Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Modified Advanced Encryption Standard Algorithm for Information Security

View through CrossRef
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that were aimed at securing information while using AES is still being undermined by the activities of attackers This has further necessitated the need for researchers to come up with ways of enhancing the strength of AES. This article presents an enhanced AES algorithm that was achieved by modifying its SubBytes and ShiftRows transformations. The SubBytes transformation is modified to be round key dependent, while the ShiftRows transformation is randomized. The rationale behind the modification is to make the two transformations round key dependent, so that a single bit change in the key will produce a significant change in the cipher text. The conventional and modified AES algorithms are both implemented and evaluated in terms avalanche effect and execution time. The modified AES algorithm achieved an avalanche effect of 57.81% as compared to 50.78 recorded with the conventional AES. However, with 16, 32, 64, and 128 plain text bytes, the modified AES recorded an execution time of 0.18, 0.31, 0.46, and 0.59 ms, respectively. This is slightly higher than the results obtained with the conventional AES. Though a slightly higher execution time in milliseconds was recorded with the modified AES, the improved encryption and decryption strength via the avalanche effects measured is a desirable feat.
Title: Modified Advanced Encryption Standard Algorithm for Information Security
Description:
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks.
Efforts that were aimed at securing information while using AES is still being undermined by the activities of attackers This has further necessitated the need for researchers to come up with ways of enhancing the strength of AES.
This article presents an enhanced AES algorithm that was achieved by modifying its SubBytes and ShiftRows transformations.
The SubBytes transformation is modified to be round key dependent, while the ShiftRows transformation is randomized.
The rationale behind the modification is to make the two transformations round key dependent, so that a single bit change in the key will produce a significant change in the cipher text.
The conventional and modified AES algorithms are both implemented and evaluated in terms avalanche effect and execution time.
The modified AES algorithm achieved an avalanche effect of 57.
81% as compared to 50.
78 recorded with the conventional AES.
However, with 16, 32, 64, and 128 plain text bytes, the modified AES recorded an execution time of 0.
18, 0.
31, 0.
46, and 0.
59 ms, respectively.
This is slightly higher than the results obtained with the conventional AES.
Though a slightly higher execution time in milliseconds was recorded with the modified AES, the improved encryption and decryption strength via the avalanche effects measured is a desirable feat.

Related Results

Improved Structure of Data Encryption Standard Algorithm
Improved Structure of Data Encryption Standard Algorithm
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...
Efficient Hybrid Cryptography Algorithm
Efficient Hybrid Cryptography Algorithm
Cryptography is the operation of transferring a specific message to prevent an attacker from accessing the contents of a message. To increase the level of security in any communica...
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
In the context of the rapid advancement of global informatization, network security is facing unprecedented challenges, among which encryption technology, as the core means to ensu...
Modified AES-128 with Boundary-Based Splitting and Dynamic Output Encryption
Modified AES-128 with Boundary-Based Splitting and Dynamic Output Encryption
Encryption is essential for maintaining the confidentiality, integrity, and authenticity of data in today’s digital landscape. As cyber threats continue to escalate, the implementa...
Assuring encryption and security in cloud infrastructure
Assuring encryption and security in cloud infrastructure
The way organizations work has been totally changed by cloud computing, which gives versatile and reasonable arrangements for designing, implementing and overseeing applications. C...

Back to Top