A Review on Advanced Encryption Standard – (AES)

Authors

  • Karki A School of Information Technology, ICFAI University, Sikkim

DOI:

https://doi.org/10.26438/ijcse/v6i8.551556

Keywords:

Advanced Encryption Standard, Cryptography, Decryption, Encryption

Abstract

Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunications, cryptography is necessary when communicating over any unreliable medium, which includes any network particularly the internet. AES encryption is the solution for Data Encryption Standard (DES) aging problem. Rijndanel Symmetric block cipher standard version which can encrypt and decrypt plaintext 128 bits blocks using key with 128-bit, 192-bit, or 256-bit size. The Rijndael cipher has simple structure and suitable to 8-bit and 32-bit processing. The cipher has numbers round of plaintext transformation. Key length determines how many rounds to be executed. The key with 128-bit use 10 rounds, 192-bit use 12 rounds, and 256-bit use 14 rounds. For the AES algorithm, the number of rounds to be performed during the execution of the algorithm uses a round function that is composed of four different byte-oriented transformations: Sub Bytes, Shift Rows, Mix columns and Add Round Key.

References

[1] Selent, D. Advanced encryption standard. Rivier Academic Journal 2010.

[2] Sarker, M.Z.H., Parvez, M.S. A cost effective symmetric key cryptographic algorithm for small amount of data. In: 9th International Multitopic Conference, IEEE INMIC 2005. IEEE; 2005, p. 1–6.

[3] Stallings, W., Tahiliani, M.P.. Cryptography and network security: principles and practice; vol. 6. Pearson London; 2014.

[4] Satoh, A., Morioka, S., Takano, K., Munetoh, S. Compact rijndael hardware architecture with s-box optimization. In: Asiacrypt; vol. 2248. Springer; 2001, p. 239–254.

[5] Ahmad, N., Hasan, R., Jubadi, W.M.. Design of aes s-box using combinational logic optimization. In: Industrial Electronics & Applications (ISIEA), 2010 IEEE Symposium on. IEEE; 2010, p. 696–699.

[6] Z. Yuan, Y. Wang, J. Li, R. Li and W. Zhao, “FPGA based optimization for masked AES implementation”, Proc. IEEE 54th

[7] International Midwest Symposium on Circuits and Systems (MWSCAS), pp.1-4 August 2011.

[8] B.Schneier. Applied Cryptography. John Wiley and Sons, second edition, 2012.

[9] Cryptography and Elliptic Curves, koblitz, second edition, 2011.

[10] Julio Lopez and Ricardo Dahab, “An overview of elliptic curve cryptography”, May 2011.

[11] V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology -CRYPTO`85, LNCS 218, pp.417-426, 2011.

[12] Botes, J.J., Penzhorn, W.T., 1994. An implementation of an elliptic curve cryptosystem. Communications and Signal Processing. COMSIG-94. In Proceedings of the 1994 IEEE South African Symposium, 85 -90.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i8.551556
Published: 2025-11-15

How to Cite

[1]
A. Karki, “A Review on Advanced Encryption Standard – (AES)”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 551–556, Nov. 2025.

Issue

Section

Review Article