CFP last date
20 January 2025
Reseach Article

Data based Transposition to Enhance Data Avalanche and Differential Data Propagation in Advanced Encryption Standard

by Paul A. J., Saju A., Lekshmi R. Nair
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 12
Year of Publication: 2013
Authors: Paul A. J., Saju A., Lekshmi R. Nair
10.5120/11445-7039

Paul A. J., Saju A., Lekshmi R. Nair . Data based Transposition to Enhance Data Avalanche and Differential Data Propagation in Advanced Encryption Standard. International Journal of Computer Applications. 67, 12 ( April 2013), 6-9. DOI=10.5120/11445-7039

@article{ 10.5120/11445-7039,
author = { Paul A. J., Saju A., Lekshmi R. Nair },
title = { Data based Transposition to Enhance Data Avalanche and Differential Data Propagation in Advanced Encryption Standard },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 12 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number12/11445-7039/ },
doi = { 10.5120/11445-7039 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:27.304043+05:30
%A Paul A. J.
%A Saju A.
%A Lekshmi R. Nair
%T Data based Transposition to Enhance Data Avalanche and Differential Data Propagation in Advanced Encryption Standard
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 12
%P 6-9
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In symmetric block ciphers, substitution and transposition operations are performed in multiple rounds to transform plaintext blocks into ciphertext blocks. In advanced Encryption Standard (AES) the transposition of data is facilitated by shift row and mix column operations. In Matrix Array Symmetric Key (MASK) Encryption, a block cipher proposed by the author, the data transposition is achieved by data based rotations. The data based transposition procedure offers two advantages. First, it is simple to implement and secondly, the procedure produces a strong data avalanche effect and differential data propagation. In this paper the possibility of improvising the performance of AES using data based transposition in its diffusion rounds is examined. As a case study, the data based transposition procedure has been introduced in AES. The data avalanche and differential data propagation produced in AES have been observed. The paper describes the data based transposition procedure and the enhanced data avalanche and differential data propagation produced in AES. It has been shown that, the data avalanche effect and differential data propagation characteristics of AES have been improved.

References
  1. William Stallings, "Network Security Essentials (Applications and Standards)," Pearson Education, pp. 2-80, (2004).
  2. Charles P. Pfleeger, Shari Lawrence Pfleeger, "Security in computing," Pearson Education, pp. 66-120, (2004).
  3. Jose J. Amador, Robert W. Green. "Symmetric-Key Block Ciphers for Image and Text Cryptography," International Journal of Imaging System Technology, Vol. 15 – pp. 178- 188, (2005).
  4. Dragos Trinca, "Sequential and Parallel Cascaded Convolution Encryption with Local Propagation: Toward future Directions in Cryptography," Proceedings of The third International Conference on Information Technology-New Generations. (ITNG'06), 0-695-2497- 4/2006, IEEE Computer Society, (2006).
  5. Data Encryption Standard : http://csrc. nist. gov/publications/fips/fips46-3/fips-46-3. pdf
  6. Advanced Encryption Standard: http://csrc. nist. gov/publications/fips/fips197/ fips- 97. pdf
  7. Escrowed Encryption Standard: http://csrc. nist. gov/publications/fips/fips1185/ fips-185. txt
  8. Krishnamurthy G. N, Ramaswamy V. , Leela G. H, Ashalatha M. E, "Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect," International Journal of Computer Science and Network Security, Vol. 8, No. 3, March 2008, pp. 244-250.
  9. Paul A. J. , Varghese Paul, P. Mythili, " Matrix Array Symmetric Key Encryption," Journal of Computer Society of India, Vol. 37, Issue No. 1, January – March 2007, pp. 48-53.
  10. Paul A. J. , Varghese Paul, P. Mythili, "A Fast and Secure Encryption Algorithm for Message Communication," IETECH International Journal of Communication Techniques, Vol. 2, No. 3, 2008, pp 104-109.
  11. Paul A. J. , Varghese Paul, P. Mythili, "Fast Symmetric Cryptography using Key and Data based Masking operations," International- Journal of Computational Intelligence - Research & applications, Vol 3, Number 1, January – June 2009, pp. 5-10.
  12. Paul A. J. , P. Mythili, Poulose Jacob "Matrix based Key Generation to Enhance Key Avalanche in Advanced Encryption Standard", International Journal of Computer Applications, No. 2, article 1, pp. 31–34, 2011. Published by Foundation of Computer Science (USA).
Index Terms

Computer Science
Information Sciences

Keywords

Ciphertext Data based transposition Data avalanche Differential data propagation Plaintext Secret key