IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
17-09-2009, 02:03 AM


IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES)

(This is my Seventh Semister Major Project)

In the past, cryptography helped ensure secrecy in important communications, such as those of government covert operations, military leaders, and diplomats. Cryptography has come to be in widespread use by many civilians who do not have extraordinary needs for secrecy, although typically it is transparently built into the infrastructure for computing and telecommunications.

Advanced Encryption Standard (AES) is an algorithm for performing encryption (and the reverse, decryption) which is a series of well-defined steps that can be followed as a procedure. The original information is known as plaintext, and the encrypted form as cipher text. The cipher text message contains all the information of the plaintext message, but is not in a format readable by a human or computer without the proper mechanism to decrypt it; it resembles random gibberish to those not intended to read it. The encrypting procedure is varied depending on the key which changes the detailed operation of the algorithm. Without the key, the cipher cannot be used to encrypt or decrypt.

The Rijndael is a symmetric algorithm that encrypts variable size blocks with variable size keys. . The Advanced Encryption Standard (AES) specified a subset of Rijndael, fixing the block size on 128 bits. Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS-197), is an approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits, and this project and implimentation implements the 128 bit standard using the VHDL, a hardware description language. The National Security Agency (NSA) announced that AES-128 may be used for classified information at the SECRET level and AES-192/256 for TOP SECRET level documents.

The algorithm consists of four stages that make up a round which is iterated 10 times for a 128-bit length key, 12 times for a 192-bit key, and 14 times for a 256-bit key. The first stage "SubBytes" transformation is a non-linear byte substitution for each byte of the block. The second stage "ShiftRows" transformation cyclically shifts (permutes) the bytes within the block. The third stage "MixColumns" transformation groups 4-bytes together forming 4-term polynomials and multiplies the polynomials with a fixed polynomial mod (x^4+1). The fourth stage "AddRoundKey" transformation adds the round key with the block of data.

The hardware implementation of AES could provide either high performance or low cost for specific applications. At backbone communication channels, or at heavily loaded server, it is not possible to lose processing speed running cryptography algorithms in general software, which drops the efficiency of the overall system. On the other side, a low cost and small design can be used in smart card applications, allowing a wide range of equipment to operate securely.

The design goal of this project and implimentation is to create a demonstration of the AES-128 for the end user and not for integration into a communication or data storage device; however this design could be modified to such ends. The main objective of the project and implimentation is to produce an optimized VHDL code for performance purpose, capable of achieving better performance than common software implementation.

The proposed project and implimentation AES is implemented by using VHDL. The device is operated at 100.29 MHz when targeted to Spartan 3E.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
pcprog
Active In SP
**

Posts: 1
Joined: Mar 2010
#2
23-03-2010, 11:26 PM

Thanks...
Reply
Niraj Kumar
Active In SP
**

Posts: 1
Joined: Aug 2010
#3
30-08-2010, 11:04 PM

hiiiiiiiiiiiiiiiiiiiiii
Reply
mohit_juit
Active In SP
**

Posts: 1
Joined: Aug 2011
#4
17-08-2011, 10:01 PM

plz mail me advance encryption standard code in c
Reply
seminar addict
Super Moderator
******

Posts: 6,592
Joined: Jul 2011
#5
18-08-2011, 09:43 AM

To get more information about the topic " IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) " please refer the link below

topicideashow-to-implementation-of-advanced-encryption-standard-aes
Reply
kapilbanga111
Active In SP
**

Posts: 2
Joined: Oct 2011
#6
14-03-2012, 02:50 PM

Sir

I m a Btech student who have taken AES as major project and implimentation in 8th semester.
I am novice about AES. so could u please mail me, the details of the project and implimentation and guide mehow to implement AES.


regards
vishal

vishalmahajan1990@gmail.com
Reply
Guest
Thinking To Register

 
#7
26-05-2016, 11:07 AM

plz give me a code for encryption of node in wsn using ns3 and netanim in ubuntu

Regards,
Preetyfrmnahan@gmail.com
Reply
Dhanabhagya
Super Moderator
******

Posts: 660
Joined: May 2016
#8
27-05-2016, 09:18 AM

The Advanced Encryption Standard (AES), also known as Rijndael(its original name), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.AES is based on the Rijndael cipher developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, who submitted a proposal to NIST during the AES selection process.Rijndael is a family of ciphers with different key and block sizes.For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.In the United States, AES was announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001.This announcement followed a five-year standardization process in which fifteen competing designs were presented and evaluated, before the Rijndael cipher was selected as the most suitable (see Advanced Encryption Standard process for more details).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  REMOTE NOTICE BOARD IMPLEMENTATION USING GSM COMMUNICATION project uploader 2 1,254 09-05-2014, 10:00 AM
Last Post: seminar project topic
  FPGA IMPLEMENTATION OF HIGH SPEED CONVOLUTION AND DECONVOLUTION seminar flower 1 1,022 11-10-2013, 01:45 PM
Last Post: Guest
  Implementation of PMBLDC motor using Cuk PFC converter pdf study tips 4 1,434 02-10-2013, 09:52 AM
Last Post: reenachandran
  Implementation of Time Division Multiplexing system using matlab study tips 2 991 27-09-2013, 09:22 AM
Last Post: seminar projects maker
  ADVANCED SNAKE ROBOT WITH RANGE FINDING A MAIN-PROJECT REPORT seminar projects maker 0 350 20-09-2013, 03:09 PM
Last Post: seminar projects maker
  Design and implementation of a home embedded surveillance system with ultra-low seminar projects maker 0 445 14-09-2013, 03:56 PM
Last Post: seminar projects maker
  REPORT ON ADVANCED VEHICLE SECURITY SYSTEM study tips 0 1,234 06-09-2013, 04:57 PM
Last Post: study tips
  Implementation of LPI Radar using Matlab PPT study tips 0 485 14-08-2013, 01:07 PM
Last Post: study tips
  Implementation of Shunt Active Power Filter Using Source Voltage and Source pdf study tips 0 340 31-07-2013, 12:43 PM
Last Post: study tips
  GSM based SCADA implementation using Microcontroller project report tiger 20 17,217 19-07-2013, 09:52 AM
Last Post: study tips