We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Method to Increase Diffusion and Confusion in AES Algorithm

by Zakria Mahrousa, Ahmad Bitar, Yahia Fareed
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 36
Year of Publication: 2020
Authors: Zakria Mahrousa, Ahmad Bitar, Yahia Fareed
10.5120/ijca2020919872

Zakria Mahrousa, Ahmad Bitar, Yahia Fareed . A Novel Method to Increase Diffusion and Confusion in AES Algorithm. International Journal of Computer Applications. 177, 36 ( Feb 2020), 39-47. DOI=10.5120/ijca2020919872

@article{ 10.5120/ijca2020919872,
author = { Zakria Mahrousa, Ahmad Bitar, Yahia Fareed },
title = { A Novel Method to Increase Diffusion and Confusion in AES Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2020 },
volume = { 177 },
number = { 36 },
month = { Feb },
year = { 2020 },
issn = { 0975-8887 },
pages = { 39-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number36/31143-2020919872/ },
doi = { 10.5120/ijca2020919872 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:57.839804+05:30
%A Zakria Mahrousa
%A Ahmad Bitar
%A Yahia Fareed
%T A Novel Method to Increase Diffusion and Confusion in AES Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 36
%P 39-47
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Advanced Encryption Standard (AES) is the most famous amongst symmetric block cipher algorithms, and the most used one in many different applications, because its encryption strength and its resistance to many attacks. In this paper, a novel approach will be introduced to remove some weakness points in AES and increase its security. Unlike most previous researches, this research will improve the most important and powerful part of AES algorithm which is the MixColumns() transformation. In the original AES, there only one function is used, which it creates a fixed array that is used in MixColumns() transformation, and this fixed array is known by attackers. Alternatively, the expanded secret key will be used to generate a different function at each round of AES. These functions will create a variable dynamic arrays at each round based on expanded secret key. The variable dynamic arrays will increase confusion amongst bits of the encrypted text. After that, the ShiftRow() transformation will be complicated from ShiftRow() with fixed pattern to ShiftRowColumn() with variable dynamic pattern according to expanded secret key. The modified ShiftRowColumn() will increase the diffusion amongst bytes of encrypted text, as will be detailed in experimental results.

References
  1. Hameed, E.M., Ibrahim, M. M., and Manap, A.N., 2018. Review on Improvement of Advanced Encryption Standard (AES) Algorithm based on Time Execution, Differential Cryptanalysis and Level of Security.
  2. Dewangan, P.C., Agrawal, S.,2012. A Novel Approach to Improve Avalanche Effect of AES Algorithm.
  3. Karthigaikumar, P., and Rasheed, S., 2011. Simulation of Image Encryption using AES Algorithm.
  4. Maolood, T.A.,and Yasser A. Y., 2017. Modifying Advanced Encryption Standard (AES) Algorithm.
  5. Jothy, A.K., Sivakumar, K., and Delsey, J. M., 2017. Efficient Cloud Computing with Secure Data Storage Using AES and PGP Algorithm.
  6. Choudhury, P. K., and Kakoty S.,2017. Comparative Analysis of Different Modified Advanced Encryption Standard Algorithms over Conventional Advanced Encryption Standard Algorithm.
  7. Shekhar, S., Singh, P.,and Jaiswal,M., 2016. An Enhanced AES Algorithm Based on Variable Sbox and 200 Bit Data Block.
  8. Pahal, R., and kumar, V., 2013. Efficient Implementation of AES.
  9. Gul, F., Amin, A., and Ashraf, S., 2017. Enhancement of Cloud Computing Security with Secure Data Storage using AES.
  10. Yan, J.,and Chen,F., 2016.An Improved AES Key Expansion Algorithm". International Conference on Electrical.
  11. Federal Information Processing Standards Publication 197,2001. Announcing the ADVANCED ENCRYPTION STANDARD.
  12. Vaidehi, M., and Rabi, J. B., 2015. Enhanced MixColumn Design for AES Encryption.
  13. Arrag, S., Hamdoun, A., Tragha, A., and Khamlich, E.S.,2013. Design and Implementation a Different Architectures of Mixcolumn in FPGA.
  14. Abdulgader, A., Ismail, M., Zainal, N., and Idbeaa, T., 2015. Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption.
  15. Abaas, and A. S.,and Shibeeb. K. A., 2015. A New Approach for Video Encryption Based on Modified AES Algorithm.
  16. Murtaza, G., Khan, A. A., Alam, W. S., and Farooqi, A.,2010. Fortification of AES with Dynamic Mix-Column Transformation.
  17. Kumar, P., and Rana, B. S., 2016. Development of modified AES algorithm for data security.
  18. Hameed, S., Riaz, F., Moghal, R., Akhtar, G., Ahmed, A., and Dar G. A., 2011. Modified Advanced Encryption Standard for Text and Images.
  19. Kawle, P., Hiwase, A., Bagde, G., Tekam, E., and Kalbande, R., 2014. Modified Advanced Encryption Standard.
  20. Wadi, M. S.,and Zainal, N., 2014. High Definition Image Encryption Algorithm Based on AES Modification.
  21. Wenceslao, V. F, 2018.Enhancing the Performance of the Advanced Encryption (AES) Algorithm Using Multiple Substitution Boxes. Standard.
  22. Hernandez, J. O., etc. al, 2008. A Low Cost Advanced Encryption Standard (AES) Co-Processor Implementation.
  23. Kohli, R., etc. al, 2012. S-Box Design Analysis and Parameter Variation in AES Algorithm.
  24. Stallings, W.,2011 FIFTH EDITION, CRYPTOGRAPHY AND NETWORK SECURITY.
  25. Benvenuto, J. C., 2012.Galois Field in Cryptography.
  26. Leith, V., 2010.The Rijndael Block Cipher.
  27. Anand, K., Sekar, A. C., Nagappan, G.,2017. Enhanced AES Algorithm using 512 Bit Key Implementation.
  28. Kak A., 2019. Finite Fields of the Form GF(2^n) Theoretical Underpinnings of Modern Cryptography Lecture Notes on “Computer and Network Security”.
  29. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker, E., 2012." A Statistical Test Suite for Random andPseudorandom Number Generators for Cryptographic Applications".
  30. Mandal, K. A., and Tiwari, A., 2012. Analysis of Avalanche Effect in Plaintext of DES using Binary Codes.
Index Terms

Computer Science
Information Sciences

Keywords

AES NIST encryption decryption Galois Filed secret key extended secret key round Mix Columns Shift Rows Columns function inverse attack cryptanalysis.