scispace - formally typeset
Search or ask a question

How does emprovement of AES in terms of throuput has been done trough the time? 


Best insight from top research papers

The improvement of AES in terms of throughput over time has been achieved through various methods. One approach involves optimizing transformations like SubBytes/InvSubBytes and MixColumn/InvMixColumn to minimize gate count, enhancing performance. Additionally, the use of a dynamic key generation system based on the AES algorithm and time function has been proposed, where the AES key is generated randomly based on the user's login time, strengthening security and encryption processes. Furthermore, the implementation of an enhanced AES file encryption model incorporating a Timing Circuit Algorithm and Feedback Artificial Agent has been shown to secure data during transition and track information effectively, enhancing overall system security. These advancements collectively contribute to enhancing AES throughput and security over time.

Answers from top 5 papers

More filters
Papers (5)Insight
Proceedings ArticleDOI
Qingfu Cao, Shuguo Li 
11 Dec 2009
16 Citations
The AES improvement in throughput was achieved by optimizing transformations, selecting optimal coefficients, and implementing a novel key expansion structure, resulting in 1.16Gbps throughput with only 19476 gates.
The AES algorithm's modes of operation (ECB, CBC, CFB, OFB) were evaluated for throughput and cipher time, showing significant differences in throughput but not in encryption time.
Not addressed in the paper.
AES improvement in throughput is achieved by dynamically generating keys based on login time, enhancing security. Each encryption process changes ciphertext, strengthening authentication. Average encryption-decryption time is 0.0023 s.
Improvements in AES throughput have been achieved by modifying the algorithm to address computational overhead, fixed S-Box weaknesses, and handling complex multimedia data efficiently over time.

Related Questions

What are the most commonly used statistical methods for digital image encryption?4 answersStatistical methods commonly used for digital image encryption include entropy, SSIM, NPCR, UACI, and histogram analysis. These metrics are crucial in evaluating image quality and ensuring secure encryption that can withstand various attacks. Additionally, the use of chaos maps and chaotic systems, such as the two-dimensional logistic map, has been proven effective for image encryption, providing confusion and diffusion properties for a secure cipher. Furthermore, the comparison of methods like the Discrete Fractional Fourier Transform (DFrFT) and Discrete Fractional Sine Transform (DFrST) with chaos functions showcases the importance of statistical analysis, including histogram comparisons and PSNR calculations, in assessing the validity and effectiveness of encryption techniques. The combination of symmetric and asymmetric key methods in encryption algorithms also enhances security by leveraging the strengths of both approaches while mitigating their individual weaknesses.
How does encryption make eavesdropping easier?3 answersEncryption does not make eavesdropping easier. In fact, encryption is used to protect transmitted data and make it difficult for eavesdroppers to access the information. Encryption strategies can be designed to impair the eavesdropper's estimation performance and increase their estimation error covariance. Additionally, encryption can prevent an eavesdropper from determining the encryption key and obtaining the content of encrypted blocks by securely transferring information through random ordering and random block sizing. Opportunistic encryption schemes can also be implemented to create encrypted tunnels between nodes without relying on global Trusted Third Parties, providing a robust and easily deployable encryption service. Encryption systems, such as those using AES encoding algorithms, can be used to secure internet telephone systems and prevent eavesdropping during communication.
What are the advantages of using AES GCM CTR Mode other than CBC Or ECB modes?5 answersThe advantages of using AES GCM CTR mode over CBC or ECB modes include improved security bounds for encrypting short messages, the ability to encrypt more than 2 messages with the same key, and nonce-misuse resistance. AES GCM CTR mode uses a 127-bit pseudo-random counter for CTR encryption, which enhances security for short messages. Additionally, a new key derivation function allows for encrypting up to 2 messages with the same key, compared to the limitation of only 2 messages in GCM-SIV and AES-GCM. This makes AES GCM CTR mode suitable for real-world applications that require nonce-misuse resistant Authenticated Encryption. These advantages have led to the integration of AES GCM CTR mode into libraries like Google's BoringSSL and its deployment in protocols like QUIC.
What are the security protocols involved in AES cryptographic algorithm?5 answersThe security protocols involved in the AES cryptographic algorithm include encryption and decryption using symmetric key encryption. Symmetric encryption uses the same key for both encryption and decryption purposes, while asymmetric encryption uses a public key for encryption and a private key for decryption. The AES algorithm, which is used for encryption and decryption, provides a high level of security by encrypting the data with a 128-bit key, making it difficult to hack. The security of the encryption is measured using metrics such as MSE, PSNR, Cross-Correlation, and Entropy limits. These metrics help in evaluating the effectiveness of the encryption and ensuring better security.
What is the history of AES?5 answersThe Advanced Encryption Standard (AES) was developed as a replacement for the Data Encryption Standard (DES) due to its vulnerability to brute-force attacks. AES is a block cipher algorithm that encrypts and decrypts data using a certain input block size, typically 128, and produces an output block of the same size. The AES algorithm was designated by the US National Institute of Standards and Technology (NIST) in November 2001, based on the Rijndael Algorithm designed by NIST, Joan Daemen, and Vincent Rijmen. The history of AES can be traced back to a content held by NIST in September 1997, where the DES algorithm was deemed unreliable, leading to the evaluation and elimination process that culminated in the selection of AES as the new encryption standard.
What are the benefits of using cryptography to improve cybersecurity in educational institutions?2 answersUsing cryptography to improve cybersecurity in educational institutions has several benefits. Firstly, it helps increase public interest in cybersecurity and promotes safe online behaviors. Secondly, cryptography can be used as a tool to teach mathematical concepts, making students more enthusiastic about mathematics, computer science, and electronics. Additionally, cryptography-based security protocols can protect networks, data, and systems from cyber attacks, ensuring the integrity and confidentiality of information. By incorporating cryptography into the curriculum, educational institutions can train students to become cybersecurity professionals of the highest caliber. Overall, the use of cryptography in educational institutions enhances cybersecurity awareness, fosters mathematical enthusiasm, and equips students with the necessary skills to protect against cyber threats.

See what other people are reading

What are the statistical features commonly used in image encryption techniques?
5 answers
Statistical features commonly used in image encryption techniques include correlation coefficient, key space, speed, entropy, Number of Pixel Change Rate, Unified Average Changing Intensity, and resistance against statistical attacks. The correlation coefficient is utilized to analyze the resemblance between neighboring pixels in the encrypted image. Key space, speed, entropy, and other parameters are evaluated to assess the security and performance of encryption techniques, ensuring resistance against attacks and efficient encryption/decryption processes. Additionally, techniques like chaotic schemes are known to provide highly scrambled encrypted images with uniform histogram distribution, low correlation coefficient values, and resistance against statistical and differential attacks, showcasing their effectiveness in image encryption.
What is e health?
4 answers
E-health, a significant industrial and research field, integrates medical informatics, public health, and healthcare business to enhance healthcare accessibility, reduce costs, and improve patient experience. It involves the use of information and communication technology (ICT) to provide valuable health information, including interventions like telehealth, telemedicine, and mobile health, aiming for digitalization and efficient healthcare improvements. E-health enables the delivery of healthcare services at patients' homes, gathers more patient information for better decision-making, and supports prevention and lifestyle guidance through technologies like artificial intelligence and serious gaming. Additionally, E-health involves secure data exchange among healthcare professionals using encryption algorithms like Triple-DES and DNA cryptography to protect medical data in the cloud. Overall, E-health encompasses various technologies such as electronic health records, wearables, telehealth, and artificial intelligence to diagnose, monitor, treat, and prevent diseases, ultimately improving patient care and promoting health equity.
What is block cipher?
4 answers
A block cipher is a cryptographic algorithm that operates on fixed-length blocks of data, encrypting plaintext into ciphertext using a secret key. These ciphers are crucial for ensuring data security in various applications like data storage and network communication. Block ciphers like DES, 3DES, Blowfish, Twofish, PRISENT, KLEIN, IDEA, and AES are commonly used symmetric ciphers with different designs. They undergo continuous modifications to enhance robustness against potential attacks, focusing on key length, complexity, and overall structure. The AES, in particular, remains unbroken and adaptable to new applications, reflecting the evolution of cryptographic standards over time. Cryptanalysis techniques are employed to analyze and potentially break block ciphers, emphasizing the importance of understanding these methods for security assessment.
ASM (Authenticated Server Messages) ?
5 answers
ASM (Authenticated Server Messages) involve the secure transmission of messages between parties, ensuring authentication and integrity. Various methods and systems exist for authenticating messages, such as using secure hash functions to compare hash results with trusted bit strings. In the context of transmitting authenticated messages between devices, a system is described where messages are authenticated using keys and hash values, ensuring the integrity of the communication. Additionally, the concept of authenticated encryption schemes like ASC-1 aims to streamline encryption and message authentication in a single pass, enhancing security by reducing the need for multiple evaluations. These approaches highlight the importance of secure message transmission, especially in scenarios involving sensitive data or critical transactions.
How do i learn a new skill the fastes?
5 answers
To learn a new skill quickly, one approach is to use a modular structure that allows for expansion and building upon existing skills. This method involves using a genetic algorithm to search for weights within a pool of neurons, preserving previously learned skills while developing new ones. Another strategy is to engage in a "fasting of the heart," which involves emptying the faculties and achieving inner unity. This allows for a direct grasp of what is right and promotes unity and freedom. Additionally, the FastDES algorithm, based on the Data Encryption Standard (DES), offers a fast and efficient way to secure data. By using the round function concept of DES, FastDES can be applied to various security mechanisms and applications. Overall, combining modular learning structures, inner unity, and efficient algorithms can contribute to faster skill acquisition.
Is a cSWAP a clifford quantum gate?
4 answers
A cSWAP gate, also known as a controlled-SWAP gate, is not a Clifford quantum gate. The Clifford group is a finite subgroup of the unitary group generated by the Hadamard, CNOT, and Phase gates. The cSWAP gate is not included in this set of gates. The Clifford group can be efficiently simulated on classical computers, and it has motivated the development of methods that scale exponentially only in the number of non-Clifford gates. The cSWAP gate is a two-qubit gate that swaps the states of two qubits conditioned on the state of a third qubit. It is not a member of the Clifford group and therefore does not have the same efficient simulation properties.
What is the description of rabbit?
5 answers
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. It is part of the European Union's eSTREAM portfolio of stream ciphers and has been extensively analyzed for its strength against modern attacks. Previous software implementations have demonstrated Rabbit's high throughput, and now three reconfigurable hardware designs of the Rabbit stream cipher have been presented. These designs, including direct, interleaved, and generalized folded structure (GFS), have been implemented on the Xilinx Virtex-5 LXT FPGA and have shown impressive throughputs.Rabbit is particularly suited for use with Internet protocols where large amounts of data need to be processed.Additionally, Rabbit is a controlled natural language (CNL) designed to aid experts in understanding and authoring domain ontologies. It has been evaluated for ease of use by domain experts without prior ontology development experience.
What is the definition of e-health?
4 answers
E-health is a broad term that encompasses the use of information and communication technology (ICT) in the healthcare sector. It involves the exchange of health information and the use of digital technologies to improve the quality and efficiency of healthcare services. E-health includes interventions such as telehealth, telemedicine, m-health (mobile health), electronic health records (EHR), big data, wearables, and artificial intelligence. It aims to provide valuable information to individuals about human life and enable better healthcare improvements. E-health is not just about technology, but rather the convergence of healthcare and ICT technologies to provide practical healthcare solutions. It has the potential to benefit underserviced areas and is driven by advancements in technology. Space technology can also play a role in eliminating barriers to e-health in developing regions.
What are the potential security risks of cashless transactions?
5 answers
Cashless transactions pose potential security risks due to cybersecurity issues and the need to balance individual privacy with data security. These risks include security breaches, data manipulation, and the collection of mass amounts of personal data by organizations. To address these risks, various measures can be taken, such as assigning randomized numbers to credit cards and using blockchain technology to monitor transactions. However, these solutions are not without their own vulnerabilities, including zero-day errors, bugs, and varying levels of social acceptance. Additionally, the use of encryption algorithms like triple Data Encryption Standard (DES) can enhance security, but issues regarding key transfer and process slowdown need to be addressed. Overall, ensuring the security of cashless transactions requires a comprehensive approach that considers both technical and social solutions.
Fundamental differences between AES, DES, and 3DES?
3 answers
AES, DES, and 3DES are symmetric key encryption algorithms used for information security. AES, also known as Advanced Encryption Standard, is considered the best-known encryption standard due to its use of a 256-bit key length, which makes it highly secure. DES, or Data Encryption Standard, uses a 56-bit key length and can be cracked using brute force techniques, although it still provides some level of security. 3DES, or Triple DES, is an enhanced version of DES that uses a 112-bit key length and provides increased security compared to DES. AES is designed to work efficiently on small devices like smartphones and offers more security in the long term due to its larger block size and longer keys. Overall, AES is considered the most secure and efficient encryption standard among the three.