Design and Implementation of AES using Hybrid Approach

Flevina D’souza, Dakshata M. Panchal
{"title":"Design and Implementation of AES using Hybrid Approach","authors":"Flevina D’souza, Dakshata M. Panchal","doi":"10.1109/PEEIC.2018.8665586","DOIUrl":null,"url":null,"abstract":"Information system concentrates on integrity and confidentiality of data in communication process. To protect this data communicated over network from attackers is major challenge for data and telecommunication organization. Cryptography is used in organization to preserve confidentiality or security. AES is symmetric cryptographic algorithm recommended by NIST in 2001 for its easy implementation and strong security. In recent years, attackers are expert about all cryptographic algorithms including AES. Some effective variation to existing algorithm can make attacker’s task difficult. In this paper, valid variation is implemented to AES so to make attacker’s job tough. Key which is heart of cryptographic process is made dynamic using function of time mixed with salt which will make cryptography unbreakable and Substitute box (S-box) is converted to dynamic S-box to avoid study and analysis of static set of s-box. This hybrid variation implementation in AES makes it more strong and secure than traditional AES.","PeriodicalId":413723,"journal":{"name":"2018 International Conference on Power Energy, Environment and Intelligent Control (PEEIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Power Energy, Environment and Intelligent Control (PEEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PEEIC.2018.8665586","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Information system concentrates on integrity and confidentiality of data in communication process. To protect this data communicated over network from attackers is major challenge for data and telecommunication organization. Cryptography is used in organization to preserve confidentiality or security. AES is symmetric cryptographic algorithm recommended by NIST in 2001 for its easy implementation and strong security. In recent years, attackers are expert about all cryptographic algorithms including AES. Some effective variation to existing algorithm can make attacker’s task difficult. In this paper, valid variation is implemented to AES so to make attacker’s job tough. Key which is heart of cryptographic process is made dynamic using function of time mixed with salt which will make cryptography unbreakable and Substitute box (S-box) is converted to dynamic S-box to avoid study and analysis of static set of s-box. This hybrid variation implementation in AES makes it more strong and secure than traditional AES.
基于混合方法的AES设计与实现
信息系统注重通信过程中数据的完整性和保密性。保护网络上传输的这些数据不受攻击者的攻击是数据和电信组织面临的主要挑战。密码学在组织中用于保护机密性或安全性。AES是2001年NIST推荐的对称加密算法,具有实现简单、安全性强等优点。近年来,攻击者对包括AES在内的所有加密算法都非常精通。对现有算法进行一些有效的改进,使攻击者的任务变得困难。本文对AES进行了有效的变异,使攻击者难以得逞。密钥作为密码过程的核心,利用时间函数和盐的混合使密钥动态化,使密码不可破解,并将替代盒(S-box)转换为动态S-box,避免了对S-box静态集合的研究和分析。AES中的这种混合变体实现使其比传统AES更强大和安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信