Survey and comprehensive Analysis for performance improvement of AES Encryption

Now a day’s it’s a key challenge in data transmission to transfer data securely and efficiently. Cryptography techniques are widely use for secure data transmission over the communication network. Cryptography techniques are based on symmetric or asymmetric key based encryption. In Symmetric key based encryption and decryption process same key is use, also called private key. Advance encryption standard (AES) is one of the most popular and widely used symmetric encryption methods.AES is widely used by processor for secure and fast transmission of data. Performances and efficiency of AES processors are outstanding. For performance improvement of processors, efficiency with high throughput and fast processing in less encryption time are new challenges for researcher. Performance and security of AES algorithm is based on size of key and Sbox. In this research paper we are presenting survey and comprehensive analysis for performance of different AES encryption with various key sizes. Existing AES use an S-Box with key size 128,192 and 256 bit.AES can be improved in terms of encryption time and speed and also decryption time and speed. Proposed IAES processor will perform outstanding over existing AES. Keywords—AES, IAES Encryption, Decryption, S-box, Multistage S-box and Key

[1]  Piotr Bilski,et al.  Multi-core implementation of the symmetric cryptography algorithms in the measurement system , 2010 .

[2]  Guangjun Li,et al.  Dynamic reconfigurable implementations of AES algorithm based on pipeline and parallel structure , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[3]  F.S. Hossain,et al.  A very low power and high throughput AES processor , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[4]  William Stallings,et al.  Cryptography and network security , 1998 .

[5]  Mansoor Ebrahim,et al.  Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.

[7]  Hua Li,et al.  A new compact dual-core architecture for AES encryption and decryption , 2008, Canadian Journal of Electrical and Computer Engineering.

[8]  Shaaban Sahmoud,et al.  Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher , 2013, Int. Arab. J. e Technol..

[9]  Franc Novak,et al.  HARDWARE IMPLEMENTATION OF AES ALGORITHM , 2005 .

[10]  Cheng-Wen Wu,et al.  A configurable AES processor for enhanced security , 2005, Proceedings of the ASP-DAC 2005. Asia and South Pacific Design Automation Conference, 2005..

[11]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[12]  Alex Biryukov,et al.  Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others , 2010, EUROCRYPT.