Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:3 Year: 30 March,2021 Pages:1459-1463
Cryptography is the use of codes and ciphers to protect secrets. AES is used to provide more security also used to prevent attacks. Security is a major problem in recent year. Several researchers for doing their research in information security domain to improve their security through their information sharing. Modern cryptography is achieved by algorithms that have key to encrypt and decrypt information. This keys convert messages and data into digital gibberish through encryption. In general longer key is, more difficult to Crack the code. In this paper we use AES algorithm to encrypt financial related data as AES uses higher length key sizes.
AES 256 bit key, cipher key, MR S – Box multiple random s – box
[1] K. Tiri et al., “Prototype IC with WDDL and differential routing-DPA resistance assessment,” in Cryptographic Hardware and Embedded systems. Berlin, Germany: Springer- Verlag, 2005, pp. 354-365. [2] A. Moradi, A. Poschmann, S. Ling, C. Paar, and H. Wang, “Pushing the limits: A very compact and a threshold implementation of AES,”in Advances in Cryptology. Berlin, Germany: Springer- Verlag, 2011, pp, 69-88. [3] F. -X. Standard, O. Pereira, Y. Yu, J,- J. Quisquater, M. Yung, and E. Oswald, “Leakage resilient cryptography in practice,” in Towards Hardware - Intrinsic Security. Berlin, Germany: Springer-Verlag, 2010, pp, 99-134. [4] Y. Dodis and K. Pietrzak, “Leakage resilient pseudorandom functions and side-channel attacks on Feistel networks,” in Proc. 30th CRYPTO, 2010, pp, 21-40. [5] S. Faust, K. Pietrzak, and J. Schipper, “Practical leakage-resilient symmetric Cryptographic Hardware and Embedded Systems. Berlin, Germany: Springer- Verlag, 2012, pp, 213-232.