he component. A component is the fundamental user interface object in Java. Everything you see on the display in a java pplication is a component. The abilit...
Language Specific Speech Feature Variation
Speech is basically used to impart message from one person to another. There are various properties of speech that may vary from person to person or from language to language. The power of human language is found to be e...