The Rijndael block encryption algorithm was chosen by NIST as the new Advanced Encryption Standard (AES). Since the DES is no longer considered as a standard, the industry will now rush to implement AES for cryptographic implementations in its products. Being the strongest encryption algorithm that has ever been broken so far, it comes with overhead costs like performance. Several hardware implementations for AES exist, but they have their own pros and cons and there is a lot of work being done in the area to achieve perfection.
The Cryptographic Algorithm is the most widely used in the world to protect information. Cryptography is the art of secret writing, followed by the assurance of authenticating important messages and messages and protecting valid attack systems. It comprises the process of encryption and decryption associated with each one with a key that is supposed to be kept secret. We have implemented the RC6 Algorithm. This is considered as a safe and elegant option for AES due to its simplicity, security, performance and efficiency. RC6 supports 32-bit and 64-bit processing. An eight-step algorithm is used to encrypt the 64-bit plain text block. The encrypted data are decrypted by performing the inverse algorithm on it.
In recent years, we have witnessed the growing deployment of applications with a crucial need for security features such as confidentiality, authentication, non-rejection and stamping time. These include, for example, e-commerce, secure e-mail, e-banking and other security functions. A cryptographic algorithm works with a key - a word, number, or phrase - to encrypt plain text. The same encrypted text encrypts different ciphertext using different keys. The security of encrypted data depends mainly on two things: the strength of the cryptographic algorithm and the secret of the key. A cryptographic algorithm is all possible keys and all the protocols that make it work comprise a cryptosystem. In conventional cryptography, also called secret key or symmetric key encryption, a single key is used for both encryption and decryption. In asymmetric cryptography, the encryption and decryption keys are different on both sides.