| Peer-Reviewed

Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm

Received: 9 February 2022    Accepted: 16 March 2022    Published: 10 May 2022
Views:       Downloads:
Abstract

Encryption is a method of coding information or any other form of confidential, private and sensitive information or data to prevent from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Now a day, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several of cryptographic techniques are being used to preserve security and could be classified as: symmetric and asymmetric. A symmetric algorithm named as (AES) is selected for enhancement due to its applicability and widely used algorithm. In AES, among the four stages that are used for encryption and decryption Sub Bytes and Mix Column produce more delay. On the other side, Shift Rows stage contribute to less security level of AES because it uses easy operation that is linear in nature. To overcome these challenges, in the designed symmetrical cryptography algorithm shift row stage of AES is replaced by symmetrical transposition technique to advance security. The simulation result of our Symmetrical Transposition technique has shown better security achievement, with greater than 50% avalanche effect, which means the proposed algorithm makes better confusion and diffusion. Hence, our proposed Enhanced Security of Advanced Encryption Standard (ES-AES) algorithm has better security when compared to original Advance Encryption Standard (AES) algorithm.

Published in American Journal of Computer Science and Technology (Volume 5, Issue 2)
DOI 10.11648/j.ajcst.20220502.13
Page(s) 41-48
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

AES, Avalanche Effect, Cryptography, Security, Modified AES, Security, Symmetrical Transposition, Confusion and Diffusion

References
[1] Mary James, Deepa S Kumar P. G Scholar (2016, March 03). An Optimized Parallel Mix column and Sub bytes’ design in Lightweight Advanced Encryption Standard (IJCER) ISSN, (25 – 26).
[2] Arnab Rahman Chowdhury, Junayed Mahmud, Abu Raihan Mostofa Kamal, Md. Abdul Hamid, Member. (2018). MAES: Modified Advanced Encryption Standard for Resource Constraint Environments IEEE.
[3] Awad, A. I. (2018, may 16). Introduction to information security foundations and applications. Research Gate, Retrieved from https://www.researchgate.net/publication/325170901.
[4] Alexandra Durcikova Murray E. Jennex. (2017). Introduction to Confidentiality, Integrity, and Availability of Knowledge and Data Minitrack. Hawaii: University of Oklahoma San Diego State University Retrieved from URI: http://hdl.handle.net/10125/41680
[5] Altatar, M. A. (2017, dece). Modified Advanced Encryption Standard Algorithm for Reliable Real-Time Communications.
[6] Amit Verma, Simarpreet Kaur, Bharti Chhabra M. Tech. (2016, Oct). Improvement in the Performance and Security of Advanced Encryption Standard Using AES Algorithm and Comparison with Blowfish Research Scholar, International Research Journal of Engineering and Technology (IRJET).
[7] Sonia Rani Harpreet Kaur. (2017). Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal.
[8] Mutabaruka, E. (2016). Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman). Elsever.
[9] Avinash Kak. (2018, February 2). The Advanced Encryption Standard February. Springer.
[10] Amina Msolli Abdelhamid Helali Haythem Ameur Hassen Maaref. (2017). Secure Encryption for Wireless Multimedia Sensors Network. 18. Retrieved from www.ijacsa.thesai.org
[11] M. Vaidehi and B. Justus Rabi. (2015, December). Enhanced Mix Column Design for AES Encryption.
[12] Rizky Riyaldhia, et al, (2017., October 13-14). improvement of advanced encryption standard algorithm with shift row. Elsevier B. V. Retrieved from www.sciencedirect.com
[13] Mohammed Nazeh Abdul Wahid, Abdulrahman Ali, Babak Esparham and Mohamed Marwan, (2018, JUNE 22). A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Preventio.
[14] Shashi B. Rna, Puneet Kumar, (2015. November 24). Development of modified AES algorithm for data security. Elsevier.
[15] Hasanen S. Abdulah, et al. (2018). Analysis of AES Algorithm Effects on the Diffusion Property. University of Al-Nahrain, Journal / Issue (29).
[16] Junjie Yan and Feng. 2016). An Improved AES Key Expansion Algorithm, International Conference on Electrical, Mechanical and Industrial Engineering. ICEMIE.
[17] Pendli, V. Pathuri, M. Yandrathi, S. and Razaque, A. (2016) Improvising performance of Advanced Encryption Standard algorithm. Second International Conf. on Mobile and Secure Services (MobiSecServ). Gainesville, Florida, United States of America.
[18] Stallings, W. (2014). Cryptography and Network Security - Principles and Practice. (6th Edn), Upper Saddle River, New Jersey.
[19] Mustafa Emad Hameed (2018, October 20). Review on Improvement of Advanced Encryption Standard (AES) Algorithm based on Time Execution, Differential Cryptanalysis and Level of Security. Journal of Telecommunication, Electronic and Computer Engineering. Retrieved from https://www.researchgate.net/publication/323081584, Iraq.
[20] Ayushi Arya et al. (2016). Effective AES Implementation. International Journal of Electronics and Communication Engineering & Technology, 6-7.
[21] Weiman, D. (2012). Retrieved from http://creativecommons.org/licenses/by-sa/3.0/ASCII Conversion Chart.doc.
[22] Avi Kak, AES: The Advanced Encryption Standard, Avinash Kak, Purdue University, January 31, 2019, page 20-11.
Cite This Article
  • APA Style

    Nahom Gebeyehu Zinabu, Samuel Asferaw. (2022). Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm. American Journal of Computer Science and Technology, 5(2), 41-48. https://doi.org/10.11648/j.ajcst.20220502.13

    Copy | Download

    ACS Style

    Nahom Gebeyehu Zinabu; Samuel Asferaw. Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm. Am. J. Comput. Sci. Technol. 2022, 5(2), 41-48. doi: 10.11648/j.ajcst.20220502.13

    Copy | Download

    AMA Style

    Nahom Gebeyehu Zinabu, Samuel Asferaw. Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm. Am J Comput Sci Technol. 2022;5(2):41-48. doi: 10.11648/j.ajcst.20220502.13

    Copy | Download

  • @article{10.11648/j.ajcst.20220502.13,
      author = {Nahom Gebeyehu Zinabu and Samuel Asferaw},
      title = {Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm},
      journal = {American Journal of Computer Science and Technology},
      volume = {5},
      number = {2},
      pages = {41-48},
      doi = {10.11648/j.ajcst.20220502.13},
      url = {https://doi.org/10.11648/j.ajcst.20220502.13},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20220502.13},
      abstract = {Encryption is a method of coding information or any other form of confidential, private and sensitive information or data to prevent from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Now a day, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several of cryptographic techniques are being used to preserve security and could be classified as: symmetric and asymmetric. A symmetric algorithm named as (AES) is selected for enhancement due to its applicability and widely used algorithm. In AES, among the four stages that are used for encryption and decryption Sub Bytes and Mix Column produce more delay. On the other side, Shift Rows stage contribute to less security level of AES because it uses easy operation that is linear in nature. To overcome these challenges, in the designed symmetrical cryptography algorithm shift row stage of AES is replaced by symmetrical transposition technique to advance security. The simulation result of our Symmetrical Transposition technique has shown better security achievement, with greater than 50% avalanche effect, which means the proposed algorithm makes better confusion and diffusion. Hence, our proposed Enhanced Security of Advanced Encryption Standard (ES-AES) algorithm has better security when compared to original Advance Encryption Standard (AES) algorithm.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Enhanced Security of Advanced Encryption Standard (ES-AES) Algorithm
    AU  - Nahom Gebeyehu Zinabu
    AU  - Samuel Asferaw
    Y1  - 2022/05/10
    PY  - 2022
    N1  - https://doi.org/10.11648/j.ajcst.20220502.13
    DO  - 10.11648/j.ajcst.20220502.13
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 41
    EP  - 48
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20220502.13
    AB  - Encryption is a method of coding information or any other form of confidential, private and sensitive information or data to prevent from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Now a day, it is essential to secure data that is at rest in our computer or is transmitted via web against attacks. Several of cryptographic techniques are being used to preserve security and could be classified as: symmetric and asymmetric. A symmetric algorithm named as (AES) is selected for enhancement due to its applicability and widely used algorithm. In AES, among the four stages that are used for encryption and decryption Sub Bytes and Mix Column produce more delay. On the other side, Shift Rows stage contribute to less security level of AES because it uses easy operation that is linear in nature. To overcome these challenges, in the designed symmetrical cryptography algorithm shift row stage of AES is replaced by symmetrical transposition technique to advance security. The simulation result of our Symmetrical Transposition technique has shown better security achievement, with greater than 50% avalanche effect, which means the proposed algorithm makes better confusion and diffusion. Hence, our proposed Enhanced Security of Advanced Encryption Standard (ES-AES) algorithm has better security when compared to original Advance Encryption Standard (AES) algorithm.
    VL  - 5
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science, Unity University, Addis Ababa, Ethiopia

  • Department of Information Technology, College of Computing, Debre Berhan University, Debre Berhan, Ethiopia

  • Sections