An Enhanced AES Algorithm Using Cascading Method On 400 Bits Key Size Used In Enhancing The Safety Of Next Generation Internet Of Things (IOT)

被引:0
作者
Ritambhara [1 ]
Gupta, Alka [1 ]
Jaiswal, Manjit [1 ]
机构
[1] Guru Ghasidas Vishwavidyalaya, Dept CSE, Bilaspur, Chhattisgarh, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA) | 2017年
关键词
AES; Encryption techniques; Cascading technique; block encryption; Sequential and Parallel data; OpenCL; SIMD; multicore GPU and AMD; IoT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper of cascaded[4] AES [1][2] suggest symmetrical block encryption using 200 bit sequential plain text and 400 bit key. Algorithm uses 400 bit key which is divided into 2 parts of 200-200 bits providing different keys for each rounds of cascading which will increase the security. Here AES-AES cascading is done which consist of 5 rounds instead of 10, thus it will omit the mix column twice from the original AES Encryption technique. Omitting mix column 131 single time reduce the complexity from 2(48) to 2(16). Hence, it takes half time than simple AES algorithm to encrypt the block data. Since is AES is widely used international standard encryption method and is also used to provide security in area of wireless LAN's thus, it could be used to provide energy saving cryptographic technique for myriad devices that are connected to network in IoT [13], this result was announced in August 19, 2016 Conference on Cryptographic Hardware and Embedded Systems 2016(CHES 2016) Conference on Cryptographic Hardware and Embedded Systems 2016(CHES 2016).
引用
收藏
页码:422 / 427
页数:6
相关论文
共 12 条
  • [1] Gawade Rupali, 2014, INT J ADV RES COMPUT, V3
  • [2] Harshika, 2015, INT J ADV RES COMPUT, V3
  • [3] Kulkarni Shivaji, INTERNET THINGS IOT
  • [4] Patil Priyadarshini, 2015, INT C INF SEC PRIV I
  • [5] Rote Geeta D., 2013, INT J SCI RES IJSR I, P4438
  • [6] Sadiq Ahmed Tariq, MODIFICATION AES ALG
  • [7] Selent D., 2010, Insight: rivier academic journal, V6
  • [8] Singh Pushkar, 2016, INT J INNOVATIVE RES, V4
  • [9] Stallings W., 2008, Cryptography and Network Security, V5th
  • [10] William E, 2003, SELECTING THE AES