Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
17-09-2009, 02:03 AM


(This is my Seventh Semister Major Project)

In the past, cryptography helped ensure secrecy in important communications, such as those of government covert operations, military leaders, and diplomats. Cryptography has come to be in widespread use by many civilians who do not have extraordinary needs for secrecy, although typically it is transparently built into the infrastructure for computing and telecommunications.

Advanced Encryption Standard (AES) is an algorithm for performing encryption (and the reverse, decryption) which is a series of well-defined steps that can be followed as a procedure. The original information is known as plaintext, and the encrypted form as cipher text. The cipher text message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it resembles random gibberish to those not intended to read it. The encrypting procedure is varied depending on the key which changes the detailed operation of the algorithm. Without the key, the cipher cannot be used to encrypt or decrypt.

The Rijndael is a symmetric algorithm that encrypts variable size blocks with variable size keys. . The Advanced Encryption Standard (AES) specified a subset of Rijndael, fixing the block size on 128 bits. Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS-197), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, and this project and implimentation implements the 128 bit standard using the VHDL, a hardware description language. The National Security Agency (NSA) announced that AES-128 may be used for classified information at the SECRET level and AES-192/256 for TOP SECRET level documents.

The algorithm consists of four stages that make up a round which is iterated 10 times for a 128-bit length key, 12 times for a 192-bit key, and 14 times for a 256-bit key. The first stage "SubBytes" transformation is a non-linear byte substitution for each byte of the block. The second stage "ShiftRows" transformation cyclically shifts (permutes) the bytes within the block. The third stage "MixColumns" transformation groups 4-bytes together forming 4-term polynomials and multiplies the polynomials with a fixed polynomial mod (x^4+1). The fourth stage "AddRoundKey" transformation adds the round key with the block of data.

The hardware implementation of AES could provide either high performance or low cost for specific applications. At backbone communication channels, or at heavily loaded server, it is not possible to lose processing speed running cryptography algorithms in general software, which drops the efficiency of the overall system. On the other side, a low cost and small design can be used in smart card applications, allowing a wide range of equipment to operate securely.

The design goal of this project and implimentation is to create a demonstration of the AES-128 for the end user and not for integration into a communication or data storage device; however this design could be modified to such ends. The main objective of the project and implimentation is to produce an optimized VHDL code for performance purpose, capable of achieving better performance than common software implementation.

The proposed project and implimentation AES is implemented by using VHDL. The device is operated at 100.29 MHz when targeted to Spartan 3E.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1
Joined: Mar 2010
23-03-2010, 11:26 PM

Niraj Kumar
Active In SP

Posts: 1
Joined: Aug 2010
30-08-2010, 11:04 PM

Active In SP

Posts: 1
Joined: Aug 2011
17-08-2011, 10:01 PM

plz mail me advance encryption standard code in c
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
18-08-2011, 09:43 AM

To get more information about the topic " IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) " please refer the link below

Active In SP

Posts: 2
Joined: Oct 2011
14-03-2012, 02:50 PM


I m a Btech student who have taken AES as major project and implimentation in 8th semester.
I am novice about AES. so could u please mail me, the details of the project and implimentation and guide mehow to implement AES.

Thinking To Register

26-05-2016, 11:07 AM

plz give me a code for encryption of node in wsn using ns3 and netanim in ubuntu

Super Moderator

Posts: 660
Joined: May 2016
27-05-2016, 09:18 AM

The Advanced Encryption Standard (AES), also known as Rijndael(its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.AES is based on the Rijndael cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process.Rijndael is a family of ciphers with different key and block sizes.For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.In the United States, AES was announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001.This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable (see Advanced Encryption Standard process for more details).

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Last Post: seminar project topic
Last Post: Guest
  Implementation of PMBLDC motor using Cuk PFC converter pdf study tips 4 1,466 02-10-2013, 09:52 AM
Last Post: reenachandran
  Implementation of Time Division Multiplexing system using matlab study tips 2 1,018 27-09-2013, 09:22 AM
Last Post: seminar projects maker
  ADVANCED SNAKE ROBOT WITH RANGE FINDING A MAIN-PROJECT REPORT seminar projects maker 0 350 20-09-2013, 03:09 PM
Last Post: seminar projects maker
  Design and implementation of a home embedded surveillance system with ultra-low seminar projects maker 0 453 14-09-2013, 03:56 PM
Last Post: seminar projects maker
  REPORT ON ADVANCED VEHICLE SECURITY SYSTEM study tips 0 1,244 06-09-2013, 04:57 PM
Last Post: study tips
  Implementation of LPI Radar using Matlab PPT study tips 0 498 14-08-2013, 01:07 PM
Last Post: study tips
  Implementation of Shunt Active Power Filter Using Source Voltage and Source pdf study tips 0 349 31-07-2013, 12:43 PM
Last Post: study tips
  GSM based SCADA implementation using Microcontroller project report tiger 20 17,250 19-07-2013, 09:52 AM
Last Post: study tips