Full Paper View Go Back

A Comparative Study on AES 128 BIT AND AES 256 BIT

Toa Bi Irie Guy-Cedric1 , Suchithra. R.2

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.4 , pp.30-33, Aug-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i4.3033


Online published on Aug 31, 2018


Copyright © Toa Bi Irie Guy-Cedric , Suchithra. R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Toa Bi Irie Guy-Cedric , Suchithra. R., “A Comparative Study on AES 128 BIT AND AES 256 BIT,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.4, pp.30-33, 2018.

MLA Style Citation: Toa Bi Irie Guy-Cedric , Suchithra. R. "A Comparative Study on AES 128 BIT AND AES 256 BIT." International Journal of Scientific Research in Computer Science and Engineering 6.4 (2018): 30-33.

APA Style Citation: Toa Bi Irie Guy-Cedric , Suchithra. R., (2018). A Comparative Study on AES 128 BIT AND AES 256 BIT. International Journal of Scientific Research in Computer Science and Engineering, 6(4), 30-33.

BibTex Style Citation:
@article{Guy-Cedric_2018,
author = {Toa Bi Irie Guy-Cedric , Suchithra. R.},
title = {A Comparative Study on AES 128 BIT AND AES 256 BIT},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {4},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {30-33},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=782},
doi = {https://doi.org/10.26438/ijcse/v6i4.3033}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.3033}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=782
TI - A Comparative Study on AES 128 BIT AND AES 256 BIT
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Toa Bi Irie Guy-Cedric , Suchithra. R.
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 30-33
IS - 4
VL - 6
SN - 2347-2693
ER -

740 Views    467 Downloads    178 Downloads
  
  

Abstract :
Cloud computing present a new thinking to apply security since basic administrations are regularly outsourced to the cloud vendor. The current encryption techniques are regularly exposed to threats. Therefore it is important to study the features of the existing algorithm. This paper studies AES 128 and AES 256 based on various parameters and compare their performance that may suggest in development of better encryption technique.

Key-Words / Index Term :
Cryptography, Cloud Computing, AES

References :
[1]. Samiul Islam “Comparative Analysis of AES Algorithms and Implementation of AES in Arduino” 20.12.2015
[2]. V. R. Joan Daemen. AES Proposal: Rijndael, version 2, AES submission. 1999.
[3]. Joan Daemen, Steve Borg and Vincent Rijmen.”The Design of Rijndael: AES The Advanced Encryption Standard”, Springer, 2002.
[4]. Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid, “Symmetric Algorithm Survey: A Comparative Analysis” May 2, 2014
[6] cs.utsa.edu/~wagner/laws/AESintro.html
[5]. csrc.nist.gov/publications/fips/fips197/fips 197.pdf. NIST_SP-500-291_Version-2_2013_June18_FINAL
[7]. Chenhui Jin, Ting Cu “Classification of SPN Structures From the Viewpoint of Structural Cryptanalysis” IEEE, December 27, 2017
[8] Umer Farooq, M. Faisal Aslam “Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA”, Journal of King Saud University – Computer and Information Sciences, 10 January 2016, sciencedirect
[9]. Arash Karimi, Hadi Shahriar Shahhoseini “Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates” Int`l J. of Communications, Network and System Sciences Vol. 5 No. 3 ,2012.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation