Figure 1 - uploaded by Ahmed Ghanim Wadday
Content may be subject to copyright.
Block diagram for AES encryption and decryption 

Block diagram for AES encryption and decryption 

Source publication
Article
Full-text available
Protection of multimedia information from different types of attackers and send it over communication channels has become important for people and governments. The form of reconstructed image from an actual transmission channel is an important challenge faces the ciphering algorithms. MAES algorithm is an important modified version of AES algorithm...

Contexts in source publication

Context 1
... The AES algorithm consist of sequences of 128 bits for each input and output. Sometimes these sequences will be referred to as blocks where the number of bits they include, will be referred to as their length. The AES algorithm cipher key is a sequence of 128, 192 or 256 bits. Ten rounds are on AES algorithm encryption, as can be shown in Fig. (1). Initially, the 128-bit key is expanded into eleven so-called round keys, each of them 128 bits in size. To ensure high security of the encryption each round contain transformation by utilize the corresponding key of cipher. The mentioned sizes state in above is only permit sizes while the other sizes are not allowed. Input block is ...
Context 2
... visual scene of original secret, ciphered transmitted, ciphered received and reconstructed images are viewed and compared to check the effect of channel on the image for two values of SNR only, where the tests of other SNR values shown in appendices. Figures (7-14) show the images visual scene for four tests. As clearly shown the difference between transmitted and received ciphered images is so little such that the human eyes cannot sense this difference for all tests and ...
Context 3
... factor used to evaluate in two direction, one by comparing between the histogram of transmitted and received ciphered images, while the other by comparing between histogram of original and extracted versions of secret image. As shown in Figure 13, the histogram of two versions of secret images are much compatible especially with 20 dB as in 13-c, which mean the encryption algorithm was more stronger against channels problems. Figure 14 is also confirm this analysis. ...
Context 4
... shown in Figure 13, the histogram of two versions of secret images are much compatible especially with 20 dB as in 13-c, which mean the encryption algorithm was more stronger against channels problems. Figure 14 is also confirm this analysis. ...
Context 5
... 5000 pair of adjacent pixels was randomly selected from tests images. Figure 15 shows the correlation coefficients of original and reconstructed version of secret images for four tests used. as clearly shown in Figure the correlation coefficient of original and extracted images was so convergence especially with SNR equal to 20 dB (15.c), ...

Similar publications

Preprint
Full-text available
A program is non-interferent if it leaks no secret information to an observable output. However, non-interference is too strict in many practical cases and quantitative information flow (QIF) has been proposed and studied in depth. Originally, QIF is defined as the average of leakage amount of secret information over all executions of a program. Ho...
Preprint
Full-text available
This paper dealt with database architecture for storing password. Many authentication schemes depend on secret passwords. Unfortunately, the length and entropy of user-chosen passwords remain constant over time. In contrast, hardware improvements constantly give attackers increasing computational power. This paper presents and focuses on a novel da...
Article
Full-text available
In the literature, there are many image encryption algorithms that have been constructed based on different chaotic maps. However, those algorithms do well in the cryptographic process, but still, some developments need to be made in order to enhance the security level supported by them. This paper introduces a new cryptographic algorithm that depe...

Citations

... Block diagram for AES encryption[5] ...
Thesis
Full-text available
This thesis explores the topic of securing game code through the integration of cellular automata and advanced encryption standard (AES). An extensive literature review was conducted to gain a comprehensive understanding of the subject matter. A two-stage encryption scheme was proposed, using Rule 30 cellular automata to generate an encryption key and employing AES for complex data transformation. The state-of-the-art in the field was surveyed, and a thorough technology comparison was presented. To evaluate the performance of the proposed encryption scheme, the implementation was carried out using Wolfram Mathematica in the Wolfram Language. Various performance metrics, including mean square error (MSE), key space width, execution time, and memory usage, were analyzed. The results were compared with other schemes from the literature, such as AES256. The performance evaluation showcased the promising capability of the proposed algorithm in defending against brute-force attacks, boasting a wider key space than AES256, while maintaining comparable execution times and MSE scores. However, it was observed that the proposed algorithm consumed significantly more memory compared to AES256, with the disparity increasing with the length of the plaintext. This aspect raises concerns regarding scalability and resource availability.
... Source: Wadday et al. (2018) The 128-bit plaintext block serves as the input to AES. The key can be 256 bits or 192 bits, or 128 bits. ...
... Only the Mix Columns transformation is bypassed in the last round. Pseudocode of AES encryption process is given below and the decryption includes the inverse transformations of each step in the encryption [29]. ...
Chapter
Full-text available
As the size of the data increases, securing the data has become an important concern as much as storing and transferring. Especially, the sensitive satellite images obtained from earth observation satellites should be transferred to the grand stations by preventing the intruders from accessing the images. For this purpose, cryptography algorithms are used to encrypt the satellite images and these images are transferred to ground station as ciphered image. In this study, AES and 3DES, which are symmetric block encryption algorithms, were used to encrypt three different size satellite images and the performance comparisons of these algorithms were performed by considering some metrics such as histogram, correlation coefficient, NPCR, UACI, PSNR, and computational time. In the simulations, AES and 3DES showed very close results in terms of histogram, correlation coefficient, NPCR, UACI and PSNR metrics for all three satellite images. However, it was observed that AES had performed better in both encryption and decryption of satellite images than 3DES in terms of the computational time criteria, and it had spent almost twice less time than 3DES.
... Şekil 4 AES algoritması blok diyagramı [26] 3. Resim Şifreleme Uygulaması ve Güvenlik/Performans Testleri Şekil ...
Article
Full-text available
Son yıllarda özellikle internetin hayatımızın her alanına girmesi ve nesnelerin interneti (IoT) platformundaki gelişmeler ile birlikte güvenlik daha kritik bir duruma gelmiştir. Bu platformlarda kullanılacak olan güvenlik algoritma tasarımları üzerinde çalışmalar günden güne artış göstermektedir. Bu algoritmaların güvenli bir şekilde kullanılabilmesi için yeterli güvenlik seviyelerine sahip olmaları gerekmektedir. Bu çalışmada, hafif sıklet kriptoloji algoritmalarının performans ve güvenlik analizlerini gerçekleştirmek için farklı resim dosyaları üzerinde şifreleme işlemleri yapılmıştır. Güvenlik ve performans analizlerinde şifreleme işlemlerine ait histogram, korelasyon, NPCR (Number of Pixels Change Rate) ve UACI (Unified Average Changing Intensity), entropi, şifreleme kalite ve zaman analizleri gerçekleştirilmiştir. Elde edilen sonuçlar kullanılarak algoritmaların güvenlik ve performans seviyeleri hakkında değerlendirme sunulmuştur.
... AES encryption algorithm[10].Advanced Encryption Standard algorithmAdvanced Encryption Standard (AES) comprises three block ciphers: AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of 128 bits using cryptographic keys of 128-, 192-and 256-bits[11].Figure 2.5 shows the AES encryption algorithm The encryption algorithm goes through five phases in each round where each phase does a certain function to encrypt the data. ...
... In[10]:= iv=enc["InitializationVector"]; iv//Normal; ...
Chapter
Full-text available
In current scenario, we have multiple technologies are available to transmit the data in wireless ad hoc network (WANET).But, compare to other existing models, we have proposed a new model where not only this model helps to reduce the energy consumption of nodes while transmitting the data but also our model focus on security aspect where it will help to solve some of the common attacks such as collusion attack, Dos attack, etc., our model consist of 3 stages/phases, namely as (i) registration, (ii) clustering, and (iii) transmission. In registration phase, each node in the network will identified by unique id, and nodes will registered themselves to the network, and in second phase, nearby nodes will form clustered based on the threshold value and transmitting power. By using multi-hop transmission after finding the route with the help of relay node search optimization (RESO), where appropriate relay node will be selected based on the parameters which will reduce the energy computation by the node and by the blockchain-based transaction from node of one cluster to another cluster. This will deminise the security threat in the network. However, in our model, we expecting the result better than existing models based on the theoretical knowledge.KeywordsBlockchainWANETClusteringRelay nodeDos attack