Incorporating a New Pseudorandom Number Generator in AES Algorithm to Improve Its Security Level

Dilshad Akhtar, M. R. Hassan, Neda Fatma
{"title":"Incorporating a New Pseudorandom Number Generator in AES Algorithm to Improve Its Security Level","authors":"Dilshad Akhtar, M. R. Hassan, Neda Fatma","doi":"10.52783/cienceng.v11i1.343","DOIUrl":null,"url":null,"abstract":"The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceeding International Conference on Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52783/cienceng.v11i1.343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.
在AES算法中加入新的伪随机数生成器以提高其安全级别
在GF(pn)上不可约多项式下元素多项式的乘法逆的实现在密码学中起着重要的作用。在AES算法中,GF(28)的第一个不可约多项式下的乘法逆在1999年首次被用于设计其代换盒。使用GF(73)上两个不可约多项式下的乘法逆的新PRNG RC4-MI接受AES密钥作为其自己的密钥并生成随机字节。将RC4-MI字节与AES密码字节进行异或运算,得到一个新的密码字节序列,其随机性在数量上优于原始AES密码字节序列。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信