Encryption and Decryption Using AES in The Field of Network Communication Based On Confidentiality
Encryption and Decryption Using AES in The Field of Network Communication Based On Confidentiality
ISSN : 2349 - 3143 (Print) Vol. 2, Issue 1 Jan. - Mar. 2015 and Communication Technology (IJRECT 2015)
Abstract
Maintaining confidentiality in network communication is bigger task to achieve. Improving secure data communication many techniques
are available presently. In this paper Advanced Encryption Standard (AES) algorithm is used to maintain confidentiality between
users across communication channel by encryption and decryption at the transmitter and receiver respectively. To achieve privacy
and security services can be configured by AES ensuring high performance. The software tools used for simulation and synthesizing
the verilog code is Modelsim and Xilinx.
Keywords
Confidentiality, AES, Encryption, Decryption, Modelsim.
The 128- bit message (plaintext) is transformed into 128- bit cipher
with the help of 128-bit key. At 10th round encrypted message
is obtained when the done pin is high which show the process
is completed. The 128- bit cipher is transformed into 128- bit
inverse cipher/ original message with the help of 128-bit key. At
10th round decrypted/ original message is obtained when the done
pin is high which shows the process is completed.
Fig. 1: AES encryption and decryption process at transmitter and
receiver trough a network channel for a confidential system.
The key expansion is used for key scheduling. There are 10 keys References
for scheduling having 44 words. The process starts at kld pin is [1] FIPS-197, National Institute of Standards and Technology,
high with positive edge clock. The 10th key is obtained after 10 Announcing the Advanced Encryption Standard (AES), http://
clock cycle where the process is completed. csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2001.
[2] M. Goswami and S. Kannojiya, “High Performance FPGA
Implementation of AES Algorithm with 128-Bit Key”s, Proc.
IEEE International Conf. Advances Computing Comm., vol.
1, Himarpur, India, 2011, pp.281-286.
[3] Xinmiao Zhang and Keshab K. Parhi “Implementation
Approaches for the Advanced Encryption Standard
Algorithm” IEEE 2002.
[4] P. Rogaway, “Efficient Instantiations of Tweakable
Blockciphers and Refinements to Modes OCB and PMAC”,
Advances in Cryptology—Asiacrypt 2004, Lecture Notes in
Computer Science, vol. 3329, pp. 16-31, Springer-Verlag,
2004.
Fig. 4: AES key expansion simulation [5] Morris Dworkin, NIST Special Publication 800-38E,
“Recommendation for Block Cipher Modes of Operation: The
The proposed system maintains confidentiality by hiding the XTS-AES Mode for Confidentiality on Storage Devices”.
message across the network channel. The performance is higher [6] B. Schneier. Applied Cryptography. John Wiley & Sons, Inc.,
with reduce clock cycle with less delay. There is less disruption second edition, 1996.
i.e. reduced noise across the network channel. [7] FIPS-199, National Institute of Standards and Technology,
Standards for Security Categorization of Federal Information
VI. Applications and Information System, February 2004.
The applications involved for secured communication and [8] Sen, J. (2010f), “A Trust-Based Robust and Efficient Searching
distributed systems. In online banking process, user login Scheme for Peer-to-Peer Networks”, Proc. 12th International
password with one time password (OTP) for a unique user has Conference on Information and Communication Security
been provided by banks which can access all the details related (ICICS), pp. 77-91, December 2010, Barcelona, Spain,
to his/ her account. The user can buy any items from any online Springer LNCS Vol 6476.
stores. The access period for login is limited for different banks [9] Security Engineering: A Guide to Building Dependable
i.e. 5 minutes. The privacy and security is maintained by strong Distributed Systems.
encryption and decryption algorithm. [10] http://www.cl.cam.ac.uk/~rja14/Papers/SE-04.pdf
In VPN, at the sender end of the transmitter section encryption
algorithm is used to encrypt the data which is invisible across
the channel and at the reception end of the receiver section
the encrypted data is transformed into the original message by
decryption algorithm. The information is sent by the user to
another user in a networking channel is maintained privately and
secured with resource protection in a confidential manner.
The cloud computing is the application delivering services between
internet, distributed systems, hardware and software. There are
four delivery models related to cloud computing which are private,
public, community and hybrid cloud. The services are delivered
to private organization, government organization, community
and several organizations. There are four service models which
are Software as service (SaaS), Platform as service (PaaS) and
Infrastructure as service (IaaS). All service and delivery models
ensure confidentiality with privacy for a secured system.
VII. Conclusion
In this paper the confidential system uses AES algorithm which
ensures confidentiality across the network communication with
privacy. The obtained simulation verifies the system is maintaining
confidentiality with data protection in real time environment.
Hence the confidential system is used in many distributed systems
to prevent hackers from accessing unauthorised information.
VIII. Acknowledgement
I would like to thank my guide Jayaraj N of The Oxford College
of Engineering Bangalore for supporting the study.