Modification of AES Algorithm by Using Second Key and Modified SubBytes Operation for Text Encryption

被引:6
作者
Thinn, Aye Aye [1 ]
Thwin, Mie Mie Su [1 ]
机构
[1] Univ Comp Studies, Cyber Secur Res Lab, Yangon, Myanmar
来源
COMPUTATIONAL SCIENCE AND TECHNOLOGY | 2019年 / 481卷
关键词
Encryption; AES; Rijndael; Cryptography;
D O I
10.1007/978-981-13-2622-6_42
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Ciphering algorithms play a main role in this digital era, especially when data are transferred via internet. Many algorithms has been developed and used to encrypt and decrypt data for secure storing or transmission. At present, both synchronous and asynchronous encryptions are used to achieve the high security and to speed up the encryption time and process. Advanced Encryption Standard (AES) plays a prominent role among the synchronous encryption algorithms. It is also known as Rijndael Algorithm. Because of high performance of AES algorithm, it has been chosen as a standard among symmetric cipher algorithms. In this paper, we would like to propose a symmetric encryption algorithm. Modification is based on AES and we add an additional or second key. Another modification is also done at SubBytes step by adding the transportation operation in the original SubBytes operation. To analyze the performance of the modified proposed algorithm, Java language is used to implement the algorithm and then the performance is analyzed. After analyzing and verifying the experimental results, the proposed revised algorithm also shows good performance and high security from the cryptographic point of view. Based on the results of comparison between modified AES and original AES algorithm, our proposed algorithm can be used as a symmetric encryption algorithm, especially for the applications that share sensitive data files via insecure network.
引用
收藏
页码:435 / 444
页数:10
相关论文
共 14 条
  • [1] Abdulgader Ali, 2015, Journal of Theoretical and Applied Information Technology, V71, P1
  • [2] Arrag Sliman, 2013, Journal of Theoretical and Applied Information Technology, V53, P196
  • [3] Dadhich Shraddha, 2016, INT J COMPUTER TREND, V35, P179
  • [4] Fadull IMA, 2013, INT J SECUR APPL, V7, P127
  • [5] Hameed Sumira, 2011, COMPUTER SCI J, V1, P120
  • [6] Kazlauskas Kazys, 2016, INT J ADV COMPUTER S, V7
  • [7] Krishnamurthy GN, 2008, INT J COMPUT SCI NET, V8, P388
  • [8] Mahmud Maqsood, 2009, BSBT 2009 CCIS 57, P98
  • [9] Mehla Reena, 2012, INT J SCI REIJSR, P1895
  • [10] Obaida M.A. A., 2013, International Journal of Computer Networks Communications, V5, P95, DOI [10.5121/ijcnc.2013.5208, DOI 10.5121/IJCNC.2013.5208]