CFP last date
22 April 2024
Reseach Article

A New Approach on AES to Increase the Resistivity of the Cipher System

by Ranjana Manohar Nayak, Radhakrishna Dodmane
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 14
Year of Publication: 2020
Authors: Ranjana Manohar Nayak, Radhakrishna Dodmane
10.5120/ijca2020920626

Ranjana Manohar Nayak, Radhakrishna Dodmane . A New Approach on AES to Increase the Resistivity of the Cipher System. International Journal of Computer Applications. 175, 14 ( Aug 2020), 26-30. DOI=10.5120/ijca2020920626

@article{ 10.5120/ijca2020920626,
author = { Ranjana Manohar Nayak, Radhakrishna Dodmane },
title = { A New Approach on AES to Increase the Resistivity of the Cipher System },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2020 },
volume = { 175 },
number = { 14 },
month = { Aug },
year = { 2020 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number14/31523-2020920626/ },
doi = { 10.5120/ijca2020920626 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:03.172846+05:30
%A Ranjana Manohar Nayak
%A Radhakrishna Dodmane
%T A New Approach on AES to Increase the Resistivity of the Cipher System
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 14
%P 26-30
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s era, we are facing security- related challenges during information relocation. Amongst the transmitter and receiver, most of the sensitive information is not secured. Encryption and decryption used to secure the information of data’s. In the encryption, the original text is converted into indecipherable form. Different techniques can be used to safeguard the information from unlicensed access. The proposed work aims to provide confidentiality through Advanced Encryption Standard (AES). This paper mainly emphases on the security of the existing AES algorithm and aim to heighten the level security of this process through the addition in the existing AES algorithm by including a new operation called Math Trick. The proposed system moderately increased security compared to the existing system.

References
  1. Guy-Armand Yandji, Lui Lian Hao, Amir-Eddine Youssouf, Jules Ehoussou, “RESEARCH ON A NORMAL FILE ENCRYPTION AND DECRYPTION” in proceedings of IEEE 2011.
  2. Al-Mamun, Abdullah, Shawon SM Rahman, Tanvir Ahmed Shaon, and Md Alam Hossain. "SECURITY BY MODIFYING SBox WITH AN ADDITIONAL BYTE."
  3. “Specification for the ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication 197 November 26, 2001 K. Elissa,
  4. Saberi, I. Shojaie, B. ; Salleh, M. “Enhanced Key Expansion for AES-256 by using Even-Odd method”, Research and Innovation in Information Systems (ICRIIS), 23-24 Nov. 2011
  5. Liam Keliher ,“Substitution-Permutation Network Cryptosystems Using Key-Dependent Boxes”, http://www.researchgate.net/publication/2822741, ARTICLE • NOVEMBER 1997
  6. Krishnamurthy G N and V Ramaswamy, "Making AES Stronger: AES with Key Dependent S-Box." International Journal of Computer Science and Network Security,VOL.8 No.9, September 2008
  7. Mohan H. S. and A Raji Reddy, “Performance Analysis of AES and MARS Encryption Algorithms”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011
  8. Manisha S. Mahindrakar’ “Evaluation of Blowfish Algorithm based on Avalanche Effect”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 4 Issue 1 June 2014
  9. Akash Kumar Mandal1, Mrs. Archana Tiwari, “Analysis of Avalanche Effect in Plaintext of DES using Binary Codes”, International Journal of Security, Privacy and Trust Management, Volume 1, Issue 3, September –October 2012
  10. SriramRamanujam and MarimuthuKaruppiah, “Designing an algorithm with high Avalanche Effect”, International Journal of Computer Science and Network Security, VOL.11 No.1, January 2011
  11. K.Anchugam and M.Tamilselvi “New Data Encryption Standard Algorithm” , International Journal of Computer Science and Network Security, VOL.13 No.4, April 2013
  12. M.Abirami, S. Chellaganeshavalli, “Performance Analysis of AES and Blowfish Encryption Algorithm”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 11, November 2013
  13. AbdulkarimAmerShtewi, BahaaEldin M. Hasan and Abd El Fatah .A. Hegazy,” An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems”, International Journal of Computer Science and Network Security, VOL.10 No.2, February 2010
  14. Nidhi Singhal and J.P.S.Raina, Comparative Analysis of AES and RC4 Algorithms for Better Utilization, International Journal of Computer Trends and Technology-July to Aug Issue 2011
  15. M.Abirami, S. Chellaganeshavalli, “Performance Analysis of AES and Blowfish Encryption Algorithm”, International Journal of Innovative Research in Science,Engineering and Technology, Vol. 2, Issue 11, November 2013
  16. Chandra Prakash Dewangan,Shashikant Agrawal, A Novel Approach to Improve Avalanche Effect of AES Algorithm, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 8, October 2012
  17. Amish Kumar , Mrs. Namita Tiwari, “EFFECTIVE IMPLEMENTATION AND AVALANCHE EFFECT OF AES”, International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 3/4, August 2012.
  18. Sweta K Parmar, K.C Dave, "Implementation of data Encryption and Decryption Algorithm for Information security", Proceedings of SARC-IRAJ International Conference, 14th July 2013, Delhi, India, ISBN: 978-93- 82702-21-4.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Advanced Encryption Standard Math Trick Security.