Loading

Aes Modes of Operation
Naseema Bhanu1, N.V. Chaitanya2

1Naseema Bhanu, Department of Electronics and Communication Engineering, Vignan’s Institute of Engineering for Women, Visakhapatnam, India.
2N.V. Chaitanya, Department of Electronics and Communication Engineering, Vignan’s Institute of Engineering for Women, Visakhapatnam, India.

Manuscript received on 28 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 2213-2217 | Volume-8 Issue-9, July 2019 | Retrieval Number: I8127078919/19©BEIESP | DOI: 10.35940/ijitee.I8127.078919

Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography is the science of secret codes. Previously we used DES algorithms in order to secure but cannot encrypt completely. Thus, we referred AES Algorithms to create a ciphertext in encryption and is given as an input in decryption. In present scenario, everyone sharing their data in online using internet alsoonline transactions like e-banking for money transfers, in shopping malls, restaurants, and many more. While transferring a huge amount or any confidential data there are many chances to hack the data. There are different modes of operations used in AES in accordance with the efficiency to blur the data. The design has been done in VHDL (Very High-Speed Integrated Circuit Hardware Description Language) and simulated and synthesized using Xilinx.
Keyword: AES (Advanced Encryption Standards), Ciphertext, DES (Data Encryption Standards), E-Banking.

Scope of the Article: Operational Research