AES Image Encryption
AES Image Encryption
Research Article
DOI: https://doi.org/10.21203/rs.3.rs-1179585/v1
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Read Full License
AES IMAGE ENCRYPTION
(ADVANCED ENCRYPTION STANDARD)
Paavni Gaur
B-Tech: Information Technology
Guided by: Mr. Ajay Kaushik Assistant Professor- Department of IT
MixColumns
Each column of four bytes is now transformed using a special
mathematical function. This function takes as input the four
bytes of one column and outputs four completely new bytes,
which replace the original column. The result is another new
matrix consisting of 16 new bytes. It should be noted that this
Encryption Process step is not performed in the last round.
The encryption phase of AES can be broken into three phases: (This multiplication has the property of operating independently over each of the
the initial round, the main rounds, and the final round. columns of the initial matrix, i.e. the first column when multiplied by the matrix,
1. Initial Round produces the first column of the resultant matrix.)
● AddRoundKey
2. Main Rounds
● SubBytes
Addroundkey
● ShiftRows
The 16 bytes of the matrix are now considered as 128 bits and
● MixColumns
are XORed to the 128 bits of the round key. If this is the last
● AddRoundKey
round then the output is the ciphertext. Otherwise, the resulting
3. Final Round
128 bits are interpreted as 16 bytes and we begin another similar
● SubBytes
round.
● ShiftRows
● AddRoundKey
Decryption Process
The process of decryption of an AES ciphertext is similar to the
encryption process in the reverse order. Each round consists of
the four processes conducted in the reverse order −
1. Inverse Final Round achieve the high security, because 256 bit cipher key is difficult
● AddRoundKey to break. As a result of this secure transmission of image can be
● ShiftRows possible.
● SubBytes The goal of this research is to study the application of
2. Inverse Main Round Advanced Encryption Standard algorithm (AES) for secure
● AddRoundKey and efficient image encryption. The importance of image
● MixColumns -This step is similar to the MixColumns step encryption by AES algorithm processes have been studied. It is
in encryption, but differs in the matrix used to carry out also expected that AES algorithm study will have an
the operation. effective role in strategic applications, because the encryption
● ShiftRows algorithm applied on hardware is also take a place in
● SubBytes -Inverse S-box is used as a lookup table and strategic communications equipment, it is safe and possible to
using which the bytes are substituted during decryption. develop this algorithm in terms of height and speed of time that
3. Inverse Initial Round have approved mainly on logistical aspects not on the technical
● AddRoundKey aspects. It is possible to encrypt and decrypt by AES encryption
used in many highly sensitive applications like Image
Since sub-processes in each round are in reverse manner, unlike encryption. We have reason to believe that use this method to
for a Feistel Cipher, the encryption and decryption algorithms encrypt the image will have a very good prospect in the future.
needs to be separately implemented, although they are very
closely related. V. CONCLUSION AND FUTURE SCOPE
Of the four operations in AES encryption, only the
AddRoundKey operation is its own inverse (since it is an Since image steganography is done using AES, this system
exclusive-or). provides security from intrusion attacks and the usage of AES
To undo AddRoundKey, it is only necessary to expand the entire technique allows the encryption and decryption process to be
AES key schedule (identically to encryption) and then use the more secure and faster. Thus this system provides security in
appropriate key in the exclusive-or. The other three operations storage and transmission of digital images. The cryptographic
require an inverse operation to be defined and used. methodology proposed in this paper will further be tested on
The first operation to be undone is ShiftRows. The Inverse different types of input images with change in size of the image
ShiftRows operation is identical to the ShiftRows operation and keys of AES encryption algorithm.
except that rotations are made to the right instead of to the left. The report shows the study in which a system could be used for
effective image data encryption and key generation in diversified
application areas, where sensitive and confidential data needs to
be transmitted along with the image.
The next step in this direction will be system implementation,
The next operation to be undone is the SubBytes operation. The and then analyzing it for its efficiency, accuracy and reliability.
Inverse S-Box is used which is read identically to the S-Box As a future work, I am going to continue this research in order
matrix. generating more secure key to get the maximum encryption
The last inverse operation to define is MixColumns. Like speed in limited implementation area.
MixColumns, Inverse MixColumns can be defined as the matrix I will implement a novel mechanism in which AES algorithm
multiplication . will be apply to encrypt and decrypt images securely for further
applications in image communication system. Future scope is, it
can be used in various applications like Military communication,
Forensics, Intelligent systems etc.
IV. RESULTS AND DISCUSSION
REFERENCES
Cryptography and its principles have been studied carefully. I
read and learned about Cryptography from various materials [1] https://www.iosrjournals.org/
available on the internet.Encryption including why data [2] https://www.researchgate.net/
encryption is necessary and types of encryption algorithms were [3] https://citeseerx.ist.psu.edu/
studied. Features and principles of Symmetric key algorithm [4] https://www.ijser.org/
were studied from various materials available. Image encryption [5] https://www.educative.io/edpresso/what-is-the-aes-algorithm
and decryption techniques using Advanced Encryption Standard [6] https://www.researchgate.net
(AES) algorithm is proposed .The usage of 256 bit cipher key to