Twin Key Implementation in Aes
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: In February 2001, NIST announced that a draft of the Federal Information Processing Standard (FIPS) was available for public review and comment. Finally, AES was published as FIPS 197 in the Federal Register in December 2001. Rijndaelās has been standard by the NIST as the Advanced Encryption Standard (AES). This makes the AES essential and necessary for protection of data. We propose to reconfigure the structure of the advanced encryption standard (AES), especially in constant rotation and replaced it with variable rotation using a single key (Twins Key) that can be used for both ciphering and inverse ciphering. We demonstrate that changes can develop twin ciphers which are similar to the original one. The use of single key in AES helps to solve complexity faced during ciphering and deciphering, but it still maintains the same degree of Confusion and Diffusion. Confusion and diffusion make the use of key thus more very complex and very difficult to discover it. The use of a single key also makes this process more time efficient and variable rotation can protect data from continuous tries to attack encryption algorithm.
Authors and Affiliations
Himanshu Gupta
Positional Prediction of Individuals Present In a Crime Scene
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tr...
Socio Media Connect: A Social Profile based P2P Network
Abstract: It is observed that users tend to like and follow a particular type music/movies based on their socialinterests. Users like music of particular artists, album; movies/TV shows of a particular actor, direc...
ASRMalNets: Acknowledgement Based Secure Routing Scheme for Malicious MANETs
Abstract: A m o b i l e ad hoc network is a wireless commu- nication network, where communicating nodes are notwithin direct transmission range of each other. Since the radio links between t h e nodes b r e a k fre...
Lip Recognition for Authentication and Security
Abstract: Lip is used as an identifier from person to person as the size of the upper and lower lips, furrows, grooves, the distances between the lines and the edges vary individualistically. These unique parameter...
Green Computing and Energy Consumption Issues in the Modern Age
Green computing concept is to improve environmental condition. The main aim of green computing is to reduce toxic materials. We systematically analyze its energy consumption which is based on types of &nbs...