Javascript must be enabled to continue!
Modified AES-128 with Boundary-Based Splitting and Dynamic Output Encryption
View through CrossRef
Encryption is essential for maintaining the confidentiality, integrity, and authenticity of data in today’s digital landscape. As cyber threats continue to escalate, the implementation of effective encryption techniques has become crucial for protecting sensitive information from unauthorized access and preventing data breaches. Encryption is utilized across multiple domains, such as securing data transmission, protecting file storage, enhancing email security, enabling secure messaging, safeguarding databases, verifying authentication, ensuring blockchain integrity, complying with regulations, securing IoT devices, and creating digital signatures to protect sensitive information and maintain privacy. The Advanced Encryption Standard (AES) is crucial for ensuring strong security, widespread adoption, efficiency in implementation, scalability with varying key lengths, versatility across applications, resistance to attacks, compliance with regulations, and facilitating secure global communication. AES is used in various applications, including secure data transmission, file encryption, virtual private networks (VPNs), secure web browsing (HTTPS), disk encryption, and protecting sensitive information in cloud storage and databases. This paper introduces a modified version of the Advanced Encryption Standard (AES) aimed at bolstering security beyond that of traditional AES. While AES is well-regarded for its strength, our enhanced approach integrates additional encryption layers and an innovative key management strategy, significantly boosting resilience against various cryptographic threats. We assess the performance and security attributes of the modified AES through Avalanche Effect Encryption Decryption time and throughput. Our findings indicate that this improved algorithm provides greater protection for sensitive data.
Science Research Society
Title: Modified AES-128 with Boundary-Based Splitting and Dynamic Output Encryption
Description:
Encryption is essential for maintaining the confidentiality, integrity, and authenticity of data in today’s digital landscape.
As cyber threats continue to escalate, the implementation of effective encryption techniques has become crucial for protecting sensitive information from unauthorized access and preventing data breaches.
Encryption is utilized across multiple domains, such as securing data transmission, protecting file storage, enhancing email security, enabling secure messaging, safeguarding databases, verifying authentication, ensuring blockchain integrity, complying with regulations, securing IoT devices, and creating digital signatures to protect sensitive information and maintain privacy.
The Advanced Encryption Standard (AES) is crucial for ensuring strong security, widespread adoption, efficiency in implementation, scalability with varying key lengths, versatility across applications, resistance to attacks, compliance with regulations, and facilitating secure global communication.
AES is used in various applications, including secure data transmission, file encryption, virtual private networks (VPNs), secure web browsing (HTTPS), disk encryption, and protecting sensitive information in cloud storage and databases.
This paper introduces a modified version of the Advanced Encryption Standard (AES) aimed at bolstering security beyond that of traditional AES.
While AES is well-regarded for its strength, our enhanced approach integrates additional encryption layers and an innovative key management strategy, significantly boosting resilience against various cryptographic threats.
We assess the performance and security attributes of the modified AES through Avalanche Effect Encryption Decryption time and throughput.
Our findings indicate that this improved algorithm provides greater protection for sensitive data.
Related Results
“REDESAIN PASAR UNIT KOTA BOJONEGORO”
“REDESAIN PASAR UNIT KOTA BOJONEGORO”
<p><em><span style="font-size: 12.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; color: #0f243e; mso-themecolor: text2; mso...
Modified Advanced Encryption Standard Algorithm for Information Security
Modified Advanced Encryption Standard Algorithm for Information Security
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Effort...
A SECURE FILE ENCRYPTION AND DECRYPTION SYSTEM USING AES FOR TEXT AND IMAGES
A SECURE FILE ENCRYPTION AND DECRYPTION SYSTEM USING AES FOR TEXT AND IMAGES
In today’s digital era, where vast amounts of sensitive data are transmitted over the internet, securing this information from unauthorized access has become a major concern. The r...
File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website
File Encryption and Decryption Using Algorithm Aes-128 Bit Based Website
Digital data security has become very important in the current information era. One way to maintain data security is to use encryption and decryption techniques. The Advanced Encry...
Secretary Bird-Inspired Optimization of Advanced Encryption Standard (AES) and Blowfish Encryption Algorithms for Robust Data Protection
Secretary Bird-Inspired Optimization of Advanced Encryption Standard (AES) and Blowfish Encryption Algorithms for Robust Data Protection
This study explores the hybridization of AES and Blowfish encryption algorithms to enhance data security, particularly for medical datasets. While combining these ciphers offers im...
Minimum Adversarial Examples
Minimum Adversarial Examples
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: ...
End to end encryption of chat using advanced encryption standard-256
End to end encryption of chat using advanced encryption standard-256
In an era marked by rampant digitalization and ubiquitous connectivity, ensuring the security and privacy of communications has become paramount. This paper introduces a novel appl...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...

