The AES encryption algorithm is a block cipher that uses an encryption key and several encryption cycles A block cipher is an encryption algorithm that works on a single block of data at a time. In the case of standard AES encryption the block is 128 bits or 16 bytes long. The term "loops" refers to the way the encryption algorithm mixes the data by recoding it fourteen times depending on the length of the key. ENCRYPTION KEY SAES encryption uses a single key as part of the encryption process. The key is 128 bits. The term 128-bit encryption refers to the use of a 128-bit encryption key. With AES both encryption and decryption are performed using the same key. This includes the symmetric encryption algorithm. The encryption algorithm that uses two different keys, a public key and a private key, is called asymmetric encryption algorithm. An encryption key is simply a binary string of data used in the encryption process. Since the same encryption key is used to encrypt and decrypt data, it is important to keep it secret and use hard-to-guess keys.PSEUDOCODECRYPTIONFor the decryption process, the reverse process of pseudocode is followed with all the rounds taken.VII. HASHHA1 IMPLEMENTATIONS is a hashing algorithm which stands for Secure Hashing Algorithm, it is widely used in many applications including SSL,TLS,SSH. ALGORITHM DESCRIPTION SHA1Padding that pads the message with a single one followed by zeros until the final block has 448 bits. Add the size of the original message as an unsigned 64-bit integer. Initializes the 5 hash blocks (h0, h1, h2, h3, h4) to the specific constants defined in the SHA1 standard. Hash for each 512-bit block. Assign a......half of the paper......ing transmission of packets over multiple associated links.X. REFERENCES[1] Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Common. Survival Tutt., vol. 10, no. 1–4, pp. 6–28, 2008.[2] L. Schnauzer and V. D. Gligor, “A key management scheme for distributed sensor networks,” in Proc. 2002 ACM CCS, pp. 41–47.[3] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” in IEEE SP, pp. 197–213, 2003.[4] W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using implementation knowledge,” in Proc. 2004 IEEE INFOCOM, pp. 586–597.[5] C. Castelluccia and A. Spognardi, “A robust key pre-distribution protocol for multi-phase wireless sensor networks,” in Proc. 2007 IEEE Securecom, pages 351–360.[6] D. Liu and P. Ning, “Establishing Wise Couple Keys
tags