International Journal of Computer Science Trends and Technology (IJCST) – Volume 3 Issue 6, Nov-Dec 2015 ISSN: 2347-8578 www.ijcstjournal.org Page 57 RESEARCH ARTICLE OPEN ACCESS Comparative Analysis of Parallel AES Algorithm with Pipelined AES Algorithm Tannu Bala [1] , Yogesh Kumar [2] Department of Computer Science PTU/ Bhai Gurdas Institute of Engineering & Technology Sangrur - India ABSTRACT AES (Advance Encryption Standard) algorithm is very popular and robust encryption algorithm out of all other available encryption algorithms. AES is considered as highly secure and almost unbreakable encryption standard. AES carries a major drawback of taking high execution time and lower throughput. AES has comparatively lower throughput and high time for all kinds of data. AES algorithm will be also modified for its source code bottlenecks. It is very important to remove the bottlenecks from the execution flow of the algorithms to improve their performance. AES can be possibly modified in some ways for its performance enhancements to improve its performance. According to our studies, we have found some possible options to improve the performance of AES algorithm. Keywords:- AES Algorithm, Parallel Data Transition, encryption speed, decryption speed, encryption Time, decryption Time. I. INTRODUCTION It is going to be good to understand the concept of information. To understand cryptography term, an issues related to information security is necessary to be clear. A set of mechanisms and protocols had created and based on this physical documented information was secured. Just by applying mathematical algorithms and protocols we do not achieve security, to get the desired result we have to require obedience of laws and procedural techniques. For example, sealed envelope shows the privacy of letter delivered by an accepted mail service [1]. Fig 1: working process of Cryptographic algorithm Cryptography is necessary in data and telecommunications, when communication is done through any un-trusted medium, which may be any type network, specially the Internet. Along with user authentication cryptography is also used for the protection of data from thief. Basically three types of cryptographic schemes are used to achieve this goal: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions. In all cases, plaintext is referred as input data or initial unencrypted data. This encrypted information is further known as cipher-text, which will later decrypt into plaintext [2]. With change of time the way to store information has not changed. In previous days, paper was used to store information and transmit, but currently technology enhanced, information domiciled on magnetic media (CDs and Hard Disks) and is transmitted via wireless and telecommunications systems. This gravely modification makes copy and alter information terribly easier. Multiple identical copies of same information are generated and keep electronically. With information on paper, this can be rather more troublesome. The knowledge that is keep and transferred through electronic media or channel needs a lot of security. In securing the information, signature is the one among the most and basic technique (tool). Signature is that the building blocks for several different services like non-repudiation, information origin authentication and identification. Signature is utilized to identify, authorize, and validate the individual person therefore it's to be distinctive. With the help of electronically stored information the construct of a signature has got to be updated time by time for security of the knowledge [2]. If we have made a will or made a document, and signed it, this means it is your responsibility, it is - say for example, it is a kind of authorization that you have a cheque and you sign over it- in other words you say that; it is my signature, that I am permitting this transaction, and I have knowledge of this transaction [3]. Encryption Key Decryption Plaintext Ciphertext