Twin Key Implementation in Aes
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Register in December 2001. Rijndael’s has been standard by the NIST as the Advanced Encryption Standard (AES). This makes the AES essential and necessary for protection of data. We propose to reconfigure the structure of the advanced encryption standard (AES), especially in constant rotation and replaced it with variable rotation using a single key (Twins Key) that can be used for both ciphering and inverse ciphering. We demonstrate that changes can develop twin ciphers which are similar to the original one. The use of single key in AES helps to solve complexity faced during ciphering and deciphering, but it still maintains the same degree of Confusion and Diffusion. Confusion and diffusion make the use of key thus more very complex and very difficult to discover it. The use of a single key also makes this process more time efficient and variable rotation can protect data from continuous tries to attack encryption algorithm.
Authors and Affiliations
Himanshu Gupta
Classificationof Stages of Lung Cancer using Genetic Candidate Group Search Approach
Abstract: Cancer is one of the most commonly affected diseases in the progressing countries. Early diagnosis of cancer plays a significant role in curing cancer patients. Thousands of people every year die due to lung ca...
Opinion Search and Retrieval from WWW
Opinion retrieval has established itself as an important part of search engines ratings, opinion trends and representative opinions enrich the search experience ofusers when combined with traditional document ret...
Secure Code Based Mostly Information Forwarding System in Cloud Storage
Cloud Computing may be a technology that treats the resources on the net as a combined entity, a cloud. This project addresses the matter of forwarding information to a different user by storage servers directly ben...
Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that the...
Dynamic Query Form with query Refinement and Database encryption
Abstract: In the present circumstances real world databases contain thousands of attributes and relations. Access the information from this corpulent database is a nontrivial task and is an exploring area. Queries...