CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Security Enhancement Algorithms for Data Transmission for Next Generation Networks

Published on March 2012 by Vikas Kaul, S K Narayankhedkar, S Achrekar, S Agarwal
International Conference and Workshop on Emerging Trends in Technology
Foundation of Computer Science USA
ICWET2012 - Number 13
March 2012
Authors: Vikas Kaul, S K Narayankhedkar, S Achrekar, S Agarwal
eb96ba67-1559-4d77-a998-d4a9107202a6

Vikas Kaul, S K Narayankhedkar, S Achrekar, S Agarwal . Security Enhancement Algorithms for Data Transmission for Next Generation Networks. International Conference and Workshop on Emerging Trends in Technology. ICWET2012, 13 (March 2012), 1-6.

@article{
author = { Vikas Kaul, S K Narayankhedkar, S Achrekar, S Agarwal },
title = { Security Enhancement Algorithms for Data Transmission for Next Generation Networks },
journal = { International Conference and Workshop on Emerging Trends in Technology },
issue_date = { March 2012 },
volume = { ICWET2012 },
number = { 13 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/icwet2012/number13/5406-1097/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology
%A Vikas Kaul
%A S K Narayankhedkar
%A S Achrekar
%A S Agarwal
%T Security Enhancement Algorithms for Data Transmission for Next Generation Networks
%J International Conference and Workshop on Emerging Trends in Technology
%@ 0975-8887
%V ICWET2012
%N 13
%P 1-6
%D 2012
%I International Journal of Computer Applications
Abstract

As the speed of processors and knowledge about cryptanalysis goes on increasing day by day, the original encryption methods prove to be insufficient for better security. As large amount of data is transmitted over the network, it is preliminary to secure all types of data before sending it.. The problem with AES, most extensively used encryption, is that it uses many multivariate equations which are linear in nature. Thus it can be broken using algebraic cryptanalysis. This provides a serious threat as AES was considered to be unbreakable and thus it was used in many encryption systems. The paper presents the design and implementation of a hybrid based 128 bit key AES-DES algorithm as a security enhancement.

References
  1. An Improved AES algorithm based on chaos Yuan Kun, Zhang Han, Li Zhaohui
  2. An Overview of Cryptanalysis Research for the Advanced Encryption Standard
  3. An Efficient MPEG Video Encryption Algorithm
  4. H. Nover, "Algebraic Cryptanalysis of AES: Overview", University of Wisconsin, USA, 2005.
  5. S. Murphy, MJ.B Robshaw, "Essential Algebraic Structure within the AES", Advances in Cryptology CRYPTO 2002, Vol. 2442 of Lecture Notes in Computer Science, Springer-Verlag, August 2002
  6. N. Courtois, A. Klimov, 1. Patarin, A. Shamir, "Efficient algorithm for solving overdefmed systems of muhivariate polynomial equations", Proceedings for Eurocrypt 2000, LNCS 1807, pp 392407, Springer-Verlag, 2000.
  7. MATLAB Description, Available: http://www.mathworks.in/help/
  8. AES Description, Available: http://people.eku.edu/styere/Encrypt/JS-AES.html
  9. DES Description, Available: http://orlingrabbe.com/des.htm
  10. AES mix column http://www.angelfire.com/biz7/atleast/mix_c
Index Terms

Computer Science
Information Sciences

Keywords

SBox XOR Cipher Key matrix Hybrid AES DES Chaos Feistal network