Image Encryption using AES Algorithm
Image Encryption using AES Algorithm
Abstract
Image security is important these days as data is increasing a lot. These data can be
images, videos, text, audio, etc. so to protect these images from attackers who can
destroy the image quality or modify the images, some technologies like AES, DES,
RSA, etc. have been invented. With the generation, data security has also become
confidentiality, integrity, and authentication. Using these techniques, the host can
encrypt and decrypt the image and can keep the digital images safe. When AES was
chosen 16 years ago, digital technology was completely different from today and the
scale of challenges was smaller, so with recent advanced technology and the
applications running with 64-bit and many other applications have become
detail in our research, and in addition to new recommendations for future work, a list
of shortcomings and vulnerabilities of the internal structure of the AES algorithm will
be diagnosed.
Introduction
I. INTRODUCTION
to many users every day. Over the years, with the increase in data security, it
becomes a problem that data is sent through insecure channels that are exposed to
manipulation or attack by malicious users. Various security technologies have been
put in place to ensure that data or messages reach only those who are authorized to
receive them. Cryptography has been one of the main techniques deployed to
secure data through the processes of encryption and decryption. Encryption involves
encoding information to secure data from attackers so that they cannot easily access
it. This process involves turning "images" into invisible "cipher images" using keys,
encrypted image back to the original plain image without missing any pixel from the
original image. Carrying out both processes involves the use of mathematical
asymmetric, and hashing. In this article, we will discuss the AES algorithm which is
In paper [3] This gives low complexity architecture and easily achieves low latency
as well as high throughput. The design used an iterative looping approach with a
block and key size of 128-bit, lookup table implementation of S-box. Kamali S.H et.
[4] used the modified advanced encryption algorithm to reflect a high level of security
and better image encryption. The modification is done by adjusting the ShiftRow
Transformation. The author has compared the results of the previous AES algorithm
Standards and Technology (NIST) in 2001. The AES algorithm, also known as the
Rijndael algorithm, is a symmetric block cipher algorithm that uses 128,192 or 256
bits. Keys to transform a 128-bit message block into 128-bit ciphertext. This method
makes it strong, secure, and exponentially stronger than DES, which uses a 56-bit
key.
rounds to generate the ciphertext. The length of the key used will determine the
number of rounds.
The number of rounds shown in Figure 2, 10, applies to the case where the
encryption key is 128 bits long. The number of cycles is 12 when the key is 192 bits,
and 14 when the key is 256. Before any cycle-based encryption processing can
begin, they converted the digital images into a binary matrix to process it through the
AES encryption algorithm. It is divided into 4*4 matrix for each unit of 8 bits to form
the plain text of the algorithm. The input state field is XORed with the first four bytes
The same thing happens during decryption - except now we XOR the state field of
the ciphertext with the last four words of the key schedule.
1) Replace bytes, 2) Shift rows, 3) Shuffle columns, and 4) Add round key.
In the last step XOR the output of the previous three steps with four words from the
key schedule.
1) Inverse row shift, 2) Inverse spare bytes, 3) Round key addition, and 4) Inverse
column mix.
In the third step XOR the output of the previous two steps with four words from the
key schedule.
The last round for encryption doesn’t contain the “Mix columns” step. The last round
1. Step 1: This step is named SubBytes for byte-by-byte substitution during the
two equal parts and converts each byte into hexadecimal of the state array.
These parts are the row mapped with a substitution box (S-Box) to generate
2. Step 2: Next step is named ShiftRows for shifting the rows of the state array
swaps the row elements among each other. No shift within the first row. In
the second row, it shifts element to one position left It also shifts the elements
from the third row two consecutive positions to the left, and it turns the last
matrix with each column to get a new column for the subsequent state array.
We will get the state array for the next step, once all the columns are
multiplied with the same constant matrix. This particular step is not to be done
4. Step 4: the last step is called AddRoundKey for adding the round key to the
output of the previous step during the encryption process. The corresponding
step during decryption is named aInvAddRoundKey for inverse add round key
transformation. With the first key generated (K0), we pass the block data
stored in the state array through an XOR function. It passes the output of the
After a study and analysis of the internal structure and the algebraic foundation of
the AES cipher, there is evidence that the AES algorithm has many suspicious
aspects and it has suffered from several vulnerabilities from the design term that is
listed below:
AES, focus on increasing the number of rounds or increasing the block size to
increase the security level, but this is not considered the best solution for
development experiments.
2. In AES encryption, In the process of encryption and decryption unbalanced
process.
for thousands of bits will provide an obvious time difference between the
4. AES cipher with secure 128-bit may not be appropriate for big data
applications and other modern big applications like secure cloud storage.
Therefore, these applications with huge data may need a larger algorithm with
5. In the last round mixcolumn has no effective role in the security factor whether
???????C. Recommendations
After this deep study, there are several important recommendations for future work
decryption process.
3. Eliminate the use of constant values. Use of constant values may increase
4. Key generation technique needs to implement with the real length for the long
keys that comprise 192-bits, 256-bits, and upper that increase the guessing
probability effectively
.
Conclusion
The As mentioned above, the Advanced Encryption Standard (AES) algorithm is one
of the most efficient algorithms and is widely supported and adopted on hardware
and software. Another notable thing about the AES algorithm is that the encryption
and decryption processes are very similar except for a few differences. The basic
aim of this study is to point out weak points and vulnerable points, in addition to
explaining the gaps in the structural elements that can be used in the AES structure.
This paper discussed the properties of the AES algorithm that are the best
alternatives by providing a set of basic diagnostic factors for negative aspects from
solutions for the development of a modern algorithm, the mentioned research also
includes some future recommendations for designers and academic specialists. The
AES algorithm certainly has some weaknesses, but they are minimal compared to its
strengths.