{"title":"在AES算法中加入新的伪随机数生成器以提高其安全级别","authors":"Dilshad Akhtar, M. R. Hassan, Neda Fatma","doi":"10.52783/cienceng.v11i1.343","DOIUrl":null,"url":null,"abstract":"The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Incorporating a New Pseudorandom Number Generator in AES Algorithm to Improve Its Security Level\",\"authors\":\"Dilshad Akhtar, M. R. Hassan, Neda Fatma\",\"doi\":\"10.52783/cienceng.v11i1.343\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.\",\"PeriodicalId\":214525,\"journal\":{\"name\":\"Proceeding International Conference on Science and Engineering\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceeding International Conference on Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52783/cienceng.v11i1.343\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceeding International Conference on Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52783/cienceng.v11i1.343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Incorporating a New Pseudorandom Number Generator in AES Algorithm to Improve Its Security Level
The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.