Enhanced AES-256 cipher round algorithm for IoT applications
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.1.22Keywords:
AES, Cryptography, Decryption, Enhanced security, EncryptionDimensions Badge
Issue
Section
Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by the addition of primitive operations which can withstand several attacks and is more efficient.Abstract
Method: AES works with three different key lengths: 128-bit keys, 192- bit keys, and 256-bit keys. The early rounds of AES have a poor diffusion rate. Better diffusion properties can be brought about by putting in additional operations in the cipher round and key generation algorithm of the conventional AES.
Findings: The diffusion characteristics of the conventional AES and the proposed methodology are compared using the avalanche effect. The proposed AES algorithm shows an increased avalanche effect, which proves it to be more secure than the conventional AES. The proposed algorithm is executed on Vivado 2016.2 ISE Design Suite and the results are targeted on Zybo–Zynq Z-7010 AP SoC development board.
Novelty: In addition, this paper also proposes an improved AES algorithm that was accomplished by altering the sub-bytes operation. This change was made to make it more reliant on round keys. This algorithm was also extended to a higher key length of 256 bits which makes the algorithm less vulnerable to attacks.
How to Cite
Downloads
Similar Articles
- Atal Bihari Bajpai, Pragati Misra, Manjul Diman, Indra Rautela, Rajesh Rayal, Kamlesh Jeena, Manish Dev Sharma, Study on the Chemical Composition and Antioxidant Activity of Extracts from Wild and in vitro Raised Endangered Medicinal Plant Ephedra gerardiana , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- R. Porselvi, D. Kanchana, Beulah Jackson, L. Vigneash, Dynamic resource management for 6G vehicular networks: CORA-6G offloading and allocation strategies , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- O. Devipriya, K. Kungumaraj, Enhancing cloud efficiency: an intelligent virtual machine selection and migration approach for VM consolidation , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Murugaraju P, A. Edward William Benjamin, Efficacy of multimedia courseware in achievement in Mathematics , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- M. Monika, J. Merline Vinotha, Optimization of a Lean Vendor–Buyer Supply Chain Model under Neutrosophic Fuzzy Environment with Transportation, Loading, and Unloading Considerations , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
You may also start an advanced similarity search for this article.

