<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<article xlink="http://www.w3.org/1999/xlink" dtd-version="1.0" article-type="technology" lang="en"><front><journal-meta><journal-id journal-id-type="publisher">IJCRR</journal-id><journal-id journal-id-type="nlm-ta">I Journ Cur Res Re</journal-id><journal-title-group><journal-title>International Journal of Current Research and Review</journal-title><abbrev-journal-title abbrev-type="pubmed">I Journ Cur Res Re</abbrev-journal-title></journal-title-group><issn pub-type="ppub">2231-2196</issn><issn pub-type="opub">0975-5241</issn><publisher><publisher-name>Radiance Research Academy</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">2369</article-id><article-id pub-id-type="doi">10.7324/IJCRR.2017.9227</article-id><article-id pub-id-type="doi-url"/><article-categories><subj-group subj-group-type="heading"><subject>Technology</subject></subj-group></article-categories><title-group><article-title>Comparative Analysis of Different Modified Advanced Encryption Standard Algorithms over Conventional Advanced Encryption Standard Algorithm&#13;
</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Choudhury</surname><given-names>Kirti Prakash</given-names></name></contrib><contrib contrib-type="author"><name><surname>Kakoty</surname><given-names>Sangeeta</given-names></name></contrib></contrib-group><volume>)</volume><issue/><fpage>31</fpage><lpage>34</lpage><permissions><copyright-statement>This article is copyright of Popeye Publishing, 2009</copyright-statement><copyright-year>2009</copyright-year><license license-type="open-access" href="http://creativecommons.org/licenses/by/4.0/"><license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) Licence. You may share and adapt the material, but must give appropriate credit to the source, provide a link to the licence, and indicate if changes were made.</license-p></license></permissions><abstract><p>During the recent times, with the tremendous growth of digital data communication over computer network, information content security becomes a prime concern. Internet itself allows many security threats and those can easily corrupt the transferred data over network. Cryptography plays an important role by providing security for digital transmission of data over such insecure network. Cryptographic protocols scramble data into unreadable text which can be only read or decrypted by those possesses the associated key. The Advanced Encryption Standard (AES) is symmetric key algorithm which provides higher security with higher encryption speed and throughput but still modifications are going on to improve its performance. In this paper we survey and analyze several modifications on AES encryption techniques on different parameters and compare their performance with conventional AES.&#13;
</p></abstract><kwd-group><kwd>Cryptography</kwd><kwd> AES Algorithm</kwd><kwd> Decryption</kwd><kwd> Encryption</kwd><kwd> Block cipher</kwd><kwd> S-Box</kwd><kwd> Encoder</kwd><kwd> Key stream generator</kwd><kwd> Field Programmable Gate Array</kwd></kwd-group></article-meta></front></article>
