CFP last date
20 January 2025
Reseach Article

Security Enhancement Algorithm for Data Transmission for Next Generation Networks

Published on April 2013 by Neha Jain, Vikas Kaul, S K Karayankhedkar
International Conference and Workshop on Emerging Trends in Technology 2013
Foundation of Computer Science USA
ICWET2013 - Number 2
April 2013
Authors: Neha Jain, Vikas Kaul, S K Karayankhedkar
bde3fbb9-ded2-4e0a-b9b2-c85248cdbcd9

Neha Jain, Vikas Kaul, S K Karayankhedkar . Security Enhancement Algorithm for Data Transmission for Next Generation Networks. International Conference and Workshop on Emerging Trends in Technology 2013. ICWET2013, 2 (April 2013), 1-6.

@article{
author = { Neha Jain, Vikas Kaul, S K Karayankhedkar },
title = { Security Enhancement Algorithm for Data Transmission for Next Generation Networks },
journal = { International Conference and Workshop on Emerging Trends in Technology 2013 },
issue_date = { April 2013 },
volume = { ICWET2013 },
number = { 2 },
month = { April },
year = { 2013 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/icwet2013/number2/11334-1350/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology 2013
%A Neha Jain
%A Vikas Kaul
%A S K Karayankhedkar
%T Security Enhancement Algorithm for Data Transmission for Next Generation Networks
%J International Conference and Workshop on Emerging Trends in Technology 2013
%@ 0975-8887
%V ICWET2013
%N 2
%P 1-6
%D 2013
%I International Journal of Computer Applications
Abstract

This paper presents the design and implementation of a symmetrical hybrid based AES algorithm as a security enhancement for data transmission which is further improved by using chaos. This work outlines the possible weaknesses within the current AES encryption algorithm especially against algebraic based cryptanalysis. It proposes the idea on integrating AES within the Feistel network, hence resulting into the development of the Hybrid AES algorithm. That hybrid algorithm is further enhanced by chaos. The characteristics of chaos sequence make the space of key infinite. Hence we get a system which is much difficult to break by cryptanalysis. .

References
  1. Shannon C E, Communication Theory of Secrecy Systems, bell Systems Technical Journal,1949:28:656-715
  2. FengGuodeng, Pei Ding Cryptography introduction . BeiJing Science Press 1999
  3. Nicolas T. Courtois and Josef Pieprzyk,Cryptanalysis of a block cipher with over defined systems of equations
  4. S. Murphy, MJ. B Robshaw, "Essential Algebraic Structure within the AES", Advances in Cryptology CRYPTO 2002, Vol. 2442 of Lecture Notes in Computer Science, Springer-Verlag, August 2002
  5. H. Nover, "Algebraic Cryptanalysis of AES: Overview", University ofWisconsin, USA, 2005.
  6. Bruce Shneier . Applied Crptography :protocol Algorithms, and source code in C. Johnwiley&Sons,Inc, 1996
  7. L Kocarev. Chaos-based Cryptography: aBrief overview. IEEE Circuits and Systems Magazines, 2001:1(3):6~22
  8. M. B. Vishnu, S. K. Tiong. Security Enhancement of Digital Motion Image Transmission Using Hybrid AES-DES Algorithm, APCC2008 OF IEICE ,2008
  9. Yuan Kun, Zhang Han Li Zhaohui. An Improved AES algorithm based on chaos, International Conference on Multimedia Information Networking and Security 2009
  10. GoceJakimoski and Ljup?coKocarev, Chaos and cryptography: Block Encryption Ciphers Based on Chaotic Maps.
  11. Zhao Rui. Wang Qingsheng. Wen Huiping. Design of AES Algorithm Based on Two Dimensional Logistic and Chebyshev Chaotic Mapping 2008
  12. Nadeem, A. and Javed, M. Y. , "A Performance Comparison of Data Encryption Algorithms," IEEE Information and Communication Technologies, 2005.
  13. VikasKaul "Security Enhancement of Data Transmission for Next Generation networks" IJCA2012.
Index Terms

Computer Science
Information Sciences

Keywords

Chaos Control Key Encryption Key