Enhanced AES-256 cipher round algorithm for IoT applications
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.1.22Keywords:
AES, Cryptography, Decryption, Enhanced security, EncryptionDimensions Badge
Issue
Section
Objectives: Networks have become a significant mode of communication in recent years. As a result, internet security has become a critical requirement for secure information exchange. Cryptography is used to securely send passwords over large networks. Cryptographic algorithms are sequences of processes used to encipher and decipher messages in a cryptographic system. One of those is the Advanced Encryption Standard (AES), which is a standard for data encryption in hardware and software to hide sensitive and vital information. The main objective is to design an AES system with modifications by the addition of primitive operations which can withstand several attacks and is more efficient.Abstract
Method: AES works with three different key lengths: 128-bit keys, 192- bit keys, and 256-bit keys. The early rounds of AES have a poor diffusion rate. Better diffusion properties can be brought about by putting in additional operations in the cipher round and key generation algorithm of the conventional AES.
Findings: The diffusion characteristics of the conventional AES and the proposed methodology are compared using the avalanche effect. The proposed AES algorithm shows an increased avalanche effect, which proves it to be more secure than the conventional AES. The proposed algorithm is executed on Vivado 2016.2 ISE Design Suite and the results are targeted on Zybo–Zynq Z-7010 AP SoC development board.
Novelty: In addition, this paper also proposes an improved AES algorithm that was accomplished by altering the sub-bytes operation. This change was made to make it more reliant on round keys. This algorithm was also extended to a higher key length of 256 bits which makes the algorithm less vulnerable to attacks.
How to Cite
Downloads
Similar Articles
- Amanda Q. Okronipa, Jones Y. Nyame, Adoption of health information systems in emerging economies: Evidence from Ghana , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Krishna P. Kalyanathaya, Krishna Prasad K, A framework for generating explanations of machine learning models in Fintech industry , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Tewoderos Legesse, Bekelech Sharew, Evaluation of white seeded sesame (Sesamum indicium L.) genotypes on growth and yield performance in Menit Goldya Woreda of West Omo Zone, SWE , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Firdaus Benazir, Reena Mohanka, S Rehan Ahmad, Trichoderma atrobrunneum: In vitro analysis of exoenzyme activity and antagonistic potential against plant pathogen from agricultural fields in the Patna region, India , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- V. Parimala, D. Ganeshkumar, Solar energy-driven water distillation with nanoparticle integration for enhanced efficiency, sustainability, and potable water production in arid regions , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Prakash Lakhani, Premasish Roy, Souren Koner, Deepa Nair, D. Patil, Mona Sinha, Exploring the influence of work-life balance on employee engagement in Mumbai’s real estate industry , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Porselvi, D. Kanchana, Beulah Jackson, L. Vigneash, Dynamic resource management for 6G vehicular networks: CORA-6G offloading and allocation strategies , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Ellakkiya Mathanraj, Ravi N. Reddy, Enhanced principal component gradient round-robin load balancing in cloud computing , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.