Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Investigations Regarding the Keys and Round Functions of AES for Data Security over RF Systems


Affiliations
1 Beant College of Engineering and Technology, Gurdaspur, India
     

   Subscribe/Renew Journal


Data security is a prime requirement of an organization in order to keep their information safe from their competitors. Cryptography technique which includes encryption algorithm and reliable keys are used for the same task. It is used to protect the digital data including financial, telecommunications, and government data. In this paper we analyzed various parameters of encryption techniques/algorithm. We encrypt the plain text by using different key lengths 128,192 and 256. On the basis of encryption time, other parameters can be determined e.g. processing time, round time,throughput etc. It is investigated that if clock frequency increases the throughput also varies.

Keywords

Encryption, Decryption, Processing Time, Round Time, Advanced Encryption Standard (AES).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 126

PDF Views: 3




  • Investigations Regarding the Keys and Round Functions of AES for Data Security over RF Systems

Abstract Views: 126  |  PDF Views: 3

Authors

Preetinder Singh
Beant College of Engineering and Technology, Gurdaspur, India
Ajay Kumar
Beant College of Engineering and Technology, Gurdaspur, India
Amarpal Singh
Beant College of Engineering and Technology, Gurdaspur, India

Abstract


Data security is a prime requirement of an organization in order to keep their information safe from their competitors. Cryptography technique which includes encryption algorithm and reliable keys are used for the same task. It is used to protect the digital data including financial, telecommunications, and government data. In this paper we analyzed various parameters of encryption techniques/algorithm. We encrypt the plain text by using different key lengths 128,192 and 256. On the basis of encryption time, other parameters can be determined e.g. processing time, round time,throughput etc. It is investigated that if clock frequency increases the throughput also varies.

Keywords


Encryption, Decryption, Processing Time, Round Time, Advanced Encryption Standard (AES).