Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards

Authors

  • Ananya B L School of Computer Science and Engineering, REVA University, Bengaluru, India.
  • Nikhitha V School of Computer Science and Engineering, REVA University, Bengaluru, India.
  • S Arjun School of Computer Science and Engineering, REVA University, Bengaluru, India.
  • Naveen Chandra Gowda School of Computer Science and Engineering, REVA University, Bengaluru, India. https://orcid.org/0000-0001-5860-7524

DOI:

https://doi.org/10.5281/zenodo.7921019

Keywords:

AES, Security, Encryption, Internet of Things, Cloud, RSA

Abstract

 Nowadays data sharing over the internet is a major and critical issue due to security problems. So more security mechanisms are required to protect the data while sharing through an unsecured channel. In this paper, we present one such algorithm for data confidentiality while sharing. Advanced Encryption Algorithm (AES) is a symmetric encryption algorithm that provides more encryption security than its predecessor Data Encryption Standard (DES).  In this review paper, we compare the various applications, advantages, and shortcomings of this complex algorithm by also comparing them to other standard algorithms.

References

Yustiarini, B. Y., Dewanta, F., & Nuha, H. H. (2022, July). A Comparative Method for Securing Internet of Things (IoT) Devices: AES vs Simon-Speck Encryptions. In 2022 1st International Conference on Information System & Information Technology (ICISIT) (pp. 392-396). IEEE.

Dibas, H., & Sabri, K. E. (2021, July). A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. In 2021 International Conference on Information Technology (ICIT) (pp. 344-349). IEEE.

Kumar, K., Kaur, A., Ramkumar, K. R., Shrivastava, A., Moyal, V., & Kumar, Y. (2021, November). A Design of Power-Efficient AES Algorithm on Artix-7 FPGA for Green Communication. In 2021 International Conference on Technological Advancements and Innovations (ICTAI) (pp. 561-564). IEEE.

Vinod, D., Nalini, M. K., Dhinakaran, K., Elantamilan, D., & Gnanavel, R. (2022, January). A Hybrid Algorithm for Secure Image based Encryption and Steganographic Technique in combination with DET and AES Algorithms. In 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (pp. 1-6). IEEE.

Equihua, C., Anides, E., García, J. L., Vázquez, E., Sánchez, G., Avalos, J. G., & Sánchez, G. (2021). A low-cost and highly compact FPGA-based encryption/decryption architecture for AES algorithm. IEEE Latin America Transactions, 19(9), 1443-1450.

Talukder, M. S. H., Hasan, M. N., Sultan, R. I., Rahman, M., Sarkar, A. K., & Akter, S. (2022, February). An Enhanced Method for Encrypting Image and Text Data Simultaneously using AES Algorithm and LSB-Based Steganography. In 2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE) (pp. 1-5). IEEE.

Gowda, N. C., Manvi, S. S., Malakreddy, B., & Lorenz, P. (2023). BSKM-FC: Blockchain-based secured key management in a fog computing environment. Future Generation Computer Systems.

Raja, D. K., Kumar, G. H., Basha, S. M., & Ahmed, S. T. (2022). Recommendations based on integrated matrix time decomposition and clustering optimization. International Journal of Performability Engineering, 18(4), 298.

Soni, D., Tiwari, V., Kaur, B., & Kumar, M. (2021, December). Cloud computing security analysis based on RC6, AES and RSA algorithms in user-cloud environment. In 2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT) (pp. 269-273). IEEE.

An, S., Yuan, H., Liu, R., Dai, W., Bu, T., & Zheng, S. (2022, May). Design of hospital case information retrieval system based on improved AES algorithm. In 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI) (pp. 852-854). IEEE.

Guo, G. L., Qian, Q., & Zhang, R. (2015, August). Different implementations of AES cryptographic algorithm. In 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems (pp. 1848-1853). IEEE.

Pandey, B., Bisht, V., Jamil, M., & Hasan, M. K. (2021, June). Energy-efficient implementation of AES algorithm on 16nm FPGA. In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT) (pp. 740-744). IEEE.

Sreedhar, K. S., Ahmed, S. T., & Sreejesh, G. (2022, June). An Improved Technique to Identify Fake News on Social Media Network using Supervised Machine Learning Concepts. In 2022 IEEE World Conference on Applied Intelligence and Computing (AIC) (pp. 652-658). IEEE.

Gowda, N. C., Manvi, S. S., & Malakreddy, B. (2022, July). Blockchain-based Access Control Model with Privacy preservation in a Fog Computing Environment. In 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) (pp. 1-6). IEEE.

Gowda, N. C., & Malakreddy, B. (2023, February). A Trust Prediction Mechanism in Edge Communications using Optimized Support Vector Regression. In 2023 7th International Conference on Computing Methodologies and Communication (ICCMC) (pp. 784-789). IEEE.

Peng, G., & Zhu, S. (2021, March). FPGA implementation of AES encryption optimization algorithm. In 2021 International conference on intelligent transportation, big data & smart city (ICITBS) (pp. 650-653). IEEE.

Makhloufi, A. E., Adib, S. E., & Raissouni, N. (2022, December). High Throughput Implementation of AES Algorithm Using Radiation Tolerant FPGA for Secure LST-SW Algorithm. In 2022 5th International Conference on Advanced Communication Technologies and Networking (CommNet) (pp. 1-6). IEEE.

Gowda, N. C., & Srivastav, P. S. V. (2019). GPR: Steg Cryp (Encryption using steganography). International Journal of Engineering and Advanced Technology (IJEAT), 8.

Ahmed, S. T., & Basha, S. M. (2022). Information and Communication Theory-Source Coding Techniques-Part II. MileStone Research Publications.

Sunil, J., Suhas, H. S., Sumanth, B. K., & Santhameena, S. (2020, November). Implementation of AES Algorithm on FPGA and on software. In 2020 IEEE International Conference for Innovation in Technology (INOCON) (pp. 1-4). IEEE.

Kabulov, A., Saymanov, I., & Berdimurodov, M. (2021, November). Minimum logical representation of microcommands of cryptographic algorithms (AES). In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 01-05). IEEE.

Alipour, A., Papadimitriou, A., Beroulle, V., Aerabi, E., & Hély, D. (2020, March). On the performance of non-profiled differential deep learning attacks against an AES encryption algorithm protected using a correlated noise generation based hiding countermeasure. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (pp. 614-617). IEEE.

Shalini, L., Manvi, S. S., Gowda, N. C., & Manasa, K. N. (2022, June). Detection of Phishing Emails using Machine Learning and Deep Learning. In 2022 7th International Conference on Communication and Electronics Systems (ICCES) (pp. 1237-1243). IEEE.

Cherrid, N., Saidi, R., Bentahar, T., & Mayache, H. (2021, March). Study of the Sensitivity of an InSAR Interferogram Encrypted by the AES-128 Algorithm. In 2021 18th International Multi-Conference on Systems, Signals & Devices (SSD) (pp. 457-462). IEEE.

Asif-Ur-Rahman, M., Afsana, F., Mahmud, M., Kaiser, M. S., Ahmed, M. R., Kaiwartya, O., & James-Taylor, A. (2018). Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet of Things Journal, 6(3), 4049-4062.

Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and practice, vol. 6. editor: Pearson London.

Gowda, N. C., & Manvi, S. S. (2021, September). An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods. In 2021 IEEE 9th Region 10 Humanitarian Technology Conference (R10-HTC) (pp. 01-06). IEEE.

Benisha, R. B., & Ratna, S. R. (2019). Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks, Security and Communication Networks. Wiley Hinadwai, 1082485, 12.

Veena, H. N., & Gowda, N. C. (2018). Design and Implementation of Image Encryption using Chaos Theory. Asian Journal of Engineering and Technology Innovation (AJETI), 208.

Siddiquee, S. M. T., Kumar, K., Pandey, B., & Kumar, A. (2019). Energy efficient instruction register for green communication.

Standaert, F. X. (2010). Introduction to side-channel attacks. Secure integrated circuits and systems, 27-42.

Downloads

Published

2023-05-10

How to Cite

Ananya B L, Nikhitha V, S Arjun, & Naveen Chandra Gowda. (2023). Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards. International Journal of Computational Learning & Intelligence, 2(2), 87–98. https://doi.org/10.5281/zenodo.7921019

Issue

Section

LITERATURE / REVIEW ARTICLE