A Comparative Study on AES 128 BIT AND AES 256 BIT
Keywords:
Cryptography, Cloud Computing, AESAbstract
Cloud computing present a new thinking to apply security since basic administrations are regularly outsourced to the cloud vendor. The current encryption techniques are regularly exposed to threats. Therefore it is important to study the features of the existing algorithm. This paper studies AES 128 and AES 256 based on various parameters and compare their performance that may suggest in development of better encryption technique.
References
Samiul Islam “Comparative Analysis of AES Algorithms and Implementation of AES in Arduino” 20.12.2015
V. R. Joan Daemen. AES Proposal: Rijndael, version 2, AES submission. 1999.
Joan Daemen, Steve Borg and Vincent Rijmen.”The Design of Rijndael: AES The Advanced Encryption Standard”, Springer, 2002.
Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid, “Symmetric Algorithm Survey: A Comparative Analysis” May 2, 2014
cs.utsa.edu/~wagner/laws/AESintro.html
csrc.nist.gov/publications/fips/fips197/fips 197.pdf. NIST_SP-500-291_Version-2_2013_June18_FINAL
Chenhui Jin, Ting Cu “Classification of SPN Structures From the Viewpoint of Structural Cryptanalysis” IEEE, December 27, 2017
Umer Farooq, M. Faisal Aslam “Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA”, Journal of King Saud University – Computer and Information Sciences, 10 January 2016, sciencedirect
Arash Karimi, Hadi Shahriar Shahhoseini “Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates” Int`l J. of Communications, Network and System Sciences Vol. 5 No. 3 ,2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.