Design and synthesis of Dual Key based AES Encryption

被引:0
|
作者
Abhiram, L. S. [1 ]
Gowrav, L. [1 ]
Kumar, Punith H. L. [1 ]
Sriroop, B. K. [1 ]
Lakkannavar, Manjunath C. [1 ]
机构
[1] MS Ramaiah Inst Technol, Dept Elect & Commun, Bangalore, Karnataka, India
关键词
AES; S-Box; Dual Key;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key aspect of communication is security. Encryption of information to make it inaccessible to unauthorized recipients is a main area in network security. AES encryption is one of the most secure encryption algorithms. But with improving technology, attacks which can be used for easy cryptanalysis of encrypted information have been developed. One of the main reasons for vulnerability of AES encryption algorithm is the use of static S-Boxes. Also with attempts made to tap the key, AES has become more vulnerable to cryptanalysis attacks. Static S-Boxes make it very easy for reverse engineering which form the basis of Super S-Box attack. Hence there have been a lot of proposals for generation of S-Boxes which are key dependent. Majority of those algorithms involve probabilistic methods which are very complicated for hardware implementation. In this paper, we present a synthesizable algorithm which involves the use of conventional bitwise operations for generation of key dependent S-Boxes. Also a dual key based AES is presented in the paper which is FPGA implementable. The algorithm is reliable in terms of security and also suitable for hardware implementation. Mathematical analyses have been carried out on the algorithm to compute the reliability.
引用
收藏
页码:85 / 88
页数:4
相关论文
共 50 条
  • [1] FPGA Implementation of Dual Key Based AES Encryption with Key Based S-Box Generation
    Abhiram, L. S.
    Sriroop, B. K.
    Gowrav, L.
    Kumar, Punith H. L.
    Lakkannavar, Manjunath C.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 577 - 581
  • [2] Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory
    Subashri, T.
    Arunachalam, R.
    Kumar, B. Gokul Vinoth
    Vaidehi, V.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 224 - 231
  • [3] Design of DNA-based Advanced Encryption Standard (AES)
    Sabry, Mona
    Hashem, Mohamed
    Nazmy, Taymoor
    Khalifa, Mohamed Essam
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 390 - 397
  • [4] AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection
    Mathur, Nishtha
    Bansode, Rajesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 1036 - 1043
  • [5] Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections
    Cohen, Jason
    Acharya, Subatra
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 444 - 451
  • [6] Design of USB Storage Encryption Device Based on XTS-AES
    Ji, Houtao
    Feng, Jianfeng
    Liu, Mingzhong
    Yang, Xianchao
    2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 2, 2017, : 137 - 140
  • [7] Dual Key Speech Encryption Algorithm Based Underdetermined BSS
    Zhao, Huan
    He, Shaofang
    Chen, Zuo
    Zhang, Xixiang
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [8] Design of AES based on dual cipher and composite field
    Wu, SY
    Lu, SC
    Laih, CS
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 25 - 38
  • [9] A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH
    Okhovat, Raziyeh Sadat
    Sadr, Ali
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 277 - +
  • [10] The Dynamic Dual Key Encryption Algorithm Based on joint Galois Fields
    Rahma, Abdul Monem S.
    Yacob, Basima Z.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 190 - 199