The AES Encryption Algorithm

858 Words4 Pages
The AES encryption algorithm is a block cipher that uses an encryption key and a several rounds of encryption A block cipher is an encryption algorithm that works on a single block of data at a time. In the case of standard AES encryption the block is 128 bits or 16 bytes in length. The term “rounds” refers to the way in which the encryption algorithm mixes the data re-encrypting into fourteen times depending on length of key. ENCRYPTION KEYS AES encryption uses a single key as a part of they encryption process. The key is 128 bits. The term 128 bit encryption refers to use of a 128 bit encryption key. With AES both encryption and decryption are performed using the same key. This includes Symmetric encryption algorithm. Encryption algorithm that uses two different keys a public and a private key are called asymmetric encryption algorithm. An encryption key is simply a binary string of data used in the encryption process. Because the same encryption key is used to encrypt and decrypt data, it is important to keep the encryption key a secret and to use keys that are hard to guess. ENCRYPTION PSEUDOCODE For the decryption process, the reverse process of the pseudo code is followed with all the rounds performed. VII. HASH IMPLEMENTATION SHA1 is a hashing algorithm which stands for Secure Hashing Algorithm, it is widely used in many application including SSL,TLS,SSH. SHA1 ALGORITHM DESCRIPTION Padding which pads the message with a single one followed by zeroes until the final block has 448 bits.. Append the size of the original message as an unsigned 64 bit integer. Initialize the 5 hash blocks (h0, h1, h2, h3, h4) to the specific constants defined in the SHA1 standard. Hash for each 512 bit block. Allocate an... ... middle of paper ... ...ing packet transmission across multiple associated links. X. REFERENCES [1] Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Common. Surv. Tuts., vol. 10, no. 1–4, pp. 6–28, 2008. [2] L. Schnauzer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proc. 2002 ACM CCS, pp. 41–47. [3] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in IEEE SP, pp. 197–213, 2003. [4] W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proc. 2004 IEEE INFOCOM, pp. 586–597. [5] C. Castelluccia and A. Spognardi, “A robust key pre-distribution protocol for multi-phase wireless sensor networks,” in Proc. 2007 IEEE Securecom, pp. 351–360. [6] D. Liu and P. Ning, “Establishing pair wise keys in
Open Document