Loading

Implementation of Security Enhancement in AES by Inducting Dynamicity in AES S-Box
Gousia Nissar1, Dinesh Kumar Garg2, Burhan Ul Islam Khan3

1Gousia Nissar, Department of CSE, SSCET Badhani (Pathankot) Gurdaspur, Punjab, India.
2Dinesh Kumar Garg, Department of CSE, SSCET Badhani (Pathankot) Gurdaspur, Punjab, India.
3Burhan Ul Islam Khan, Department of ECE, Kulliyyah of Engineering, UIAM Gombak, Malaysia.

Manuscript received on 28 August 2019. | Revised Manuscript received on 09 September 2019. | Manuscript published on 30 September 2019. | PP: 2364-2373 | Volume-8 Issue-11, September 2019. | Retrieval Number: J93110881019/2019©BEIES | DOI: 10.35940/ijitee.J9311.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Advance Encryption Standard (AES) supersedes Data Encryption Standard (DES) and is the best known and most widely used block cipher. As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data. However, several theoretical attacks have been announced until now. A theoretical attack called Biclique Attack is known to have broken Full AES and requires 2126.1 , 2189.7 , 2254.4 operations to recover an AES-128, AES-192, AES-256 respectively. Biclique Attack is faster than Brute force attack by a factor of four. As such, these theoretical attacks are of high computational complexity; they do not threaten the practical use of AES in any way. However, attacks always get better; they never get worse. As the technology evolves, successful attacks (using Quantum Computing and faster GPU) against AES may turn up, and they may be difficult to ignore. In this study, we aim to enhance the security prospects of AES with the inclusion of Dynamicity character in AES S-Box for increased resilience against Brute Force Attack and Biclique Attack, and hashing technique is combined with AES algorithm to achieve variance in security using MD4, SHA3 or SHA5. The novel key dispersion technique is introduced to increase the avalanche effect of AES algorithm.
Keywords: HAES, DES, Encryption, S-Box.
Scope of the Article: Encryption Methods and Tools