Home|Journals|Articles by Year Follow on Twitter

Directory for Medical Articles

Open Access

Research Article

JCR. 2020; 7(19): 6576-6584


Pooja L Kanth, K M Sathyanarayan, Mohammed Shoaib U, Vinayaka D, Geethashree A.

Cryptography plays a vital role in securing confidential data of the user from being accessed by a
third person. It is used to protect and secure businesses corporate secrets, classified information of the
government and personal information of people and guards against identity theft. The Advanced Encryption
Standard (AES) algorithm is a symmetric encryption algorithm which is approved by the U.S government as a
standard for encrypting sensitive and private data. This algorithm is developed by Joan Daemen and Vincent
Rijmen and published by National Institute of Standard and Technology (NIST) in 2001. This paper
summarizes the different techniques used to implement Advanced Encryption Standard (AES) Algorithm. The
software implementation of the AES algorithm is cost effective and easier to implement. However, hardware
implementation has greater speed and security. It proposes a hardware implementation of ASIC which can
combat the disadvantages of the existing system. The standard cells generated in Cadence Genus solution are
custom designed to optimize area, power and timing.

Key words: AES algorithm, ASIC implementation, Cryptography, Encryption, FPGA implementation, Software implementation, SubBytes transformation, S-Box.

Similar Articles

Comparative Glycomics Analysis of Mass Spectrometry Data.
Zhou Y, Neelamegham S
Methods in molecular biology (Clifton, N.J.). 2022; 2370(): 97-113

Using a Hand-Held Gene Gun for Genetic Transformation of Tetrahymena thermophila.
Gotesman M, Hosein RE, Williams SA
Methods in molecular biology (Clifton, N.J.). 2022; 2364(): 349-361

Purification of Cytoskeletal Proteins by Fast Protein Liquid Chromatography (FPLC) Using an ÄKTA Start System.
Gotesman M, Wang Y, Madasu SC, Mitchell CA
Methods in molecular biology (Clifton, N.J.). 2022; 2364(): 237-249

Transplastomic Tomato Plants Expressing Insect-Specific Double-Stranded RNAs: A Protocol Based on Biolistic Transformation.
Kaplanoglu E, Kolotilin I, Menassa R, Donly C
Methods in molecular biology (Clifton, N.J.). 2022; 2360(): 235-252

Software to Conduct a Meta-Analysis and Network Meta-Analysis.
Daly C, Soobiah C
Methods in molecular biology (Clifton, N.J.). 2022; 2345(): 223-244

Full-text options

Latest Statistics about COVID-19
• pubstat.org

Add your Article(s) to Indexes
• citeindex.org

Covid-19 Trends and Statistics
Follow ScopeMed on Twitter
Author Tools
eJPort Journal Hosting
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (https://creativecommons.org/licenses/by-nc-sa/4.0/) which permits unrestricted, non-commercial use, distribution and reproduction in any medium, provided the work is properly cited.
ScopeMed is a Database Service for Scientific Publications. Copyright ScopeMed Information Services.

ScopeMed Web Sites