Implementation of AES Algorithm in MicroController Using PIC18F452
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is famous for its ciphering strength and its strong defense against any attack for example the brute force attack. Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future [3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key". In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more speed in both the encryption and decryption of the files.
Authors and Affiliations
Ali E. Taki El_Deen
A Hierarchical Clustering Algorithm Based Computer Aided Molecular Modeling with Haematoxylin & Eosin Images of Colon Cancer
Color Image segmentation plays a crucial role in many medical imaging applications. In this paper we present a novel algorithm for computer aided molecular modeling in MATLAB R2012, a real time simulation e...
Subacute sclerosing panencephalitis (SSPE) In Iraq
Objective: Subacute sclerosing panencephalitis (SSPE) is a progressive inflammatory disease of the central nervous system with poor prognosis and high mortality, caused by the persistent infection with measles virus(MV)....
Appraisal on Applications of Nanorobots
Abstract: Nanotech is the manipulation of the matter on atomic and molecular scale. Nanorobots being an emerging technology used precisely in machines or robots to perform controlled manipulation of objects with na...
A Hybrid Algorithm Using Apriori Growth and Fp-Split Tree For Web Usage Mining
Abstract : Internet is the most active and happening part of everyone’s life today. Almost every business or service or organization has its website and performance of the site is an important issue. Web usage miningbase...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Sma...