Abstract— With the rapid progression of digital data exchange in electronic way, security of information is becoming more important in data storage and transmission. Therefore numerous ways of protecting information are being utilized by individuals, businesses, and governments. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can be only being decoded or decrypted by party those possesses the associated key. In this paper a most widely used symmetric encryption techniques i.e. advanced encryption standard (AES) have been implemented using MATLAB software. The primary goal of this paper is to improve level of security. The implemented encryption technique is analyzed by using a parameter called Avalanche effect. Plaintext and encryption key are mapped in binary code before encryption process. Avalanche Effect is calculated by changing one bit in plaintext keeping the key constant and by changing one bit in encryption key keeping the key constant, Experimental results shows that the proposed algorithm exhibit significant high Avalanche Effect which improves the level of the security.
[1]
J. P. Raina,et al.
Comparative Analysis of AES and RC4 Algorithms for Better Utilization
,
2011
.
[2]
Soumiya Rasheed.
Simulation of Image Encryption using AES Algorithm
,
2011
.
[3]
M.Y. Javed,et al.
A Performance Comparison of Data Encryption Algorithms
,
2005,
2005 International Conference on Information and Communication Technologies.
[4]
Mohey M. Hadhoud,et al.
Evaluating The Performance of Symmetric Encryption Algorithms
,
2010,
Int. J. Netw. Secur..
[5]
William Stallings,et al.
Cryptography and network security
,
1998
.
[6]
Abd Samad Hasan Basari,et al.
A New Image Encryption Approach using the Integration of a Shifting Technique and the AES Algorithm
,
2012
.
[7]
Monisha Sharma,et al.
Implementation and analysis of various symmetric cryptosystems
,
2010
.
[8]
Mohey M. Hadhoud,et al.
Studying the Effects of Most Common Encryption Algorithms
,
2011,
Int. Arab. J. e Technol..
[9]
A. K. Mandal,et al.
Performance evaluation of cryptographic algorithms: DES and AES
,
2012,
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.