Enhanced AES-256 cipher round algorithm for IoT applications

Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M
{"title":"Enhanced AES-256 cipher round algorithm for IoT applications","authors":"Santhanalakshmi M, Ms Lakshana K, Ms Shahitya G M","doi":"10.58414/scientifictemper.2023.14.1.22","DOIUrl":null,"url":null,"abstract":"Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by the addition of primitive operations which can withstand several attacks and is more efficient.Method: AES works with three different key lengths: 128-bit keys, 192- bit keys, and 256-bit keys. The early rounds of AES have a poor diffusion rate. Better diffusion properties can be brought about by putting in additional operations in the cipher round and key generation algorithm of the conventional AES.Findings: The diffusion characteristics of the conventional AES and the proposed methodology are compared using the avalanche effect. The proposed AES algorithm shows an increased avalanche effect, which proves it to be more secure than the conventional AES. The proposed algorithm is executed on Vivado 2016.2 ISE Design Suite and the results are targeted on Zybo–Zynq Z-7010 AP SoC development board.Novelty: In addition, this paper also proposes an improved AES algorithm that was accomplished by altering the sub-bytes operation. This change was made to make it more reliant on round keys. This algorithm was also extended to a higher key length of 256 bits which makes the algorithm less vulnerable to attacks.","PeriodicalId":443629,"journal":{"name":"THE SCIENTIFIC TEMPER","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"THE SCIENTIFIC TEMPER","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58414/scientifictemper.2023.14.1.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by the addition of primitive operations which can withstand several attacks and is more efficient.Method: AES works with three different key lengths: 128-bit keys, 192- bit keys, and 256-bit keys. The early rounds of AES have a poor diffusion rate. Better diffusion properties can be brought about by putting in additional operations in the cipher round and key generation algorithm of the conventional AES.Findings: The diffusion characteristics of the conventional AES and the proposed methodology are compared using the avalanche effect. The proposed AES algorithm shows an increased avalanche effect, which proves it to be more secure than the conventional AES. The proposed algorithm is executed on Vivado 2016.2 ISE Design Suite and the results are targeted on Zybo–Zynq Z-7010 AP SoC development board.Novelty: In addition, this paper also proposes an improved AES algorithm that was accomplished by altering the sub-bytes operation. This change was made to make it more reliant on round keys. This algorithm was also extended to a higher key length of 256 bits which makes the algorithm less vulnerable to attacks.
增强的AES-256密码轮算法用于物联网应用
目的:近年来,网络已成为一种重要的交流方式。因此,网络安全已成为安全信息交换的关键要求。密码学用于在大型网络上安全地发送密码。密码算法是用于加密和解密密码系统中的消息的一系列过程。其中之一是高级加密标准(AES),它是硬件和软件中的数据加密标准,以隐藏敏感和重要信息。主要目标是设计一个AES系统,通过添加原始操作进行修改,可以承受多次攻击并且更有效。使用方法:AES支持三种不同的密钥长度:128位、192位和256位。前几轮AES的扩散速率较差。通过在常规AES的密码轮和密钥生成算法中加入额外的运算,可以获得更好的扩散特性。研究结果:利用雪崩效应比较了传统AES和该方法的扩散特性。所提出的AES算法具有较强的雪崩效应,比传统的AES算法具有更高的安全性。提出的算法在Vivado 2016.2 ISE Design Suite上执行,结果针对Zybo-Zynq Z-7010 AP SoC开发板。新颖性:此外,本文还提出了一种改进的AES算法,该算法通过改变子字节操作来实现。这个改变是为了使它更依赖于圆键。该算法还扩展到256位的更高密钥长度,使算法不易受到攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信