CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Text Encryption using Modified AES-2 Keys

by Zahraa K. Taha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 4
Year of Publication: 2016
Authors: Zahraa K. Taha
10.5120/ijca2016911388

Zahraa K. Taha . Text Encryption using Modified AES-2 Keys. International Journal of Computer Applications. 149, 4 ( Sep 2016), 27-31. DOI=10.5120/ijca2016911388

@article{ 10.5120/ijca2016911388,
author = { Zahraa K. Taha },
title = { Text Encryption using Modified AES-2 Keys },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 4 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number4/25986-2016911388/ },
doi = { 10.5120/ijca2016911388 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:53:49.792845+05:30
%A Zahraa K. Taha
%T Text Encryption using Modified AES-2 Keys
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 4
%P 27-31
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is an essential component of an organization in order to keep the information safe from various competitors. This project includes the complete step by step implementation of Advanced Encryption Technique, i.e. encrypting 128 bit data using the modification AES-2Keys. The encryption process consists of the combination of various classical techniques such as substitution, rearrangement and transformation encoding techniques. Simulation results have been achieved using MATLAB R2015a; Results prove that the proposed algorithm resists different type of attacks. As a conclusion, the addition of an arithmetic operation and two keys don’t effect on time of transmission data but makes the data more secure.

References
  1. A. Thesis, “IMAGE STEGANOGRAPHY WITH FORWARD ERROR CORRECTING CODES STRATEGY of Nahrain University in Partial Fulfillment of the Requirements for the Degree of by,” 2011.
  2. “IMPLEMENTATION OF HYBRID ENCRYPTION METHOD USING CAESAR ’ CHAROMIE AlL TAT WI A thesis submitted in partially fulfillment of the requirements for the award of degree of Bachelor of Computer Science ( Computer Systems & Networking ) Faculty of Computer System & Software Engineering Universiti Malaysia Pahang ( UMP ),” no. April, 2010.
  3. B. Vijay and J. Swathi, “Implementation of digital Steganography using image files-a Computational approach,” vol. 10, no. 5, pp. 6–10, 2014.
  4. M. A. Alia, A. A. Tamimi, and O. N. A. Al-allaf, “Cryptography Based Authentication Methods,” vol. I, pp. 22–24, 2014.
  5. C. Security, “Symmetric Key cryptosystem,” pp. 1–19, 2004.
  6. C. Hall and N. Ferguson, “Chapter 7 The Advanced Encryption Standard ( AES ),” no. November, pp. 58–73, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Advance Encryption Standard Cipher Text Plain Text.