Loading

Change in the Key Expansion Function of AES
Gaurav Kumar1, Kunwar Pal2, Dilbahar Singh3

1Mr. Gaurav Kumar, Department of Computer Science and Engineering, Lovely Professional University, Phagwara (Punjab), India.
2Mr. Kunwar Pal, Department of Computer Science and Engineering, Lovely Professional University, Phagwara (Punjab), India.
3Mr. Dilbahar Singh, Department of Computer Science and Engineering, Lovely Professional University, Phagwara (Punjab), India.
Manuscript received on 12 March 2013 | Revised Manuscript received on 21 March 2013 | Manuscript Published on 30 March 2013 | PP: 267-269 | Volume-2 Issue-4, March 2013 | Retrieval Number: D0581032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper contains the new changes in key expansion function in Advanced Encryption Standard (AES). AES is vulnerable of various attacks theoretically. All the functions for substitution permutation and confusion-diffusion are applied only in the main part of the algorithm but there is no prefect security for the key expansion function. The related key attack, related sub keys attack and long biclique with meet in the middle attacks are applied on AES because of the weak key expansion function. Authors of AES accepted that the key expansion function of AES is comparatively weak. Here we are trying to remove the weaknesses of AES by changing some basic functions of AES key expansion function. For the security of related key attack and related sub keys attack, we are adding some new function for security of the key expansion. We are changing the Rcon matrix into an Rvar matrix by using given key. This will increase security of AES.
Keywords: AES, Key Expansion Function, Rcon Matrix, Rvar Matrix, SSL, Encryption/Decryption, Security.

Scope of the Article: Logic, Functional programming and Microcontrollers for IoT