Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Implementation of AES-128 Using Multiple Cipher Keys

verfasst von : Shivani Sachdeva, Ajay Kakkar

Erschienen in: Futuristic Trends in Network and Communication Technologies

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The growth in communication technology has connected billions of people all over the globe. The frequent sharing of data among individuals, organizations and even countries has raised concerns over the security and privacy of the communication process. A successful solution to this problem is Encryption, which converts the data to an unintelligible form. The keys for encrypting and decrypting the data are known only to authorised users. Thus, encryption can efficiently secure the communication process. The technique presented here is a modified form of Advanced Encryption Standard (AES) with multiple cipher keys of length 128 bits. AES uses symmetric cryptography which means that same keys are used for encryption and decryption. AES is known to be resistant against any known cryptanalytic attacks. Although it is known to be secure, various improvements have been suggested previously to further enhance the security of AES. The proposed technique enhances the security by using three cipher keys. By increasing the no. of keys, the encryption and decryption times are increased. Trading off with the increase in encryption time, advantage is gained because the attempt to hack the data will require drastic efforts and thus security is increased.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat PGP Corporation: An Introduction to Cryptography. Version 8.0, October 2002 PGP Corporation: An Introduction to Cryptography. Version 8.0, October 2002
3.
Zurück zum Zitat Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. 2nd edn. McGraw Hill Publication (2013) Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. 2nd edn. McGraw Hill Publication (2013)
4.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Design of Rijndael Cipher. Springer, Heidelberg (2002). ISBN 978-3-662-04722-4CrossRef Daemen, J., Rijmen, V.: The Design of Rijndael Cipher. Springer, Heidelberg (2002). ISBN 978-3-662-04722-4CrossRef
5.
Zurück zum Zitat Announcing the Advanced Encryption Standard (AES). FIPS 197, 26 November 2001 Announcing the Advanced Encryption Standard (AES). FIPS 197, 26 November 2001
6.
Zurück zum Zitat Tankard, C.: Encryption as the corner stone of big data security. J. Netw. Secur. 2017(3), 5–7 (2017)CrossRef Tankard, C.: Encryption as the corner stone of big data security. J. Netw. Secur. 2017(3), 5–7 (2017)CrossRef
7.
Zurück zum Zitat Garfinkel, S.L.: Public key cryptography. Computer 29(6), 101–104 (1996)CrossRef Garfinkel, S.L.: Public key cryptography. Computer 29(6), 101–104 (1996)CrossRef
8.
Zurück zum Zitat Tomhave, B.L.: Key management: the key to encryption. EDPACS J. 38(4), 12–19 (2009)CrossRef Tomhave, B.L.: Key management: the key to encryption. EDPACS J. 38(4), 12–19 (2009)CrossRef
10.
Zurück zum Zitat Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. IEEE Potentials 23(3), 28–34 (2004)CrossRef Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. IEEE Potentials 23(3), 28–34 (2004)CrossRef
11.
Zurück zum Zitat Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, India, pp. 617–624 (2015) Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, India, pp. 617–624 (2015)
12.
Zurück zum Zitat Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT-2005, Karachi, Pakistan, August 2005 Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT-2005, Karachi, Pakistan, August 2005
13.
Zurück zum Zitat Buchanan, W.J., Woodward, A., Helme, S.: Cryptography across industry sectors. J. Cyber Secur. Technol. 1, 1–18 (2017)CrossRef Buchanan, W.J., Woodward, A., Helme, S.: Cryptography across industry sectors. J. Cyber Secur. Technol. 1, 1–18 (2017)CrossRef
14.
Zurück zum Zitat Rachh, R.R., Ananda Mohan, P.V., Anami, B.S.: Efficient implementations for AES encryption and decryption. J. Circuits Syst. Signal Process. 31(5), 1765–1785 (2012)MathSciNetCrossRef Rachh, R.R., Ananda Mohan, P.V., Anami, B.S.: Efficient implementations for AES encryption and decryption. J. Circuits Syst. Signal Process. 31(5), 1765–1785 (2012)MathSciNetCrossRef
15.
Zurück zum Zitat Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Foundations of Software Engineering (FSE) (2010)CrossRef Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Foundations of Software Engineering (FSE) (2010)CrossRef
16.
Zurück zum Zitat Jingmei, L., Baodian, W., Xinmei, W.: One AES S-box to increase complexity and its cryptanalysis. J. Syst. Eng. Electron. 18(2), 427–433 (2007)CrossRef Jingmei, L., Baodian, W., Xinmei, W.: One AES S-box to increase complexity and its cryptanalysis. J. Syst. Eng. Electron. 18(2), 427–433 (2007)CrossRef
17.
Zurück zum Zitat Gong, J., Liu, W., Zhang, H.: Multiple lookup table-based AES encryption algorithm implementation. In: International Conference on Solid State Devices and Materials Science (2012). Phys. Procedia 25, 842–847 (2012)CrossRef Gong, J., Liu, W., Zhang, H.: Multiple lookup table-based AES encryption algorithm implementation. In: International Conference on Solid State Devices and Materials Science (2012). Phys. Procedia 25, 842–847 (2012)CrossRef
18.
Zurück zum Zitat Dara, M., Manochehri, K.: Using RC4 and AES key schedule to generate dynamic S-Box in AES. Inf. Secur. J.: Glob. Perspect. 23(1–2), 1–9 (2014) Dara, M., Manochehri, K.: Using RC4 and AES key schedule to generate dynamic S-Box in AES. Inf. Secur. J.: Glob. Perspect. 23(1–2), 1–9 (2014)
19.
Zurück zum Zitat Kumar, P., Rana, S.B.: Development of modified AES algorithm for data security. Int. J. Light. Electron Opt. 127(4), 2341–2345 (2016)CrossRef Kumar, P., Rana, S.B.: Development of modified AES algorithm for data security. Int. J. Light. Electron Opt. 127(4), 2341–2345 (2016)CrossRef
20.
Zurück zum Zitat Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., Qin, Z.: Multiple-layered securities using steganography and cryptography. Int. J. Comput. Appl. 36(3), 93–100 (2015) Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., Qin, Z.: Multiple-layered securities using steganography and cryptography. Int. J. Comput. Appl. 36(3), 93–100 (2015)
21.
Zurück zum Zitat Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multimode network for secure transmission. Int. J. Comput. Math. 89(16), 2123–2142 (2012)MathSciNetCrossRef Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multimode network for secure transmission. Int. J. Comput. Math. 89(16), 2123–2142 (2012)MathSciNetCrossRef
Metadaten
Titel
Implementation of AES-128 Using Multiple Cipher Keys
verfasst von
Shivani Sachdeva
Ajay Kakkar
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-3804-5_1