首页    期刊浏览 2024年05月18日 星期六
登录注册

文章基本信息

  • 标题:A Complex Encryption System Design Implemented by AES
  • 本地全文:下载
  • 作者:Zhimao Lu ; Houmed Mohamed
  • 期刊名称:Journal of Information Security
  • 印刷版ISSN:2153-1234
  • 电子版ISSN:2153-1242
  • 出版年度:2021
  • 卷号:12
  • 期号:2
  • 页码:177-187
  • DOI:10.4236/jis.2021.122009
  • 语种:English
  • 出版社:Scientific Research Publishing
  • 摘要:With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.
  • 关键词:AES Algorithm;RSA Algorithm;Encryption;Key Management
国家哲学社会科学文献中心版权所有