Figure 4 - available via license: Creative Commons Attribution 3.0 Unported
Content may be subject to copyright.
AES 256 encryption and decryption

AES 256 encryption and decryption

Source publication
Article
Full-text available
Data exchange is an inevitable issue in this digital age. Especially data in a cloud system. The data must be secured so as not to be abused by people who are not entitled to. Algorithms to secure data is already widely known. It would be more secure if data security combines at least two algorithms for Cryptography. The goal is to strengthen the r...

Similar publications

Article
Full-text available
This paper presents the application of Path, Cycle and Complete Graph for safely transferring data in Cryptography. Path, Cycle and Complete Graph exhibiting antimagic labeling, and Path graph with even number of vertices exhibiting felicitous labeling for certain permutations of edge labels (for antimagic labeling scheme) and certain permutations...

Citations

... Santoso et al. in [12] used a 256-bit key produced by the Secure Hash Function (SHA) 256 function to combine two cryptographic techniques, AES (Advanced Encryption Standard) and Twofish. The technique makes data posted or downloaded in the Cloud system more secure. ...
Article
Full-text available
Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation strategy may provide efficient keys in a shorter amount of time. Furthermore, the keys for the proposed approach passed NIST randomness testing. When cipher text fragmentation and encryption are combined, the average entropy value was (7.99). In addition, as file sizes grew, the total system's execution time increased only slightly.
... Twofish is another famous symmetric key block cipher, it was founded in 1998 by Bruce Schneier, an open-source algorithm that has a block size of 128 bits, uses key sizes of 128, 192, and 256 bits, and consists of a 16-round Feistel network[15]. ...
... Basic comparison between used algorithms.[14,15] ...
Chapter
Full-text available
Cloud computing is becoming adopted increasingly by organizations all around the world. This is because the cloud is proven more dependable, affordable, elastic, and secure than traditional storage. However, this rapid and huge growth has opened the door for a great number of threats against the data in the cloud. Therefore, EaaS “Encryption as a service” was proposed to protect the data at all times. In this paper, we study, evaluate, and analyze the performance of three cryptographic algorithms, 3DES, AES, and Blowfish in terms of encryption time, decryption time, and memory consumption (Throughput). The aim is to provide more insights into the implementation of each and determine which provides more security with lower memory cost and execution time to be used in the EaaS solution that depends on crypto-algorithms to secure data and privacy in a cloud environment.KeywordsCloud computingEncryption as a service (EaaS)CryptographyAdvanced encryption standard (AES)Triple data encryption algorithm (3DES)BlowfishTwofishAsymmetric key algorithmsSymmetric-key algorithmsEncryptionDecryptionECB
... Furthermore, this function adopts bitwise rotation operations and math transformation with (Pseudo-Hadamard). [21,22] In the encryption process [ Figure 2], the input plaintext (128 bits) is partitioned into 4 words (each word with 32 bits). These 4 words are XORed with 4 key words (k#0, k#1, k#2, and k#3). ...
Article
Full-text available
In the past years, the Internet of Things (IoT) used in different applications and very wide range of fields (e.g. cloud services, smart environments, logistics, social and personal domains, and healthcare services). The IoT included a variety of components and devices such as RFID devices, wireless sensors, actuators, and wireless networks. Also, the IoT with smart devices adopted in various companies, organizations and public services systems. For instance, some devices like Notebooks and smartphones have been used to perform different management activities and duties. These smart devices relied on data exchange and data storage resources in clouds computing services. In this context, the saved data and exchanged data required protection against hacking operations, transferred with more secure communications channels, and safe storage environment in the clouds and local storage systems. In this paper, we proposed some encryption algorithms to tackle the issue of data confidentiality in the IoT applications. This research provided analysis and investigation of these encryption algorithms in light of components of the designs, versions of these algorithms, encryption keys, block size, round functions and the techniques used in the designs.
Chapter
Information security involves various services like availability, cryptography, and integrity which help to protect data. Nowadays everyone store his/her important data on various cloud environments for easy access without much thinking of data privacy. Still most individual or many companies prefer to store their business or individual level information in computer but connected to Internet. There are well-known algorithms available which help to secure data by using some secret key. Hackers are simply capable to interrupt the key with the assistance of recent high end computing machines. Hence information needs to be secured in more powerful way that no longer to be abused by folks that aren't entitled to. The security of data can be increased by hybridization of these well-known algorithms. The paper provides the generic models of various hybrid cryptographic models which improves the security of data. The paper also provides the comparative study of various traditional and hybrid models used heavily for providing security to data. The hybrid model can provide enhanced security than AES and should be selected if extreme security is required.KeywordsAESFile split encryption modelCascaded encryptionHybrid cryptographySymmetric encryption
Chapter
In the current pandemic situation while world has become overwhelmingly dependent on the online platform for communication, a big concern is raised over corroboration of privacy of data shared and receiving trusted information over popular messaging applications. Fake news circulation has become a prime concern whenever any emergency situation arises nationally as well as globally. In this work, a chatting engine model is proposed, which not only provides popular chatting software features with end-to-end encryption but also a monitored environment to control the spread of fake news. The application “CryptedWe” that is developed based on the proposed model reinforces safety over the privacy issues and makes the chat available only to the trusted peoples as well as restricts the forwarding of fake messages. This application is best for small to medium user groups where authenticity of the communication and privacy aspects are given the maximum priority.KeywordsAES-256Fake news detectionEncryptionCipher textEmergency