Implementation of Security Enhancement in AES by Inducting Dynamicity in AES S-Box
Gousia Nissar1, Dinesh Kumar Garg2, Burhan Ul Islam Khan3
1Gousia Nissar, Department of CSE, SSCET Badhani (Pathankot) Gurdaspur, Punjab, India
2Dinesh Kumar Garg, Department of CSE, SSCET Badhani (Pathankot) Gurdaspur, Punjab, India.
3Burhan Ul Islam Khan, Department of ECE, Kulliyyah of Engineering, UIAM Gombak, Malaysia. Email: burhan.iium@gmail.com
Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2010-2018 | Volume-8 Issue-10, August 2019 | Retrieval Number: J93110881019/2019©BEIESP | DOI: 10.35940/ijitee.J9311.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Advance Encryption Standard (AES) supersedes Data Encryption Standard (DES) and is the best known and most widely used block cipher. As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data. However, several theoretical attacks have been announced until now. A theoretical attack called Biclique Attack is known to have broken Full AES and requires 2126.1 , 2 189.7 , 2254.4 operations to recover an AES-128, AES-192, AES-256 respectively. Biclique Attack is faster than Brute force attack by a factor of four. As such, these theoretical attacks are of high computational complexity; they do not threaten the practical use of AES in any way. However, attacks always get better; they never get worse. As the technology evolves, successful attacks (using Quantum Computing and faster GPU) against AES may turn up, and they may be difficult to ignore. In this study, we aim to enhance the security prospects of AES with the inclusion of Dynamicity character in AES S-Box for increased resilience against Brute Force Attack and Biclique Attack, and hashing technique is combined with AES algorithm to achieve variance in security using MD4, SHA3 or SHA5. The novel key dispersion technique is introduced to increase the avalanche effect of AES algorithm.
Keywords: AES, DES, Encryption, S-Box.
Scope of the Article: Security Service Systems