SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 5 (Nov. - Dec. 2013), PP 35-38
www.iosrjournals.org
www.iosrjournals.org 35 | Page
Implementation of AES Algorithm in MicroController Using
PIC18F452
Ali E. Taki El_Deen1
and Ahmed Mohamed Fanni2
1
IEEE Senior Member, Alexandria University, Egypt
2
Electronics and Communications Dept, Mansoura University,Egypt
Abstract: Security has become an increasingly important feature with the growth of electronic communication
which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the
encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is
famous for its ciphering strength and its strong defense against any attack for example the brute force attack.
Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future
[3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old
encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it
would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key".
In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more
speed in both the encryption and decryption of the files.
Keywords: AES, Cryptography, DES, NIST, Rijndael, Serpent.
I. Introduction:
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until
recent decades, it has been the story of what might be called classic cryptography — that is, of methods
of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention
of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more
sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing
has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and
paper[1].
The development of cryptography has been paralleled by the development of cryptanalysis — the
"breaking" of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of
encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann
Telegram triggered the United States' entry into World War I; and Allied reading of Nazi Germany's ciphers
shortened World War II, in some evaluations by as much as two years [4].
Before the modern era, cryptography was concerned solely with message confidentiality (i.e.,
encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again
at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the
key needed for decryption of that message). Encryption was used to (attempt to)
ensure secrecy in communications, such as those of spies, military leaders, and diplomats [7]. In recent decades,
the field has expanded beyond confidentiality concerns to include techniques for message integrity checking,
sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among
others [5].
Towards the close of the 20th century, the National Institute for Standards and Testing (NIST)acted on
the need for a new encryption algorithm capable of protecting top secret information[2].
NIST is part of the Department of Commerce. It is a non-regulatory agency that, promotes "U.S. innovation and
industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance
economic security and improve quality of life.
"Early in the development process, NIST decided to draw on the world's finest cryptographic minds
and asked them to submit candidates for the new algorithm because the aging Data Encryption Standard (DES)
has many weaknesses. DES has a relatively small 56-bit key which was becoming vulnerable to brute force
attacks. In addition, the DES was designed primarily for hardware and is relatively slow when implemented in
software. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it is
unsuitable for limited-resource platforms; and it may be affected by potential security issues connected with the
(today comparatively small) block size of 64 bits. In 1997 NIST published a formal call which read in part: It is
intended that the AES will specify an unclassified, publicly disclosed encryption algorithm available royalty-
free worldwide that is capable of protecting sensitive government information well into the next century.
Implementation of AES Algorithm in MicroController Using PIC18F452
www.iosrjournals.org 36 | Page
The purpose of this notice is to solicit candidate algorithms from the public, academic/research communities,
manufacturers, voluntary standards organizations, and Federal, state, and local government organizations.
Following the close of the submission period, NIST intends to make all submissions publicly available for
review and comment.
The entire process spanned five years. Fifteen competing algorithms with colorful names such as
Rijndael (the eventual winner), Twofish and Serpent (the runners up) were scrutinized over a three year period
[8].
AES is now the industry standard for encryption. The NSA employs it for protecting secret information
and industry uses the algorithm for creating commercially available encryption products[3].
File encryption and email encryption are two common applications for AES. File encryption protects the
information on your hard disk or thumb drive. With encryption, your data will be secure even if your computer
is hacked or your USB drive stolen. Email encryption protects your messages as they journey through the cloud
and keeps them from being read by unintended recipients.
II. AES algorithm overview:
AES Algorithm consists of 2 Main Parts:
1- Encryption or Decryption Process:
Encryption process contains 4 main parts:
I-Add Round Key:Each byte of the state is combined with the round key using bitwise Xor.
II-Shift Row: transposition step
III-Sub Byte: non-linear substitution step using Sbox
IIII-Mix Column: mixing operation of each column using GF
Encryption process: It starts with AddRoundKey with RoundKey0.
Then go to loop and do SubByte, ShiftRow,MixColumn and AddRoundKey in that order for 9 Rounds each
round with different RoundKey(1-9).
Then go to the final round (Round10) and repeat the same previous functions in the loop except MixColumn.
Decryption process: it’s the reverse of encryption process in every step which means the decryption 1st
round is
the 10th
round of the encryption and it uses the inverse functions of MixColumn, SubByte and ShiftRow and as
u can assume the Keys arrangement are reversed too as it starts with Roundkey10 instead of Roundkey0 as it
was in the encryption process [8] [3].
2-Key Generation (Key Expansion):
It involves RotWord, SubByte And Xor bitwise operation to generate enough keys for each round in the
Encryption, Decryption process.
Summary of both encryption and decryption process are shown in the Fig. 2.
Implementation of AES Algorithm in MicroController Using PIC18F452
www.iosrjournals.org 37 | Page
As each round works with different key generated from the key generation process.
III. Implementation of AES Software and Hardware
AES-128 has been implemented on PIC18f452 using MIKROC PRO FOR PIC and interfaced it with
Keypad, Alphanumeric LCD 4x20, leds, buttons and Xbee Module for wireless communication as shown in fig.
3.
PIC18F452 pin diagram [6] is shown in fig. 4.
Keypad is used as an input device to enter the Plaintext, LCD is used to display both encrypted and decrypted
text, Xbee Module is used to send or receive the encrypted file from or to another exact same device, Leds is
used to indicate that there is text being received or the text is done being transmitted. The device can either
receive or send the encrypted text to another same device.
Implementation of AES Algorithm in MicroController Using PIC18F452
www.iosrjournals.org 38 | Page
Overview on the code
1-SubByte
2-ShiftRow
3-MixColumn
4-AddRoundKey
IV. Advantage of Implementation
You will need to have the device to be able to decrypt the encrypted file because it uses custom Sbox
instead of the standard one to ensure more security and the security fuses in the PIC can be enabled so the PIC
won't be readable to protect the code hence protect the algorithm so even if the encrypted message got hacked
by any means in order to break the encrypted file you will need to have the device first and then guess the key
which is practically impossible.
V. Conclusion
In this paper the implementation of AES-128 has given it more encryption power and enhanced its
security even more thus make it harder for anyone to hack the ciphered information and decrypted it.
The device components are simple and cheap in price so the cost isn't a problem at all.
REFERENCES
[1] Hans Delfs, Helmut Knebl, “Introduction to Cryptography: Principles and Applications”, Second Edition, ISBN: 9783540492436,
2007.
[2] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 9781584886181, 2005.
[3] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013.
[4] Christophe RITZENTHALER, “Cryptology course”, 2nd Semester 2006.
[5] ChristofPaar, Jan Pelzl, “Understanding Cryptography”, ISBN: 9783642041006, 2010
[6] Microchip. 2006. PIC18F452 Data Sheet. Printed by Microchip Technology, Inc in the United States of America.
[7] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone,“Hand Book of Applied Cryptography”, 1997.
[8] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013.

Mais conteúdo relacionado

Mais procurados

SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...Shakas Technologies
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safeeSAT Publishing House
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherGopal Sakarkar
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGDATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGIJNSA Journal
 

Mais procurados (20)

Network security
Network securityNetwork security
Network security
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
V01 i010410
V01 i010410V01 i010410
V01 i010410
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Pdf3
Pdf3Pdf3
Pdf3
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...A novel approach to information security using safe exchange of encrypted dat...
A novel approach to information security using safe exchange of encrypted dat...
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
Cryptography
CryptographyCryptography
Cryptography
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Showcase poster
Showcase posterShowcase poster
Showcase poster
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Cryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar CipherCryptography and Encryptions,Network Security,Caesar Cipher
Cryptography and Encryptions,Network Security,Caesar Cipher
 
10.1.1.44.6790
10.1.1.44.679010.1.1.44.6790
10.1.1.44.6790
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Network Security
Network SecurityNetwork Security
Network Security
 
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGDATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
 

Semelhante a Implementation of AES Algorithm in MicroController Using PIC18F452

Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantumijaia
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 

Semelhante a Implementation of AES Algorithm in MicroController Using PIC18F452 (20)

Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
Free space QKD
Free space QKDFree space QKD
Free space QKD
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Cyber security
Cyber securityCyber security
Cyber security
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantum
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Último (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Implementation of AES Algorithm in MicroController Using PIC18F452

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 5 (Nov. - Dec. 2013), PP 35-38 www.iosrjournals.org www.iosrjournals.org 35 | Page Implementation of AES Algorithm in MicroController Using PIC18F452 Ali E. Taki El_Deen1 and Ahmed Mohamed Fanni2 1 IEEE Senior Member, Alexandria University, Egypt 2 Electronics and Communications Dept, Mansoura University,Egypt Abstract: Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encryption algorithm as there are 3 types of AES (AES-128,AES-192,AES-256) but why AES? Because AES is famous for its ciphering strength and its strong defense against any attack for example the brute force attack. Using Brute force attack on AES-128 (smallest key length) is unlikely to be practical in the foreseeable future [3]. According to NIST, "Assuming that one could build a machine that could recover a DES key (DES is an old encryption algorithm which no one uses now in modern days) in a second (i.e.,try 2^55 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key". In this paper AES-128 will be implemented on a microcontroller circuit to give it further security and more speed in both the encryption and decryption of the files. Keywords: AES, Cryptography, DES, NIST, Rijndael, Serpent. I. Introduction: Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper[1]. The development of cryptography has been paralleled by the development of cryptanalysis — the "breaking" of codes and ciphers. The discovery and application, early on, of frequency analysis to the reading of encrypted communications has, on occasion, altered the course of history. Thus the Zimmermann Telegram triggered the United States' entry into World War I; and Allied reading of Nazi Germany's ciphers shortened World War II, in some evaluations by as much as two years [4]. Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption)—conversion of messages from a comprehensible form into an incomprehensible one and back again at the other end, rendering it unreadable by interceptors or eavesdroppers without secret knowledge (namely the key needed for decryption of that message). Encryption was used to (attempt to) ensure secrecy in communications, such as those of spies, military leaders, and diplomats [7]. In recent decades, the field has expanded beyond confidentiality concerns to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, among others [5]. Towards the close of the 20th century, the National Institute for Standards and Testing (NIST)acted on the need for a new encryption algorithm capable of protecting top secret information[2]. NIST is part of the Department of Commerce. It is a non-regulatory agency that, promotes "U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve quality of life. "Early in the development process, NIST decided to draw on the world's finest cryptographic minds and asked them to submit candidates for the new algorithm because the aging Data Encryption Standard (DES) has many weaknesses. DES has a relatively small 56-bit key which was becoming vulnerable to brute force attacks. In addition, the DES was designed primarily for hardware and is relatively slow when implemented in software. While Triple-DES avoids the problem of a small key size, it is very slow even in hardware; it is unsuitable for limited-resource platforms; and it may be affected by potential security issues connected with the (today comparatively small) block size of 64 bits. In 1997 NIST published a formal call which read in part: It is intended that the AES will specify an unclassified, publicly disclosed encryption algorithm available royalty- free worldwide that is capable of protecting sensitive government information well into the next century.
  • 2. Implementation of AES Algorithm in MicroController Using PIC18F452 www.iosrjournals.org 36 | Page The purpose of this notice is to solicit candidate algorithms from the public, academic/research communities, manufacturers, voluntary standards organizations, and Federal, state, and local government organizations. Following the close of the submission period, NIST intends to make all submissions publicly available for review and comment. The entire process spanned five years. Fifteen competing algorithms with colorful names such as Rijndael (the eventual winner), Twofish and Serpent (the runners up) were scrutinized over a three year period [8]. AES is now the industry standard for encryption. The NSA employs it for protecting secret information and industry uses the algorithm for creating commercially available encryption products[3]. File encryption and email encryption are two common applications for AES. File encryption protects the information on your hard disk or thumb drive. With encryption, your data will be secure even if your computer is hacked or your USB drive stolen. Email encryption protects your messages as they journey through the cloud and keeps them from being read by unintended recipients. II. AES algorithm overview: AES Algorithm consists of 2 Main Parts: 1- Encryption or Decryption Process: Encryption process contains 4 main parts: I-Add Round Key:Each byte of the state is combined with the round key using bitwise Xor. II-Shift Row: transposition step III-Sub Byte: non-linear substitution step using Sbox IIII-Mix Column: mixing operation of each column using GF Encryption process: It starts with AddRoundKey with RoundKey0. Then go to loop and do SubByte, ShiftRow,MixColumn and AddRoundKey in that order for 9 Rounds each round with different RoundKey(1-9). Then go to the final round (Round10) and repeat the same previous functions in the loop except MixColumn. Decryption process: it’s the reverse of encryption process in every step which means the decryption 1st round is the 10th round of the encryption and it uses the inverse functions of MixColumn, SubByte and ShiftRow and as u can assume the Keys arrangement are reversed too as it starts with Roundkey10 instead of Roundkey0 as it was in the encryption process [8] [3]. 2-Key Generation (Key Expansion): It involves RotWord, SubByte And Xor bitwise operation to generate enough keys for each round in the Encryption, Decryption process. Summary of both encryption and decryption process are shown in the Fig. 2.
  • 3. Implementation of AES Algorithm in MicroController Using PIC18F452 www.iosrjournals.org 37 | Page As each round works with different key generated from the key generation process. III. Implementation of AES Software and Hardware AES-128 has been implemented on PIC18f452 using MIKROC PRO FOR PIC and interfaced it with Keypad, Alphanumeric LCD 4x20, leds, buttons and Xbee Module for wireless communication as shown in fig. 3. PIC18F452 pin diagram [6] is shown in fig. 4. Keypad is used as an input device to enter the Plaintext, LCD is used to display both encrypted and decrypted text, Xbee Module is used to send or receive the encrypted file from or to another exact same device, Leds is used to indicate that there is text being received or the text is done being transmitted. The device can either receive or send the encrypted text to another same device.
  • 4. Implementation of AES Algorithm in MicroController Using PIC18F452 www.iosrjournals.org 38 | Page Overview on the code 1-SubByte 2-ShiftRow 3-MixColumn 4-AddRoundKey IV. Advantage of Implementation You will need to have the device to be able to decrypt the encrypted file because it uses custom Sbox instead of the standard one to ensure more security and the security fuses in the PIC can be enabled so the PIC won't be readable to protect the code hence protect the algorithm so even if the encrypted message got hacked by any means in order to break the encrypted file you will need to have the device first and then guess the key which is practically impossible. V. Conclusion In this paper the implementation of AES-128 has given it more encryption power and enhanced its security even more thus make it harder for anyone to hack the ciphered information and decrypted it. The device components are simple and cheap in price so the cost isn't a problem at all. REFERENCES [1] Hans Delfs, Helmut Knebl, “Introduction to Cryptography: Principles and Applications”, Second Edition, ISBN: 9783540492436, 2007. [2] Richard A. Mollin, “An Introduction to Cryptography”, Second Edition, ISBN: 1584886188 / 9781584886181, 2005. [3] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013. [4] Christophe RITZENTHALER, “Cryptology course”, 2nd Semester 2006. [5] ChristofPaar, Jan Pelzl, “Understanding Cryptography”, ISBN: 9783642041006, 2010 [6] Microchip. 2006. PIC18F452 Data Sheet. Printed by Microchip Technology, Inc in the United States of America. [7] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone,“Hand Book of Applied Cryptography”, 1997. [8] AviKak, “AES: The Advanced Encryption Standard, Lecture Notes on “Computer and Network Security””, February, 2013.