{"title":"Avoiding Lookup Table in AES Algorithm","authors":"Ragiel Hadi Prayitno, S. Sudiro, S. Madenda","doi":"10.1109/ICIC54025.2021.9632897","DOIUrl":null,"url":null,"abstract":"This article describes the AES encryption and decryption process without using lookup tables in the MixColumns transformation. The encryption process consists of transforming subbytes, shiftrows, mixcolumns and addroundkey. The process was carried out for 10 rounds, but in round 10 the mixcolumns transformation was not carried out. The decryption process consists of inverse mixcolumns, inverse shiftrows, inverse subbytes and addroundkey. In this study, the AES encryption and decryption process was carried out using two methods, namely based on the lookup table and without using the lookup table on the MC/IMC transformation. The method in this article is applied to Matlab software. The experimental results show that the encryption and decryption process using a lookup table is slower than the method without a lookup table. The encryption process without a lookup table on the MC transformation takes 0.091 seconds while using a lookup table takes 0.399 seconds. The decryption process without a lookup table on the IMC transformation takes 0.149 seconds while using a lookup table takes 0.206 seconds.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Sixth International Conference on Informatics and Computing (ICIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIC54025.2021.9632897","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This article describes the AES encryption and decryption process without using lookup tables in the MixColumns transformation. The encryption process consists of transforming subbytes, shiftrows, mixcolumns and addroundkey. The process was carried out for 10 rounds, but in round 10 the mixcolumns transformation was not carried out. The decryption process consists of inverse mixcolumns, inverse shiftrows, inverse subbytes and addroundkey. In this study, the AES encryption and decryption process was carried out using two methods, namely based on the lookup table and without using the lookup table on the MC/IMC transformation. The method in this article is applied to Matlab software. The experimental results show that the encryption and decryption process using a lookup table is slower than the method without a lookup table. The encryption process without a lookup table on the MC transformation takes 0.091 seconds while using a lookup table takes 0.399 seconds. The decryption process without a lookup table on the IMC transformation takes 0.149 seconds while using a lookup table takes 0.206 seconds.