Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

Implementation of AES-128 Using Multiple Cipher Keys

Authors : Shivani Sachdeva, Ajay Kakkar

Published in: Futuristic Trends in Network and Communication Technologies

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The growth in communication technology has connected billions of people all over the globe. The frequent sharing of data among individuals, organizations and even countries has raised concerns over the security and privacy of the communication process. A successful solution to this problem is Encryption, which converts the data to an unintelligible form. The keys for encrypting and decrypting the data are known only to authorised users. Thus, encryption can efficiently secure the communication process. The technique presented here is a modified form of Advanced Encryption Standard (AES) with multiple cipher keys of length 128 bits. AES uses symmetric cryptography which means that same keys are used for encryption and decryption. AES is known to be resistant against any known cryptanalytic attacks. Although it is known to be secure, various improvements have been suggested previously to further enhance the security of AES. The proposed technique enhances the security by using three cipher keys. By increasing the no. of keys, the encryption and decryption times are increased. Trading off with the increase in encryption time, advantage is gained because the attempt to hack the data will require drastic efforts and thus security is increased.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference PGP Corporation: An Introduction to Cryptography. Version 8.0, October 2002 PGP Corporation: An Introduction to Cryptography. Version 8.0, October 2002
3.
go back to reference Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. 2nd edn. McGraw Hill Publication (2013) Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. 2nd edn. McGraw Hill Publication (2013)
4.
go back to reference Daemen, J., Rijmen, V.: The Design of Rijndael Cipher. Springer, Heidelberg (2002). ISBN 978-3-662-04722-4CrossRef Daemen, J., Rijmen, V.: The Design of Rijndael Cipher. Springer, Heidelberg (2002). ISBN 978-3-662-04722-4CrossRef
5.
go back to reference Announcing the Advanced Encryption Standard (AES). FIPS 197, 26 November 2001 Announcing the Advanced Encryption Standard (AES). FIPS 197, 26 November 2001
6.
go back to reference Tankard, C.: Encryption as the corner stone of big data security. J. Netw. Secur. 2017(3), 5–7 (2017)CrossRef Tankard, C.: Encryption as the corner stone of big data security. J. Netw. Secur. 2017(3), 5–7 (2017)CrossRef
7.
8.
go back to reference Tomhave, B.L.: Key management: the key to encryption. EDPACS J. 38(4), 12–19 (2009)CrossRef Tomhave, B.L.: Key management: the key to encryption. EDPACS J. 38(4), 12–19 (2009)CrossRef
10.
go back to reference Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. IEEE Potentials 23(3), 28–34 (2004)CrossRef Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. IEEE Potentials 23(3), 28–34 (2004)CrossRef
11.
go back to reference Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, India, pp. 617–624 (2015) Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, India, pp. 617–624 (2015)
12.
go back to reference Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT-2005, Karachi, Pakistan, August 2005 Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT-2005, Karachi, Pakistan, August 2005
13.
go back to reference Buchanan, W.J., Woodward, A., Helme, S.: Cryptography across industry sectors. J. Cyber Secur. Technol. 1, 1–18 (2017)CrossRef Buchanan, W.J., Woodward, A., Helme, S.: Cryptography across industry sectors. J. Cyber Secur. Technol. 1, 1–18 (2017)CrossRef
14.
go back to reference Rachh, R.R., Ananda Mohan, P.V., Anami, B.S.: Efficient implementations for AES encryption and decryption. J. Circuits Syst. Signal Process. 31(5), 1765–1785 (2012)MathSciNetCrossRef Rachh, R.R., Ananda Mohan, P.V., Anami, B.S.: Efficient implementations for AES encryption and decryption. J. Circuits Syst. Signal Process. 31(5), 1765–1785 (2012)MathSciNetCrossRef
15.
go back to reference Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Foundations of Software Engineering (FSE) (2010)CrossRef Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Foundations of Software Engineering (FSE) (2010)CrossRef
16.
go back to reference Jingmei, L., Baodian, W., Xinmei, W.: One AES S-box to increase complexity and its cryptanalysis. J. Syst. Eng. Electron. 18(2), 427–433 (2007)CrossRef Jingmei, L., Baodian, W., Xinmei, W.: One AES S-box to increase complexity and its cryptanalysis. J. Syst. Eng. Electron. 18(2), 427–433 (2007)CrossRef
17.
go back to reference Gong, J., Liu, W., Zhang, H.: Multiple lookup table-based AES encryption algorithm implementation. In: International Conference on Solid State Devices and Materials Science (2012). Phys. Procedia 25, 842–847 (2012)CrossRef Gong, J., Liu, W., Zhang, H.: Multiple lookup table-based AES encryption algorithm implementation. In: International Conference on Solid State Devices and Materials Science (2012). Phys. Procedia 25, 842–847 (2012)CrossRef
18.
go back to reference Dara, M., Manochehri, K.: Using RC4 and AES key schedule to generate dynamic S-Box in AES. Inf. Secur. J.: Glob. Perspect. 23(1–2), 1–9 (2014) Dara, M., Manochehri, K.: Using RC4 and AES key schedule to generate dynamic S-Box in AES. Inf. Secur. J.: Glob. Perspect. 23(1–2), 1–9 (2014)
19.
go back to reference Kumar, P., Rana, S.B.: Development of modified AES algorithm for data security. Int. J. Light. Electron Opt. 127(4), 2341–2345 (2016)CrossRef Kumar, P., Rana, S.B.: Development of modified AES algorithm for data security. Int. J. Light. Electron Opt. 127(4), 2341–2345 (2016)CrossRef
20.
go back to reference Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., Qin, Z.: Multiple-layered securities using steganography and cryptography. Int. J. Comput. Appl. 36(3), 93–100 (2015) Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., Qin, Z.: Multiple-layered securities using steganography and cryptography. Int. J. Comput. Appl. 36(3), 93–100 (2015)
21.
go back to reference Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multimode network for secure transmission. Int. J. Comput. Math. 89(16), 2123–2142 (2012)MathSciNetCrossRef Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multimode network for secure transmission. Int. J. Comput. Math. 89(16), 2123–2142 (2012)MathSciNetCrossRef
Metadata
Title
Implementation of AES-128 Using Multiple Cipher Keys
Authors
Shivani Sachdeva
Ajay Kakkar
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-3804-5_1

Premium Partner