Enhanced AES-256 cipher round algorithm for IoT applications
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.1.22Keywords:
AES, Cryptography, Decryption, Enhanced security, EncryptionDimensions Badge
Issue
Section
Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by the addition of primitive operations which can withstand several attacks and is more efficient.Abstract
Method: AES works with three different key lengths: 128-bit keys, 192- bit keys, and 256-bit keys. The early rounds of AES have a poor diffusion rate. Better diffusion properties can be brought about by putting in additional operations in the cipher round and key generation algorithm of the conventional AES.
Findings: The diffusion characteristics of the conventional AES and the proposed methodology are compared using the avalanche effect. The proposed AES algorithm shows an increased avalanche effect, which proves it to be more secure than the conventional AES. The proposed algorithm is executed on Vivado 2016.2 ISE Design Suite and the results are targeted on Zybo–Zynq Z-7010 AP SoC development board.
Novelty: In addition, this paper also proposes an improved AES algorithm that was accomplished by altering the sub-bytes operation. This change was made to make it more reliant on round keys. This algorithm was also extended to a higher key length of 256 bits which makes the algorithm less vulnerable to attacks.
How to Cite
Downloads
Similar Articles
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Milindkumar N. Dandale, Amar P. Yadav, P. S. K. Reddy, Seema G. Kadu, Madhusudana T, Manthan S. Manavadaria, Deep learning enhanced drug discovery for novel biomaterials in regenerative medicine utilizing graph neural network approach for predicting cellular responses , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- A. Tamilmani, K. Muthuramalingam, An enhanced support vector machine bbased multiclass classification method for crop prediction , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- P. Susai Raj, A. Edward William Benjamin, Evaluating the effectiveness of academic resilience intervention for at-risk students at higher secondary level , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Lakshminarayani A, A Shaik Abdul Khadir, A blockchain-integrated smart healthcare framework utilizing dynamic hunting leadership algorithm with deep learning-based disease detection and classification model , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Virendra Chavda, Bhavesh J. Parmar, Urvi Zalavadia, Assessment of Omni channel retailing characteristics and its effect on consumer buying intention , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- D. Prabakar, Santhosh Kumar D.R., R.S. Kumar, Chitra M., Somasundaram K., S.D.P. Ragavendiran, Narayan K. Vyas, Task offloading and trajectory control techniques in unmanned aerial vehicles with Internet of Things – An exhaustive review , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.

