My Project Proposal For BSCS degree


Simulation of Five Finalist Encryption Algorithms of AES













Proposed by:

Faisal Latif (BS(CS) 2004-08 Roll # 33)

Sadaqat Bilal (BS(CS) 2004-08 Roll # 14)











Department of Computer Sciences & Information Technology Azad Jammu & Kashmir Mirpur Campus.


INTRODUCTION:-
AES is already simulated, which takes 128 bits input of data and key. Now we are doing to give a simulation of following five ciphers/ de ciphers algorithms in single simulation software.
 Rijndael
 Mars
 Serpent
 Twofish
 RC6

EXISTING SYSTEM:-

The current Digital Encryption Standard (DES) does no longer satisfy the need for data security because of its short 56-bit key. Such short keys can today be broken by brute force attacks (trying of all keys). The National Institute of Standards and Technology (NIST) has initiated a process to develop a Federal Information Processing Standard (FIPS) for the Advanced Encryption Standard (AES), specifying an encryption algorithm to replace the Data Encryption Standard (DES) which expired in 1998. NIST has solicited candidate algorithms for inclusion in AES, resulting in fifteen official candidate algorithms of which five have been selected as finalists. Unlike DES, which was designed specifically for hardware implementation, one of the design criteria for the AES candidate algorithms is that they can be efficiently implemented in both hardware and software. Thus, NIST has announced that both hardware and software performance measurements will be included in their efficiency testing.
Current simulated software use only Rijndael algorithm for encryption and decryption.




PROPOSED SYSTEM: -
All five AES encryption techniques will be Simulate in C language. After simulating all the techniques, we will be able to run all five algorithms in one simulated software. And all five algorithms will show their performance and there cipher/ de cipher work.

OBJECTIVES:-
This software is specifically designed for a government organization. Our project is to only simulate the above mentioned encryption techniques and then run them on one simulated software. As no input/output devices are provided to us, so rest of the work will be done by the I.T department of that organization.

SCOPE:-
Five encryption techniques, selected by National Institute of Standards and Technology (NIST), are:
 Rijndael
 Mars
 Serpent
 Twofish
 RC6
Our project is to simulate these algorithms, select the most efficient algorithm. Keys for these ciphers come in one of three lengths; 128,192 and 256 bits. We will implement only with 256 bit key length. AES is a block cipher that means the plain text will be encrypted block by block and the size of each block will be 4 words (128 bits).
Input/Output is dependent on external devices and that is out of the scope of our project that is why we will assume a string as a plain text.









TOOLS / IMPLEMENTATION:-
Tools, which we may use for our project.
• C language is used to develop this software. All the coding will be done in the same language. Microsoft Visual Studio 6.0 is used for this purpose.
• Code Composer Studio 3.1 will be used to calculate the time of the five algorithms and to provide the simulation.
• Microsoft Word is used for documentation purpose

REQUIRED HARDWARE:-
The following hardware is required to develop the software.
Pentium III or higher
128 MB RAM or higher
20 GB Hard Disk or higher.

0 comments: