IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 65 ARM RECOGNITION: ENCRYPTION BY USING AES ALGORITHM Shraddha Satish Kashid 1 , Nagnath Hulle 2 1 Student, Electronics & Telecommunication, G.H.R.C.O.E & M, Ahmadnagar, Maharashtra, India 2 Professor, Electronics & Telecommunication, G.H.R.I.E.T, Pune, Maharashtra, India Abstract To provide the security of the Military confidential data we use encryption algorithm which take over reward of superior encryption algorithm. The proposed implementation using encryption algorithm was implemented on ARM 7 to encrypt and decrypt the confidential data on data storage devices such as SD card or Pen drive. The main objective of proposed implementation is to provide protection for storage devices. The ARM and encryption algorithm protect the data accessibility, reliability and privacy successfully. Since (AES) Advanced Encryption Standard algorithm is widely used in an embedded system or fixed organization. These AES algorithms are used for proper designs in defense for security. Keywords: Plain text, Cipher text, Data security, AES, Embedded System.ARM, storage device. ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION An approach of cryptography is the best way on our processor based communiqué system instead of conservative systems. Since such type of systems are not viable to contribute a universal mainframe. It is an alternative system to low priced and transportable systems to make sure for communication protection. By the varieties of power driven or motorized an embedded systems be able to ASIC, Digital Signal Processing (DSP) or Microcontroller. There are many trendy embedded work station so as to have a lion‟s split of the promotes. But the ARM7 is the widely used because of their less power utilization, has less price in market, under sized body shape [1]. A variable input in addition to building block dimension there is a symmetric block cipher called Rijindael. There are two Belgian cryptographers Vincent Rijmen and Joan Daemen. Since, Rijindael made up through two Belgian cryptographers Vincent Rijmen and Joan Daemen. In the year 2001, National Institute of Standards and Technology (NIST) won the Advanced Encryption Standard collection, which is known as AES. According to NIST the assortment of AES be completed on the platform as security, performance, efficiency, flexibility, and put into practice aptitude. In November2001, the elected algorithm, viz., Advanced Encryption Standard (AES), have replace DES and published as FIPS197 [2]. AES is demanding in implementation of Hardware and Software. Implementation of Hardware is ordinary into elevated rate function [3]. For embedded system application most required or highly popular implementation is Hardware implementation. The performance of software implementation is not so faithfully fast, it is so sluggish and taking long processor time, that becomes the system more leisurely. For AES implementation purpose in market there are various hardware platforms are available which is based on mostly processors or controllers among 8-bit terms to16-bit terms. By using a large bit processor or controller for the implementation of AES becomes a system more exclusive with high ending operations.[4] whereas implantation by using 8-bit processors/ controllers are very sophisticated and used for minimum cost and for low end applications. By using KEIL as a compiler tool on ARM processor LPC2148 is we proposed in this paper. The processor which we are using in this implementation is also capable of time measurement, means the time necessary for implementation of key opening out for various cycles of AES is deliberated. The time required for Encryption and Decryption is also calculated by ARM processor. Embedded C is using for coding of AES. Fig.1 General View of Secured Data Navigation