Journal of Information Security

Volume 12, Issue 2 (April 2021)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

A Complex Encryption System Design Implemented by AES

HTML  XML Download Download as PDF (Size: 1211KB)  PP. 177-187  
DOI: 10.4236/jis.2021.122009    725 Downloads   4,493 Views  Citations

ABSTRACT

With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.

Share and Cite:

Lu, Z. and Mohamed, H. (2021) A Complex Encryption System Design Implemented by AES. Journal of Information Security, 12, 177-187. doi: 10.4236/jis.2021.122009.

Cited by

[1] Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things
Hejri, F Azzedin, S Almuhammadi… - Arabian Journal for …, 2024
[2] The Analysis and Comparison of Various Cryptographic Algorithms to Improve Network Security: Insights from an Institutional laboratory Setup
2024
[3] A generic model for security algorithms in mobile electronic payment systems
Journal of Computational Methods in Sciences and Engineering, 2023
[4] Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network
Mobile Networks and …, 2023
[5] A Hybrid Algorithm For Enhancement of the Data Security during Network Transmission Based on RSA and DH.
Sawy, M Taha - … Journal of Intelligent Engineering & Systems, 2023
[6] Rural regional economic data management based on blockchain technology
SN Applied Sciences, 2023
[7] Advanced approach for encryption using advanced encryption standard with chaotic map
International Journal of …, 2023
[8] Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
Baghdad Science …, 2023
[9] Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit
MethodsX, 2022
[10] A Secure Cloud Storage Algorithm for University Financial Data Based on the Blockchain Technology
Mobile Information Systems, 2022
[11] Conversion of Clefia Algorithm to Decrease Memory Restrictions Encountered on IoT by Applying CMA Method
… Conference on Artificial …, 2022
[12] Asymmetric encryption method proposed for Arabic letters using artificial neural networks
Basic and Applied Sciences, 2021
[13] Implementing Image Steganography Techniques for Secure Data Hiding in the Development of an Android Application
[14] Tec Empresarial

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.