Skip to main content
Article
Securing Files Using AES Algorithm
International Journal of Computer Science and Information Technologies (2013)
  • Aditya Rayarapu
  • Abhinav Saxena
  • N.Vamshi Krishna
  • Diksha Mundhra
Abstract
Nowadays information systems play a vital role for organizations and individuals, in which the security is given the high priority. Often, solutions are developed for very similar problems over and over again. In this paper, the files are encrypted and stored in the disk by using a secret key and asking for the same secret key while decrypting. The algorithm used in this system is Advance Encryption Standard (AES). AES-128, AES-192 and AES-256 represents the encryption key sizes (128 bits, 192 bits and 256 bits) and in their number of rounds (10, 12, and 14, respectively) required to open the vault that is wrapped around the data.[1] In this algorithm, encryption is done by interchanging some of the characters with key and data in it. The encrypted files are set to be read only, so that the data in the files cannot be tampered. The main feature of the system is disabling the delete option in the right click menu for the encrypted files. This provides more security for the files on the disk.
Keywords
  • Encryption,
  • Decryption,
  • Multiple Files,
  • Encrypted Files,
  • Decrypted Files,
  • Advanced Encryption Standards (AES),
  • Security,
  • Secret Key.
Publication Date
July, 2013
Publisher Statement
References

Key sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128, 192, and 256-bit key sizes are specified in the AES standard.

csrc.nist.gov/publications/fips/fips197/fips-197.pdf

"Efficient software implementation of AES on 32-bit platforms". Lecture Notes in Computer Science: 2523. 2003

en.wikipedia.org/wiki/Information_security#cite_note-1.

Singh, Kirat Pal, Shivani Parmar, and Dilip Kumar. “Design of High Performance MIPS Cryptography Processor.” International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Springer Berlin Heidelberg, 2013.
Citation Information
Aditya Rayarapu, Abhinav Saxena, N.Vamshi Krishna and Diksha Mundhra. "Securing Files Using AES Algorithm" International Journal of Computer Science and Information Technologies (2013)
Available at: http://works.bepress.com/sakshi-sharma/2/
Creative Commons license
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC International License.