A modified Matrices Approach in Advanced Encryption Standard Algorithm | ||
Engineering and Technology Journal | ||
Article 4, Volume 37, 3B, December 2019, Pages 86-91 PDF (767.58 K) | ||
Document Type: Research Paper | ||
DOI: 10.30684/etj.37.3B.4 | ||
Authors | ||
Abdul Monem S. Rahma; Atheer M. Abbas | ||
Computer Science Dept., University of Technology - Iraq | ||
Abstract | ||
The cryptographic algorithms became the main proceeding for protection of very important data from unauthorized access. There are several cryptographic algorithms to ensure the data, but algorithms must be selected according to speed, strength and the implementation. Thus, choosing the advance encryption standard (AES) for encryption and decryption data because its speed and strength of encryption, flexible, complex processing and its resistance to Brute-force attack. This paper presents enhancement of the AES algorithm to increase the security of the encrypted documents by using different sizes data matrices based on multiple irreducible polynomials with order 2, 4, and 8. The proposed modifications results tested and provide a high randomness. | ||
Keywords | ||
AES; Irreducible Polynomial; randomness | ||
References | ||
[1] A. Rukhin, et al. “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (revised),” Natl. Inst. Stand. Technol.(US) Spec. Publ, 2008. [2] F.Y. Mohammad, A.E. Rohiem and A.D. Elbayoumy, “A Novel S-box of AES Algorithm Using Variable Mapping Technique,” International Conference on Aerospace Sciences & Aviation Technology, ASAT- 13, May 26 – 28, 2009. [3] H. Razi, and H.H. Seyyed. “Using cipher key to generate dynamic S-box in AES cipher system,” International Journal of Computer Science and Security (IJCSS), 2012. [4] L. Scripcariu, and M.D. Frunza. “Modified Advanced Encryption Standard,” 11th International Conference on Development and Application Systems, Romania, 2012. [5] N.H. Ali, S.R. Abdul Monem, and A. Jaber. “Encryption using Dual Key Transformation based on Creation of Multi S-Boxes in AES Algorithm,” International Journal of Computer Applications, 2013. [6] K. Pravin, et al. “Modified Advanced Encryption Standard,” International Journal of Soft Computing and Engineering (IJSCE), 2014. [7] W. Stallings, “'Cryptography and Network Security,” 4th Edition, Prentice-Hall, 2005. | ||
Statistics Article View: 275 PDF Download: 334 |