Implementation of AES Algorithm in MicroController Using PIC18F452
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is famous for its ciphering strength and its strong defense against any attack for example the brute force attack. Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future [3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key". In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more speed in both the encryption and decryption of the files.
Authors and Affiliations
Ali E. Taki El_Deen
Performance Comparison of Transport Layer Protocols for Multimedia Application in Wired Networks
Abstract: In this paper, we present to discuss the performance of transport layer protocols for multimedia application in the wired network. More precisely, TCP and UDP Performance are evaluated then compared. Two scenar...
Various Techniques of Clustering: A Review
Abstract: Data mining is a method that is used to select the information from large datasets and it performs the principal task of data analysis. The Clustering is a technique that consist groups of data and elemen...
Energy Efficient Geographic Adaptive Fidelity in Wireless Sensor Networks
Abstract: Wireless sensor network (WSN) is a quickly developing and existing research that has pulled in impressive exploration consideration in the later past. Routing is to figure out the way to send the detected infor...
Secure Data Sharing Using Cryptography in Cloud Environment
Abstract : Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand storage and computing services for users. In cloud based storage concept, data owner does not have full control ov...
Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors....