Main Article Content
Review of the Advanced Encryption Standard System Performance on Hidden Data
Abstract
As the digital landscape continues to rapidly evolve, fueled by the proliferation of multimedia
applications, ensuring the security of data transmission has become a paramount concern.
Cryptography emerges as a stalwart guardian in this dynamic environment, offering a robust
approach to safeguarding sensitive information. Despite significant strides in enhancing security
services and processes over the years, the relentless march of technological progress demands a continual reassessment of strategies for protecting data in transit. Cryptography, with its ability to
transform plaintext into ciphertext through encryption procedures, remains a cornerstone of modern
data security frameworks. This paper reviews a series of data security methods, focusing on the
performance of the Advanced Encryption Standard (AES) system in concealing data. A structured
approach is employed to actualize the reviewed methods, with cryptographic techniques scrutinized in
the literature. Analysis is conducted to obtain reviewed literature, evaluating the strengths and
limitations of different cryptographic methods. The practical application of cryptography techniques
is assessed across various literatures, identifying potential implications for enhancing data security in
the modern digital environment. It is observed that encryption techniques are utilized to protect data
over the internet and other forms of data transmission, yet brute force methods can sometimes easily
identify hidden data. This paper suggests that combining two or more algorithms can lead to better
data security. Specifically, combining the AES algorithm with other algorithms such as Proxy reencryption, Honey encryption, and N-th degree Truncated Polynomial Ring Unit (NTRU) can
enhance the data encryption and decryption process.