Advanced Encryption Standard Algorithm for File Security
  • Author(s): Olasunkanmi Felix Oyadokun ; Danjuma Shadrach Sunday ; Haruna Bege ; Kolawole S.F
  • Paper ID: 1703832
  • Page: 185-190
  • Published Date: 30-09-2022
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 6 Issue 3 September-2022
Abstract

The efficacy of the Advanced Encryption Standard (AES) algorithm has made it very attractive for data encryption. As a result of this, it has been employed by many large organizations for safeguarding files in any binary format. It makes use of a symmetric key to achieve successful data encoding. To encrypt a file, it uses different key sizes. Although a bigger key size increases the degree of unpredictability, it also increases the encryption time. AES utilizes Add round key, Byte substitution, Shift rows and Shift column matrix operations together with a Galois Field computation in Modulus two (MOD 2). This paper shows the step by step process of how data is encrypted using the AES.

Keywords

AES, Add round key, Byte substitution, Galois Field, Shift rows and Shift column.

Citations

IRE Journals:
Olasunkanmi Felix Oyadokun , Danjuma Shadrach Sunday , Haruna Bege , Kolawole S.F "Advanced Encryption Standard Algorithm for File Security" Iconic Research And Engineering Journals Volume 6 Issue 3 2022 Page 185-190

IEEE:
Olasunkanmi Felix Oyadokun , Danjuma Shadrach Sunday , Haruna Bege , Kolawole S.F "Advanced Encryption Standard Algorithm for File Security" Iconic Research And Engineering Journals, 6(3)