Science topics: AES

Science topic

# AES - Science topic

Explore the latest questions and answers in AES, and find AES experts.

Questions related to AES

One of the key problems with symmetric encryption is mammoth key generation and distribution problem. How is AES encryption algorithm key exchanged between sensor nodes in Contiki in the presence of a third party man in the middle attacker?

I have developed Activated Egg shell (AES) and Activated Orange Peel(AOP) through chemical activation process using H3PO4 and KOH. Thereafter applied in acid dye solution and effluent separately and in mixing (1:1) at same dose and conditions to remove dye. The efficacy of AOP was better in terms of removing dye. But the adsorbent that was applied through mixing (1:1) AES and AOP maintaining the dose constant performed exceedingly well surpassing the efficacy of AES and almost touching the efficacy of AOP in terms of removing acid dye.

What can be the possible chemistry behind that??

Humble request to share your ideas..if you have any...

Thanks in advance...

Good day Dear Researchers. Please I would want to ask a question on cryptography. Am trying to use hybrid cryptography to secure a system, that is 3DES AND AES. Is it possible to merge both algorithms to have a unique algorithm. Or we encrypt the plaintext using the first algorithm (3DES) then the output is encrypted again using the next algorithm (AES). PLEASE, WHICH IS BETTER AND WHY?? AND WHICH IS POSSIBLE AND WHY??

The AES Encryption algorithm (also known as the Rijndael algorithm) is a symmetric block cipher algorithm with a block/chunk size of 128 bits. It converts these individual blocks using keys of 128, 192, and 256 bits. Once it encrypts these blocks, it joins them together to form the ciphertext.

It is based on a substitution-permutation network, also known as an SP network. It consists of a series of linked operations, including replacing inputs with specific outputs (substitutions) and others involving bit shuffling (permutations).

In this tutorial, you will go through some of the standout features that AES offers as a globally standardized encryption algorithm.

The article is here: https://www.researchgate.net/publication/360059185_Gasaq_Provably_Secure_Key_Derivation/

Kindly visit the article, and share your honest thoughts in any communication style, even if you are not an expert. Feel free to submit your thoughts here, or under the comments section of the article.

**Looking forward to hear your thoughts. Let the fun debates begin!**

Best,

M. R.

Hello everyone,

I want to study the change in oxygen vacancies in gallium oxide using AES. I looked for papers, but couldn't find any. If you have any references please let me know.

While implementing DES and AES using python I wane to measure memory consumption,CPU utilization.

I was able to create a compound chaotic system which is given satisfying results so far when used to generate substitution boxes. However, I want to improve the values of NL, SAC, BIC, DP and LP. I need recommendations on how to improve these values. What I am thinking is to use values generated by the proposed chaotic system as an input for elliptic curve. Problem is that I am not much familiar with ECC. Please help in this regard. Thank you!

P.S. I want to achieve results much better than AES S-box in all criteria.

Can u please provide Matlab code for RSA and AES Encryption and Decryption of an Image

Common attacks such as meet in the middle attacks seem to rely on encryption of chosen blocks. What if the adversary can also decrypt arbitrary outputs adaptively?

Kindly provide related reference for justification of difference in elemental composition between ICP AES/ AAS and SEM-EDX

Dear Researchers, I am looking for AES Image encryption and Decryption source code functions. I have came across couple of source code files in Mathworks, but not fine with that. If any sources, let me know. Thanks in advance.

It is intresting to study and work with quantum computing. Wish to know available tools and packages for the same. This field has vital role in Quantum Cryptography also.

I mean to change the sequence of operation.

Actually, I want to know the process of the implementation of cryptanalysis on AES and Blowfish using the FPGA board, can you suggest to me what resources are available for this implementation

I'm looking for a vehicular mobility dataset. My research is about VANETs, and I'mlooking for vehicular mobility dataset.

I already found:

In the data set, is need have the position (coordinate X and Y) and the time of vehicle, how in the data set above.

.I need more. Can someone help me?

**My problem is :**

**I made a software that hides data on video files. I used the lsb technique. I can hide and unhide randomly and sequentially. I supported this with encryption techniques (RSA and AES). But I have problems with steganalysis, I cannot find a solution. I need to analyze the videos**

What will be the RTL design? How can it be implemented inoder to secure voice communication using AES128 bit encryption on FPGA.

May I determine the Si/Al ratio if I quantify these elements using ICP AES data from the precursor material and if I start the synthesis and control the cristalographic profile using DRX?

What measures can be taken to compare symmetrical encryption on IoT platforms? For example DES, AES, BlowFish, IDEA

I'm working on image encryption using AES algorithm in MATLAB (128 bits, works by processing blocks of 16 bytes, pure implementation), I'm having some difficulties like making a loup that takes every 4*4 matrix from the general matrix (n*m)

ex: I have an image size=17666, so (17666/16)= 1104*16 + 2, so 1105 ciphertexts corresponding to my 1104 first block encrypted as they are, followed by the last (2 bytes), so how to complete the last by filling in with zeros to obtain a block of 16 bytes.

Hello fellow researchers;

I want to generate the AES cipher Sboxes, and I couldn't figure out how to do it; I know that we take 4X4 bytes state matrix, where each byte can be expressed as a polynomial ; and then we calculate the multiplicative inverse of that byte mod x^8+x^4+x^3+x+1; then we multiply it by the matrix A and XOR it with a constant c.

A = [1 0 0 0 1 1 1 1] and c = [0

[1 1 0 0 0 1 1 1] 1

[1 1 1 0 0 0 1 1] 1

[1 1 1 1 0 0 0 1] 0

[1 1 1 1 1 0 0 0] 0

[0 1 1 1 1 1 0 0] 0

[0 0 1 1 1 1 1 0] 1

[0 0 0 1 1 1 1 1] 1]

And as I understand the multiplicative inverse of 1 is 1 and for 0 is not defined; so what would a byte turn into? for example x = 00011001, what is b such that x . b mod x^8+x^4+x^3+x+1 =1 ?

Hi, I would like to know the chemical composition of a thin film on a Si wafer.

I think MEIS and AES analysis are usually taken to know chemical composition.

As I know, MEIS is one of the most accountable ways to confirm chemical composition with depth profiling.

AES results are not corrected, so these need to be revised.(e.g. according to MEIS results)

Then, is it okay not to analyze AES? Please could anyone explain what the differences are between those two? Thank you.

WHAT IS A MDS MATRIX (MDS in AES finalists) and how can we achieve diffusion through it?

We all know that cipher(algorithm) design is publicly known and only key is hidden. So if everyone knows substitution, permutation details what is the point to add these layers in any symmetric key encryptions algorithm ?

I am looking for a theoretical or conceptual model of participation in mutual fund or microcredit group. Although there are several empirical research about drivers and determinants linked to participation in group scheme (AES, agricultural etc), I can't find a theoretical model. Any suggestion?

I know transaction costs are tricky to measure. I would like to know what's the best method to measure public transaction costs (TCs) related to agri-environmental schemes... I've read in some articles that it's possible to use the percentage of working time spent on a particular AES-related activity as a proxy... but then I struggle with the type of questions that can be asked to elicit such information... because when it comes to public TCs I assume it's not only the government who is involved but also all the other actors that intervene in the design of the scheme...

I mean an AES and Blowfish cryptography algorithm that can be used to encode and decode an image dataset

Please send me a personal message, if you have expertise in using surface characterization techniques such as "XPS/AES/SIMs "for corrosion related research. There is an opportunity for a collaborative work in this area.

When i compute the time complexity of cipher text policy attribute based encryption CP-ABE . I found it O(1) by tracing each step in code which mostly are assignments operations. Is it possible that the time complexity of CP-ABE be O(1) or i have a problem. the code that i used is the following, where ITERS=1.

public static List encrypt(String policy, int secLevel, String type,
byte[] data, int ITERS){
double results[] = new double[ITERS];
DETABECipher cipher = new DETABECipher();
long startTime, endTime;
List list = null;
for (int i = 0; i < ITERS; i++){
startTime = System.nanoTime();
list = cipher.encrypt(data, secLevel,type, policy);
endTime = System.nanoTime();
results[i] = (double)(endTime - startTime)/1000000000.0;
}
return list;
}
public List encrypt(byte abyte0[], int i, String s, String s1)
{
AccessTree accesstree = new AccessTree(s1);
if(!accesstree.isValid())
{
System.exit(0);
}
PublicKey publickey = new PublicKey(i, s);
if(publickey == null)
{
System.exit(0);
}
AESCipher.genSymmetricKey(i);
timing[0] = AESCipher.timing[0];
if(AESCipher.key == null)
{
System.exit(0);
}
byte abyte1[] = AESCipher.encrypt(abyte0);
ABECiphertext abeciphertext = ABECipher.encrypt(publickey, AESCipher.key, accesstree);
timing[1] = AESCipher.timing[1];
timing[2] = ABECipher.timing[3] + ABECipher.timing[4] + ABECipher.timing[5];
long l = System.nanoTime();
LinkedList linkedlist = new LinkedList();
linkedlist.add(abyte1);
linkedlist.add(AESCipher.iv);
linkedlist.add(abeciphertext.toBytes());
linkedlist.add(new Integer(i));
linkedlist.add(s);
long l1 = System.nanoTime();
timing[3] = (double)(l1 - l) / 1000000000D;
return linkedlist;
}
public static byte[] encrypt(byte[] paramArrayOfByte)
{
if (key == null) {
return null;
}
byte[] arrayOfByte = null;
try
{
long l1 = System.nanoTime();
cipher.init(1, skey);
arrayOfByte = cipher.doFinal(paramArrayOfByte);
long l2 = System.nanoTime();
timing[1] = ((l2 - l1) / 1.0E9D);
iv = cipher.getIV();
}
catch (Exception localException)
{
System.out.println("AES MODULE: EXCEPTION");
localException.printStackTrace();
System.out.println("---------------------------");
}
return arrayOfByte;
}
public static ABECiphertext encrypt(PublicKey paramPublicKey, byte[]
paramArrayOfByte, AccessTree paramAccessTree)
{
Pairing localPairing = paramPublicKey.e;
Element localElement1 = localPairing.getGT().newElement();
long l1 = System.nanoTime();
localElement1.setFromBytes(paramArrayOfByte);
long l2 = System.nanoTime();
timing[3] = ((l2 - l1) / 1.0E9D);
l1 = System.nanoTime();
Element localElement2 = localPairing.getZr().newElement().setToRandom();
Element localElement3 = localPairing.getGT().newElement();
localElement3 = paramPublicKey.g_hat_alpha.duplicate();
localElement3.powZn(localElement2);
localElement3.mul(localElement1);
Element localElement4 = localPairing.getG1().newElement();
localElement4 = paramPublicKey.h.duplicate();
localElement4.powZn(localElement2);
l2 = System.nanoTime();
timing[4] = ((l2 - l1) / 1.0E9D);
ABECiphertext localABECiphertext = new ABECiphertext(localElement4, localElement3, paramAccessTree);
ShamirDistributionThreaded localShamirDistributionThreaded = new ShamirDistributionThreaded();
localShamirDistributionThreaded.execute(paramAccessTree, localElement2, localABECiphertext, paramPublicKey);
timing[5] = ShamirDistributionThreaded.timing;
return localABECiphertext;
}
}
public ABECiphertext(Element element, Element element1, AccessTree
accesstree)
{
c = element;
cp = element1;
cipherStructure = new HashMap();
tree = accesstree;
}
public void execute(AccessTree accesstree, Element element,
ABECiphertext abeciphertext, PublicKey publickey)
{
pairing = publickey.e;
ct = abeciphertext;
PK = publickey;
countDownLatch = new
CountDownLatch(accesstree.numAtributes);
timing = 0.0D;
double d = System.nanoTime();
Thread thread = new Thread(new Distribute(abeciphertext,
accesstree.root, element));
thread.start();
try
{
countDownLatch.await();
long l = System.nanoTime();
timing = ((double)l - d) / 1000000000D;
synchronized(mutex)
{
}
}
catch(Exception exception)
{
exception.printStackTrace();
}
}

symmetric algorithm use different key size, is it depends on application? or ,

if we want to have highest security we use keys with greater length?

is it possible we extend key size in famous algorithm such as AES?

I thought AAS or AES would be best, and we would have to determine the main composition other than Zr which are Sn, Fe, Cr, (Fe+ Cr), O. Accuracy is crucial , is a standard necessary?

we know that in AES algorithm, number of Rounds is constant for example 9 round.

if the number of rounds is variable or dynamic, is it could increase strength of security and non-reversibility?

We did a lab and the purpose of the experiment was to determine potassium in tape water and mineral water. First we run an emission spectroscopy, then we started with second experiment with syrup and copper. Now I want to know why the potassium experiment was an emission , but copper was absorption? Could we do the opposite?

1. It would be better if the paper describes in detail about the modeling and simulation of all-electric ship(AES) loads (normal load as well as pulsed load).

2. What other software are usually used for AES system modeling and dynamics computation?( I am using MATLAB and Simulation)

3. It would be better if the paper is highly focused on power electronics system modeling and control used in the AES MVDC architecture.

5. Breaker-less and Superconducting DC systems would also do.

4. To be more specific, i want to integrate the PV system in the generation system (that demands for energy storage), so can anyone suggest me the similar type of project ongoing.

I am doing research in Mobile Cloud computing security. Under that, I am in need of explanation about how to integrate or how to use Diffie hellman and AES algorithm in a combined manner to improve security....

How do I prepare (before digestion) human tissue samples for ICP AES Analysis?

**What is best solvent to dissolve metal ions (Cu, Sr, Fe,Mg ) co-doped HAp to get homogeneous solution for ICP (AES) analysis. ?**

My phase I work combine AES and DSA algorithm together as pairing based (or) association based cryptography. Is it correct or not ?

Since, the AES cipher designed to work with 16-bit and 32-bit CPU

generate for (i = 0; i < `Nb; i = i + 1) begin: gen_loop_dec always @(state_in) begin: dec_colMix reg[(`Nb * 8) -1:0] r[3:0]; r[0] = state_in[(`Nb * 8) - 1:0]; r[1] = state_in[(`Nb * 16) - 1:(`Nb * 8)]; r[2] = state_in[(`Nb * 24) - 1:(`Nb * 16)]; r[3] = state_in[(`Nb * 32) - 1:(`Nb * 24)];

**dec_row0[((i + 1) * 8) - 1:(i * 8)] = gf_times_0E(r[0][((i + 1) * 8) - 1:(i * 8)]) ^ gf_times_0B(r[1][((i + 1) * 8) - 1:(i * 8)]) ^ gf_times_0D(r[2][((i + 1) * 8) - 1:(i * 8)]) ^ gf_times_09(r[3][((i + 1) * 8) - 1:(i * 8)])**; this generate loop is not synthesizable so can anybody tell me how to make synthesizale this particular line? loop is rolling 0 to 15.If not, is there any reason, based on prior research, to think it is significantly different from the original version ?

I observed in AES depth profile of some binary metal alloys(AB , B as solute), segregation of solute occurs . Is it only surface energy plays the role in driving the segregation ? i e lower surface energy component will segregate to surface.I also read atomic ordering , i e AA,BB,AB bonding inside the bulk and surface also has an influence on segregation. The system tries to attain the lowest free energy segregation occurs.I have seen some sub surface or near surface segregation of solute in some alloys also , how is it happening.Is it because when the segregant reaches the surface the component with more negative free energy for forming oxide(If it is the solvent metal) excludes or push the segregant back beneath the oxide layer and segregation enriched in that subsurface layer ? If any body can explain the predominant mechanisms associated with this and why diffusion and segregation are different process it will be so helpful

require an explanation supported with the steps for evaluate the RSA and AES algorithms in cloud computing , by using google engine or any cloud engine . the procedure to encrypt the data by algorithms (text file) and uploading / downloading to/from the google engine and then methods to evaluate the performance of algorithms in different metrics .

Me and one of my friends are working on

**AES**algorithm. We have understood how multiplicative inverse table is generated. Rijndael AES algorithm shows us how S-Box is generated through the**affine transformation**process. In the original algorithm they have multiply each byte of the state with an constant matrix and then add the result with another constant byte which is**0x63**to get the substitute value. We have understood how the constant matrix is generated as there is a formula to generate it but couldn't find out why**0x63**constant value is chosen. We have already gone through many resources but could not find any appropriate solution. Can any one help us in this regarding issue?My friend and colleague from Turin, Maurizio Ferraris, launched a kind of new theory, he called "Nuovo Realismo", or Neo-realism, in the path of Searle, but against his notion of collective intentionality in social ontology. Anyhow I haven't been able to grasp the bulk of the matter. Can someone of you explain me the Pitch of Ferraris Theory of Social Ontology ? Thanks

We have an Auger Electron Spectroscopy (AES) system (Perkin Elmer) and facing some issues related to electronics. Is anyone has the instruction manual for the AES. Please let me know.

Thanks and regards

-praveen

I had design multi-element structure for MIMO antenna system with desire resonating frequency of 3.5 GHz. But if the same structure is simulated with adaptive mesh option the resonating frequency shift to 3.6.

And when I use same structure in HFSS the resonating frequency is 3.7.

I wonder why this shift of resonating frequency is occurring...

Or Their should be some proper manual or notes about accuracy of CST microwave result.

And When I fabricated my antenna the resonating frequency was 3.8...

Your suggestion in this regard will be highly appreciated.

To investigate students' perception.

I use 20 closed-ended questions (multiple choice and 5-likert scale) and the 5 qualitative question like open-ended questions in a survey.

As I know survey could help me to gain data (even the perception, feelings) from the large number of students so that I can classify them according to the level of anxiety to conduct the in-depth interview further. So, Is the survey as I've described called qualitative survey even it comprise theclosed-ended questions? and Does it mean that I am completely doing the qualitative research?

Hope to see your response!

I'm looking for a measure of dogmatism conceived as a cognitive process.

Arena simulation: how to release all entities (not resources) after certain time and start over again as a new day? (5 day simulation)

Current state: Entities are in the queue and the process is carried over the next day when resources become available. How do I clear all entities and resources in the system each day?

There is a claim by a company that it has superior results. Is that a valid claim as I cant find a publication for that.

I am confused with lectures on XPS and AES by Richard Haasch and in general, I have a feeling that these two spectroscopic methods are basically same, a simular principle of technique. Something like Mössbauer spectroscopy

and Nuclear magnetic resonance spectroscopy.

Am I wrong? Is there any fundametal change between these two spectroscopies?

Hello everyone. Is there anyone who knows how to measure the throughput of the AES algorithm in tools??

around 5000 liters per day 20 % acetonitrile is generated as waste in a process, how to treat it . please guide

I'm looking for any literature that may explain lack of engagement with feedback as being partly explain by the teenage rebellion

Hello. i'm currently doing a final project about exploration for waste rubber sole. I'm looking further for chemical experiment method. Is there any chemical that could work as solvent for EVA (ethylene vinyl acetate), TPR (thermoplastic rubber), and TPU (thermoplastic polyurethane) ? and if there is , whether the chemical is easy to get on the market and easy to apply ? thankyou so much for your help and i do need the answer as soon as possible :)

The surfactant should work as good as SDS but possess a smaller MW.

Every gas sensor has an optimum temperature to work at. Some sensors work at room temperature others at elevated temperatures that reach for example 400 degree centigrade. My question: is there any principles to estimate working temperature of a gas sensor such as the kind of gas or the kind of sensing material?

As per USP 38 column temperature mentioned as Column temperature: Beginning of column, 50°; end of column, 35° for Lumenfantrine by HPLC This created lots of confusion could anyone clarify on this whether this is column oven temperature programming in method or kept different temperature on both end of column which is not feasible.

As the topic implies, when we perform CRISPR-Cas9 genome editing, PAM sequence located after the gene/DNA sequence of interest is essential. However, not all DNA sequences/genes have PAM sequence located downstream.

So how do we overcome this obstacle?

Thanks in advance for all the answers.

The inventors of the AES Rijndael state that there are no 'linear' mathematical relations between plaintext and the corresponding ciphertext when passed through Rijndael. How can you prove this statement? What is the process to prove or disprove the presence of a mathematical relation between a pair of plaintext and ciphertext of any cryptographic algorithm?

hello,

i would like to ask about lightweight cryptography (algorithm/ protocol) related to software not hardware and name it please ..

i see that there is no specific algorithm called lightweight its not specific like symmetric e.g. 3DES ,AES..etc or asymmetric cryptography e.g. RSA,Diffie hellman..etc

any reference will help me.

thank u..

Can the extreme cold interfere with the intracellular metal content analyzed?

As like compactifications of generalized (or classical) space can we define Lindelofization of generalized (or classical) topological spaces?

The AES algorithm uses the irreducible polynomial x^8+x^4+x^3+x+1 for multiplying with MDS and inverse MDS matrix for encryption and decryption, respectively.

Can we change this polynomial with another one?

Should we redesign the MDS matrix if polynomial is changed?

S-Boxes in AES and DES effect diffusion in these block cipher systems. I am trying to understand which aspects of these S-boxes attribute to the symmetry of the cipher system. (i.e. If encryption is in one direction, the decryption is in the reverse direction with the same key.)

I am doing analysis of image encryption schemes for a project and want to analyse the cryptographic security of different image encryption schemes. It would be helpful for me if I can get Matlab codes for some of the popular schemes, right now I am having an implementation of AES based image cipher.

Why are differential spectra preferred in AES analysis?

Composition maps may be obtained by EDS, AES and XPS techniques. Please indicate the right technique(s) for each of the following types of samples: thin film of oxides, polycrystalline metals, and nanometer-thick coatings of metal on a polymer.

I need some information about how I can do an AES algorithm in opnet simulation program. Can anyone help me?

I have done encryption of audio file using AES algorithm....the code works but it only takes first the 16 values of an audio file mean at every iteration. It will take 16 values, that means at the end I get a large number of cipher texts. For example, audio file size (8172) so , (8172/16) = 510. In the end, I get almost 510 ciphertexts. I'm confused about how to embed these ciphertexts. I have no idea what to do...it is not reading the whole file. Please help me sort out the issue...these are the changes which I have done in the demo file of AES algo.

[plaintext1,fs]= wavread('A1.wav','native');

plaintext1 = plaintext(1:16);

plaintext_hex = dec2hex( plaintext1);

plaintext = hex2dec (plaintext_hex);

p1 = [];

for i = 1;

plain = size(plaintext1/16);

i = i+1;

end

I have run this http://nevonprojects.com/aes-source-code-inmatlab/

AES on my audio file is giving me the error...... plaintext should be vector of 16 elements not a cell array. I have removed that error then I have compiled it again, now it is giving me the errors below......please help me in removing these error.

The errors are

??? Error using ==> bitxor

Inputs must be unsigned integers of the same class or

scalar doubles.

Error in ==> add_round_key at 14

state_out = bitxor (state_in, round_key);

Error in ==> cipher at 97

state = add_round_key (state, round_key);

Error in ==> aes_demo at 41

ciphertext = cipher (plaintext1, w, s_box, poly_mat, 1);

I tried to analyse Na level in dry fish (salted), using AES. But my all samples received max level reading, some one suggest to reduce sample weight or dilute sample and follow the secondary line.