Design and synthesis of Dual Key based AES Encryption

被引:0
|
作者
Abhiram, L. S. [1 ]
Gowrav, L. [1 ]
Kumar, Punith H. L. [1 ]
Sriroop, B. K. [1 ]
Lakkannavar, Manjunath C. [1 ]
机构
[1] MS Ramaiah Inst Technol, Dept Elect & Commun, Bangalore, Karnataka, India
关键词
AES; S-Box; Dual Key;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key aspect of communication is security. Encryption of information to make it inaccessible to unauthorized recipients is a main area in network security. AES encryption is one of the most secure encryption algorithms. But with improving technology, attacks which can be used for easy cryptanalysis of encrypted information have been developed. One of the main reasons for vulnerability of AES encryption algorithm is the use of static S-Boxes. Also with attempts made to tap the key, AES has become more vulnerable to cryptanalysis attacks. Static S-Boxes make it very easy for reverse engineering which form the basis of Super S-Box attack. Hence there have been a lot of proposals for generation of S-Boxes which are key dependent. Majority of those algorithms involve probabilistic methods which are very complicated for hardware implementation. In this paper, we present a synthesizable algorithm which involves the use of conventional bitwise operations for generation of key dependent S-Boxes. Also a dual key based AES is presented in the paper which is FPGA implementable. The algorithm is reliable in terms of security and also suitable for hardware implementation. Mathematical analyses have been carried out on the algorithm to compute the reliability.
引用
收藏
页码:85 / 88
页数:4
相关论文
共 50 条
  • [41] Research on Encryption Model Based on AES and EGG in RFID
    Lin, Yiran
    Kang, Kaige
    Shi, Yue
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 9 - 13
  • [42] Research on Improved Data Encryption Algorithm Based on AES
    Chen, Rumeng
    Cheng, Xiaohui
    ICIIP'18: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING, 2018, : 198 - 201
  • [43] The Dual Mapping Key Variable Voice Encryption Algorithm
    Zhou, Hui
    Wang, Zhijun
    Yan, Bing
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3083 - 3090
  • [44] A Selective Encryption Algorithm Based on AES for Medical Information
    Oh, Ju-Young
    Yang, Dong-Il
    Chon, Ki-Hwan
    HEALTHCARE INFORMATICS RESEARCH, 2010, 16 (01) : 22 - 29
  • [45] A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling
    Murthy, Kandala Sree Rama
    Manikandan, V. M.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2022, 13 (05) : 433 - 440
  • [46] Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR)
    S. Srisakthi
    A. P. Shanthi
    Wireless Personal Communications, 2020, 114 : 3003 - 3015
  • [47] Fault based cryptanalysis of the advanced encryption standard (AES)
    Blömer, J
    Seifert, JP
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 162 - 181
  • [48] ALE: AES-Based Lightweight Authenticated Encryption
    Bogdanov, Andrey
    Mendel, Florian
    Regazzoni, Francesco
    Rijmen, Vincent
    Tischhauser, Elmar
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 447 - 466
  • [49] Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR)
    Srisakthi, S.
    Shanthi, A. P.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3003 - 3015
  • [50] Master Key Updatable Attribute-Based Encryption on the Dual Pairing Vector Space
    Kawai, Yutaka
    PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 226 - 230