IJCNIS Vol. 9, No. 9, 8 Sep. 2017
Cover page and Table of Contents: PDF (size: 553KB)
Full Text (PDF, 553KB), PP.46-53
Views: 0 Downloads: 0
Encryption, Decryption AES Encryption, Cryptography, security, TINY encryption
The cryptographic algorithm designed to enhance security in real life which storage track and increase speed. This is kind of Feistel cipher which real use for the processes from assorted (mixed/orthogonal) algebraic collections. AES is combined with segmentation and validation algorithm to improve the performance of the security. Also, Key expansion is done to make the AES more secure. The processes are pipelined to increase the speed of AES. Our strategies that are hybrid method which work as change the original files (data) into encoded/encrypted type using AES and Tiny Encryption Process. The hybrid Procedure is considered for easiness and improved performance. The encryption pattern, data is encoded using tiny-AES-128 encryption process and authentication SHA that alterations it into an indecipherable cipher text. In process of encryption that encodes the information which consider a random text through the idea of cryptography and then data/text for the user. Our proposed approach get minimize computational time and memory utilization which simulated in MATLAB 2014Ra.
Ritu Goyal, Mehak Khurana,"New Design of Tiny-Block Hybridization in AES", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.9, pp.46-53, 2017.DOI: 10.5815/ijcnis.2017.09.06
[1] F.Mace, F.X Standert, J J Quisquater “FPGA implementation(s) of a Scalable Encryption algorithm” IEEE Transactions on VLSI Systems, Vol.16, 2008, pp. 212-216.
[2] Francois-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater “SEA a Scalable Encryption Algorithm for Small Embedded Applications” in Proc. CARDIS, 2006, pp 222-236.
[3] Andem, Vikram Reddy .―A Cryptanalysis of the Tiny Encryption Algorithm‖, 2003.
[4] Atul Kahate, ― Cryptography and Network Security‖, TMH, 2003.
[5] Behrouz A. Forouzan, (2006)―Cryptography and Network Security‖, Firstedition, McGraw- Hill.
[6] V. Shoup and R. Gennaro: Securing Threshold Cryptosystems against Chosen. Ciphertext Attacks. Eurocrypt'98, LNCS 1404, pp. 1{16, 1998.
[7] Y. Tsiounis and M. Yung, On the Security of ElGamal Based Encryption. PKS'98, LNCS 1431, pp. 117-134, 1998.
[8] Y. Zheng and J. Seberry, Practical Approaches to Attaining Security against Adaptively Chosen Ciphertext Attacks. Crypto'92, LNCS 740, pp. 292-304, 1992.
[9] J. Pichel, D. E. Singh, and J. Carretero. Reordering algorithms for increasing locality on multicore processors. 10th IEEE International Conference on High Performance Computing and Communications, 2008, pages 123-130, 2008.
[10] Moh’d, Abidalrahman, Yaser Jararweh, and L. Tawalbeh. “AES-512: 512- bit Advanced Encryption Standard algorithm design and evaluation.” In Information Assurance and Security (IAS), 2011 7th International Conference on, pp. 292-297. IEEE, 2011.
[11] Rewagad, P.; Pawar, Y., "Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing," in Communication Systems and Network Technologies (CSNT), 2013 International Conference on , vol., no., pp.437-439, 6-8 April 2013 doi: 10.1109/CSNT.2013.97.
[12] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997, p. 81-83.
[13] Mohamed, E.M.; Abdelkader, H.S.; El-Etriby, S., "Enhanced data security model for cloud computing," in Informatics and Systems (INFOS), 2012 8th International Conference on, vol., no., pp.CC-12-CC-17, 14-16 May 2012.
[14] Mehak Khurana, Meena Kumari, “Security Primitives: Block and Stream Ciphers”, International Journal of Innovations & Advancement in Computer Science (IJIACS), ISSN 2347 – 8616, Vol. 4, March 2015.
[15] Mehak Khurana, Meena Kumari, “Variants of Differential and Linear Cryptanalysis”, International Journal of Computer Applications (0975 – 8887) Volume 131 – No.18, PP 20-28, December 2015.