Page 98 - IJEEE-2023-Vol19-ISSUE-1
P. 98

94 |                                                                Baban & Hameed

database was hacked, the attackers could only get the encrypted     hardware. AES does not employ a Feistel network, unlike its
data which is invaluable. At present, the research work mainly      predecessor DES. The thorough AES development process, as
focuses on the confidentiality of stored data, security checks and  well as its complex internal structures, ensuring that the
access control, and so on. Fenghua Z.et al. [3] developed the       algorithm is extremely safe and has no known flaws. Rijndael's
AES algorithm by P-AES algorithm. The P-AES algorithm is            key length can be 128, 192, or 256 bits, depending on the AES
combined with the RSA algorithm, named a hybrid algorithm,          requirements. The Rijndael algorithm has variable block sizes,
the obtained results demonstrate the hybrid encryption              which can range from 128, 192, or 256 bits. This means that a
algorithm has the benefits of fast encryption and decryption.       Rijndael method with key sizes of 128, 192, and 256 bits gives
Additionally, Yitao C. et al. [2] in their research project         nearly the same amount of security [12]. The round
developed a health information management system based on           transformations used in this encryption technique serve as a
the Java platform to realize the duties of the system, most of the  framework for its iterative structure[13].
hierarchical structure of the system was enhanced according to
the health information management module, also they used the             AES is one of the most up-to-date algorithms of the four
Data Encryption Standard (DES) algorithm to encrypt and             currently certified for federal use in the United Statuses uses a
protect personal healthcare information, the system was             four-by-four (4 x 4) column-major-order byte matrix called the
developed to evaluate health information confidence,                state, while certain Rijndael variants use a larger block size and
information security, and system response time.                     have more columns inside the state. AES composition and
                                                                    building blocks were created based on a standard known as a
   In another study, Pramila M. Chawan [4] implemented              substitution-transformation arrangement with a set block size of
multiple layers of security measures containing JWT, CORS,          128 bits and a key size of 128, 192, or 256 bits, and has a high-
SHA-256, AES Algorithms, and, IDEA and compared the two             speed in both software and hardware (see Figure 1). The AES
algorithms AES, and IDEA in terms of data privacy. In [5], the      technique encodes 10 cycles for 128-bit keys during encryption
authors suggest adopting the Advanced Encryption Standard           and decryption. To get the last encoded message, go through 12
(AES) algorithm for the encryption of the user information          rounds for 192-bit keys and 14 rounds for 256-bit keys [14].
before storing it in the database as well as using an               The encryption begins with a "Add round key stage" for
authentication approach for valid user verification and             encoding and decoding. However, shortly before the final
protection of unauthorized access to all system functionalities.    round, the output is subjected to nine fundamental rounds, each
In the project work of Owusu N. et al. [6], the AES algorithm       of which includes four transformations: 1) Sub-bytes, 2) Shift-
can use multiple cryptographic key lengths of 128, 192, and 256     rows, 3) Mix-columns, and 4) Add round Key. Mix column
bits created by C# programming language as a front-end client       transformation is not accessible in the ninth round [15-
machine and MS SQL used for the database as a back-end              17].Decryption is the inverse procedure, with the following
machine. Mondal, S. et al. [7], present a method for safer and      stages [18]:
more economical encryption system, which randomizes the key
of the AES algorithm and covers the key data into the encrypted          1. Substitute Byte Transformation: AES is made up of 128-
digital image by applying the basic concepts of cryptography
and digital watermarking. W Xing-hui and M Xiu-jun [8]                      bit data blocks, which means that each database item
proposed a hybrid encryption method in databases, they adopted
RSA and IDEA algorithms which are public key and symmetric                  comprises 16 bytes. By implementing an 8-bit
key respectively. Firstly, the database is encrypted by RSA
algorithm and then these keys were used to encrypt the plain data           substitution box known as the Rijndael s-box, every bite
using the IDEA algorithm. This hybrid system enhances the
security of data and make it more immune against attacks.                   of a data item is turned into another piece in sub-byte
Furthermore, the authors in [9] present a system that provides
password encryption using hashing functions such as MD5,                    transformation.
SHA, etc., they also proposed a novel modification that
enhanced the security using a hashing function. Min-Shiang               2. Shift Rows transformation: This transformation is
Hwang and Wei-Pang [10] proposed two methods of encryption
techniques depending on the concept of sub keys that gives some             simple; the bytes in the state's last three lines, which are
security; moreover, solves key management problem which
allows multiple users to right access. Table III shows a                    dependent.
comparative study.
                                                                         3. On row position, are moved in a cycle. The second line
           III. DESCRIPTION OF AES ALGORITHM                                does a 1-byte circular left shift. Two bytes and three
                                                                            bytes left circular shifts are performed in the third and
    Joan Daemen and Vincent Rijmen created the AES block                    fourth rows, respectively.
cipher, which is also known as the Rijndael algorithm. The
method runs smoothly on a wide range of computer processors              4. Mix columns transformation: This is the inverse of a
and hardware [11]. AES is based on a design concept known as                multiplication set of each state's column. Every is
a substitution-permutation network, which is a combination of               multiplied by a stable matrix. Bytes are treated as multi-
substitution and permutation, and is fast in both software and              names in this procedure.

                                                                         5. Include a round key transformation: a bit-like XOR
                                                                            between the current state's 128 bits and the round key's
                                                                            128 bits. This is the polar opposite of transformation.

                                                                       The Table I shows a comparison of cryptography symmetric
                                                                    algorithms based on common factors.
   93   94   95   96   97   98   99   100   101   102   103