A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix

by   Ziaur Rahaman, et al.

The study of sending and receiving secret messages is called cryptography. Generally, senders and receivers are unaware about the process of encryption and decryption. Hence, encryption plays an important role in data communication and data security. The meaning of encryption is not only to keep data confidential from unwanted access but also ensuring the data integrity through available way. As the capacity of breaking the security is increasing rapidly, so, the process that hides information is one of the most concerned topics. Advanced Encryption Standard is a popular, widely used and efficient encryption algorithm, which has been used since it was invented. This paper focuses on the AES key generation process and Substitution box. It modifies the conventional key generation technique and builds the dynamic 3-Dimensional S-box of Advance Encryption Standard. The proposed approach suggests 3-Dimensioanl Key Generation Matrix and S-box. As per shown this novel technique increases the amount of time it needs during encryption and decryption. The experimental result shows that it also enhances the strength of AES algorithm. The proposed approach illustrates the theoretical analysis and corresponding experimented results.


page 3

page 4


Cryptanalysis of an Image Block Encryption Algorithm Based on Chaotic Maps

Recently, an image block encryption algorithm was proposed based on some...

VLSI Implementation of Cryptographic Algorithms Techniques: A Literature Review

Through the years, the flow of Data and its transmission have increased ...

Data Encryption based on 7D Complex Chaotic System with Cubic Memristor for Smart Grid

The information security has an irreplaceable position in the smart grid...

Key-dependent Security of Stream Ciphers

The control of the cryptography is more than ever a recurrent issue. As ...

A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope

Today, the protection of information, ensuring of the safety and the rec...

Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security

Several efforts have been seen claiming the lightweight block ciphers as...

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

This paper analyzes the security of an image encryption algorithm propos...

Please sign up or login with your details

Forgot password? Click here to reset