SlideShare a Scribd company logo
1 of 3
Download to read offline
ACEEE Int. J. on Network Security , Vol. 03, No. 04, Oct 2012

A Probabilistic Approach towards the Prevention of
Error Propagation Effect of AES and Realization
Thereof
B. Sarkar1, C. T. Bhunia2, U. Maulik3
1

Dr. B. C. Roy Engineering College, Durgapur, India
E-mail: sarkar.bikramjit@gmail.com
2
National Institute of Technology, Arunachal Pradesh, India & International Centre for Theoretical Physics, Italy.
E-mail: directornitap@gmail.com,
3
Jadavpur University, Kolkata, India
E-mail: ujjwal_maulik@yahoo.com
Abstract–Error propagation effect of Advanced Encryption
Standard (AES) is a great research challenge. AES suffers
from a major limitation of Error propagation effect. In
literature, several studies have been made on this issue and
several techniques are suggested to tackle the effect. To tackle
this limitation, two methods are available. One is Redundancy
Based Technique and the other one is Bite Based Parity
Technique. The first one has a significant advantage of
correcting any error on definite term over the second one but
at the cost of higher level of overhead and hence lowering the
processing speed. In this paper we have proposed a probabilistic
technique to combat the Error Propagation Effect, which
definitely guarantees a secured communication.

II. PROPOSED SCHEME
We get the cipher text from the plain text after the AES
encryption of 10 rounds. Here we consider that both the
block size (plain text) and the key size are of 128 bits.
The proposed scheme suggests that first the plain text
should be encrypted odd number of times, say n, with the
same key. As a consequence, n number of cipher text would
be generated. Now it is assumed that the probability of
occurrence of a single bit error amidst the rounds must not
reach 0.5 so that out of n cipher texts at most (n – 1)/2 number
of cipher texts may be erroneous whereas the least number of
error free cipher texts is (n + 1)/2 out of n. After getting n
cipher texts, Majority Rule is applied over them and as a
result the error free cipher text is achieved and is to transmit
to the secured channel. It should be noted that since the
number of error free cipher texts is higher than that of the
erroneous ciphers, the Majority Rule applied will always
culminate in the generation of the error free cipher. The
proposed scheme would be made more transparent through
a suitable block diagram shown in Figure 1.

Index Terms–AES, encryption, decryption, bit error, error
propagation, majority rule, secured communication.

I. INTRODUCTION
DES (Data Encryption Standard) was the sole authority
of the Symmetric encryption schemes. Due to several recent
past reports of failure [1, 2] of security or key of DES, AES
(Advance Encryption Standard) has been developed as a
supplement of DES. The supplement has aimed to provide
higher level of security mainly with higher key size. Besides
the higher level of security, AES has aimed to provide higher
efficiency and better flexibility by means of encryption at
different levels and with different block sizes [3]. But AES
suffers from a major limitation of error propagation in the
encryption process. The AES encryption is done at several
rounds of iteration. Each round of iteration has different input data and different keys. The input data and the keys of
different round are all generated from the original source data
and the source key respectively. Thus the input data and the
keys at rounds follow a data path and key path respectively.
Any bit error(s) at any round, if occurs either at the data path
or at the key path, results in the propagation of the error
leading to the generation of huge errors at the output cipher.
The research [4, 5] reported this limitation of AES in their
authoritative work. In the thesis work we have proposed a
probabilistic approach for the prevention of the Error Propagation Effect of AES, which definitely guarantees a secured
communication.
© 2012 ACEEE
DOI: 01.IJNS.3.4. 2

Proposed Algorithm: SBM 1.2
1. Input the plain text (original message) P of 128 bits.
2. Encrypt the plain text n number of times with AES
Encryptor to find ciphers {Ci, i = 1 to n}, n being
odd.
3. Majority rule is applied over Ci to find the error-free
cipher text C which may directly be transmitted
through the channel.
III. EXPERIMENTAL RESULT
We have conducted the experiment with the following
128-bit plain text:
B

i

k

r

a

m

j

i

t

S

a

r

k

a

r

Below are the corresponding Hexadecimal values:
42 69 6B 72 61 6D 6A 69 74 20 53 61 72 6B 61 72
The message (plain text) is encrypted through a 128-bit
Cipher key having the corresponding Hex values as follows:
2B 28 AB 09 7E AE F7 CF 15 D2 15 4F 16 A6 88 3C
1
ACEEE Int. J. on Network Security , Vol. 03, No. 04, Oct 2012
for the same. In addition to the higher speed, the other
advantage of the parallel scheme is that the probability of
occurrence of errors in all the encryptors at the same time is
very less.

Figure 1. Block Diagram of the proposed scheme

Figure 2. Block Diagram of the parallel architecture

When there is no error injected/generated, the above
mentioned plain text is transformed into the following cipher
text (Hex values shown) with the above mentioned key:
FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0
We conduct the experiment where the plain text is
encrypted thrice, i.e., the value of n taken in the current
experiment is 3 and according to the proposed scheme, not
more than one cipher text can be erroneous and two others
are quite error free. Now we forcibly inject a one bit error after
the first round and as a result the following erroneous cipher
text (Hex values shown) is generated:
24 E2 C9 55 1C 30 E0 58 5D D7 3C 64 EA 2F CA F7
Whereas other two ciphers are error free and are as follows
(Hex values shown):
FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0
Now Majority Rule is applied to the three cipher texts
listed below:
24 E2 C9 55 1C 30 E0 58 5D D7 3C 64 EA 2F CA F7

CONCLUSION
In this paper we have proposed a probabilistic approach
towards the prevention of the Error Propagation of Effect.
The proposed scheme suggests that n must be odd and the
probability of occurrence of a single bit error amidst the rounds
of AES encryption must not reach 0.5. That means the number
of error free cipher texts is always greater than that of
erroneous cipher texts, which ensures that the majority Rule,
if applied to the n number of cipher texts generated, will always
generate the error free cipher text. It can also be realized that
with the increase in the number (n) of cipher texts, the scheme
guarantees reliable communication on its part, even with the
occurrence of error with higher probability (0.5 * (1 – 1/n));
that means, if n increases the tolerance also increases. Yet a
tread off is required. In case of the parallel scheme, since the
number of encryptors increases, the hardware complexity
increases. Yet the scheme is a superior one.

FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0

REFERENCE

FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0

[1] NIST, “Announcing the ADVANCED ENCRYPTION
STANDARD (AES)”, Federal Information Processing
Standards Publication, No.197, 26 Nov’2001.
[2] Chandan T Bhunia, “Information Technology, Networks and
Internet”, New Age International Publishers, New Delhi, 2005.
[3] G. Bertoni, L. Breveglieri, I. Koren, and V. Piuri, “Fault
Detection in the Advanced Encryption Standard,” Proc. Conf.
Massively Parallel Computing Systems (MPCS ’02), pp. 9297, 2002.
[4] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri,
“On the Propagation of Faults and Their Detection in a
Hardware Implementation of the Advanced Encryption

And as a result, the following string is realized:
FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0
And this is nothing but the error free cipher text.
The parallel architecture of the proposed scheme is shown
in Figure 2. Here n numbers of AES Encryptor is used in order
to minimize the time of the encryption of the plain text. If t is
the time required for a single encryption process, the parallel
architecture will take t time for n numbers of encryption
processes where as the previous architecture takes n.t time
© 2012 ACEEE
DOI: 01.IJNS.3.4.2

2
ACEEE Int. J. on Network Security , Vol. 03, No. 04, Oct 2012
[6] Chandin T Bhunia et al. Project Work on AES Error Propagation,
ISM, Deemed University, India, June’2004.
[7] C T Bhunia, New Approaches for Selective AES towards
Tackling Error Propagation Effect of AES, Asian J of
Information Technology, Pakistan, Vol 5, No. 9, pp 10171022, 2006.
[8] Tom Lookabaugh et al, “Selective Encryption for Consumer
Applications”, IEEE Communication Magazine, Vol 42, no 5,
pp.124-129, April, 2004.

Standard,” Proc. Int’l Conf. Application-Specific Systems,
Architectures, and Processors (ASAP ’02), pp. 303-312, 2002.
[5] Guido Bertoni et al. “Error analysis and Detection Procedures
for a Hardware Implementation of the Advanced Encryption
Standard”, IEEE Trans on Computers, Vol 52, No 4, pp 492504, April’2004.

© 2012 ACEEE
DOI: 01.IJNS.3.4. 2

3

More Related Content

What's hot

Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 

What's hot (20)

Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
Encrypted Negative Password using for Authentication
Encrypted Negative Password using for AuthenticationEncrypted Negative Password using for Authentication
Encrypted Negative Password using for Authentication
 
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
 
Message authentication between the nodes
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 

Viewers also liked

02 probabilistic inference in graphical models
02 probabilistic inference in graphical models02 probabilistic inference in graphical models
02 probabilistic inference in graphical models
zukun
 
Siwei lyu: natural image statistics
Siwei lyu: natural image statisticsSiwei lyu: natural image statistics
Siwei lyu: natural image statistics
zukun
 
Wilczynski_BNFinder_BOSC2009
Wilczynski_BNFinder_BOSC2009Wilczynski_BNFinder_BOSC2009
Wilczynski_BNFinder_BOSC2009
bosc
 
cBio Cancer Genomics Portal: Getting started
cBio Cancer Genomics Portal:  Getting startedcBio Cancer Genomics Portal:  Getting started
cBio Cancer Genomics Portal: Getting started
Ethan Cerami
 

Viewers also liked (15)

Cold chill (1)
Cold chill (1)Cold chill (1)
Cold chill (1)
 
Mãn nhãn với 5 căn hộ vừa đẹp, vừa tiện nghi ở hà nội
Mãn nhãn với 5 căn hộ vừa đẹp, vừa tiện nghi ở hà nộiMãn nhãn với 5 căn hộ vừa đẹp, vừa tiện nghi ở hà nội
Mãn nhãn với 5 căn hộ vừa đẹp, vừa tiện nghi ở hà nội
 
Your decision
Your decisionYour decision
Your decision
 
02 probabilistic inference in graphical models
02 probabilistic inference in graphical models02 probabilistic inference in graphical models
02 probabilistic inference in graphical models
 
老師與教學助理的互動經驗分享 1010217
老師與教學助理的互動經驗分享 1010217老師與教學助理的互動經驗分享 1010217
老師與教學助理的互動經驗分享 1010217
 
Routing for Sensors with Parameters as used in Agricultural Field
Routing for Sensors with Parameters as used in Agricultural FieldRouting for Sensors with Parameters as used in Agricultural Field
Routing for Sensors with Parameters as used in Agricultural Field
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
C Sharp Einfuehrung Teil 1
C Sharp Einfuehrung Teil 1C Sharp Einfuehrung Teil 1
C Sharp Einfuehrung Teil 1
 
Towards Embedded Computer Vision - New @ 2013
Towards Embedded Computer Vision - New @ 2013Towards Embedded Computer Vision - New @ 2013
Towards Embedded Computer Vision - New @ 2013
 
Siwei lyu: natural image statistics
Siwei lyu: natural image statisticsSiwei lyu: natural image statistics
Siwei lyu: natural image statistics
 
Wilczynski_BNFinder_BOSC2009
Wilczynski_BNFinder_BOSC2009Wilczynski_BNFinder_BOSC2009
Wilczynski_BNFinder_BOSC2009
 
Variational inference
Variational inferenceVariational inference
Variational inference
 
07 approximate inference in bn
07 approximate inference in bn07 approximate inference in bn
07 approximate inference in bn
 
cBio Cancer Genomics Portal: Getting started
cBio Cancer Genomics Portal:  Getting startedcBio Cancer Genomics Portal:  Getting started
cBio Cancer Genomics Portal: Getting started
 
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
Understanding your data with Bayesian networks (in Python) by Bartek Wilczyns...
 

Similar to A Probabilistic Approach towards the Prevention of Error Propagation Effect of AES and Realization Thereof

Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
IJECEIAES
 
Error Propagation Effect of AES and Techniques to ward off the problem
Error Propagation Effect of AES and Techniques to ward off the problemError Propagation Effect of AES and Techniques to ward off the problem
Error Propagation Effect of AES and Techniques to ward off the problem
Bikramjit Sarkar, Ph.D.
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
IJCNCJournal
 
Physical layer security and energy efficiency over different error correcting...
Physical layer security and energy efficiency over different error correcting...Physical layer security and energy efficiency over different error correcting...
Physical layer security and energy efficiency over different error correcting...
IJECEIAES
 

Similar to A Probabilistic Approach towards the Prevention of Error Propagation Effect of AES and Realization Thereof (20)

Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
Error Propagation Effect of AES and Techniques to ward off the problem
Error Propagation Effect of AES and Techniques to ward off the problemError Propagation Effect of AES and Techniques to ward off the problem
Error Propagation Effect of AES and Techniques to ward off the problem
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
20320140501004 2-3-4-5-6
20320140501004 2-3-4-5-620320140501004 2-3-4-5-6
20320140501004 2-3-4-5-6
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithms
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
Physical layer security and energy efficiency over different error correcting...
Physical layer security and energy efficiency over different error correcting...Physical layer security and energy efficiency over different error correcting...
Physical layer security and energy efficiency over different error correcting...
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 

More from IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

A Probabilistic Approach towards the Prevention of Error Propagation Effect of AES and Realization Thereof

  • 1. ACEEE Int. J. on Network Security , Vol. 03, No. 04, Oct 2012 A Probabilistic Approach towards the Prevention of Error Propagation Effect of AES and Realization Thereof B. Sarkar1, C. T. Bhunia2, U. Maulik3 1 Dr. B. C. Roy Engineering College, Durgapur, India E-mail: sarkar.bikramjit@gmail.com 2 National Institute of Technology, Arunachal Pradesh, India & International Centre for Theoretical Physics, Italy. E-mail: directornitap@gmail.com, 3 Jadavpur University, Kolkata, India E-mail: ujjwal_maulik@yahoo.com Abstract–Error propagation effect of Advanced Encryption Standard (AES) is a great research challenge. AES suffers from a major limitation of Error propagation effect. In literature, several studies have been made on this issue and several techniques are suggested to tackle the effect. To tackle this limitation, two methods are available. One is Redundancy Based Technique and the other one is Bite Based Parity Technique. The first one has a significant advantage of correcting any error on definite term over the second one but at the cost of higher level of overhead and hence lowering the processing speed. In this paper we have proposed a probabilistic technique to combat the Error Propagation Effect, which definitely guarantees a secured communication. II. PROPOSED SCHEME We get the cipher text from the plain text after the AES encryption of 10 rounds. Here we consider that both the block size (plain text) and the key size are of 128 bits. The proposed scheme suggests that first the plain text should be encrypted odd number of times, say n, with the same key. As a consequence, n number of cipher text would be generated. Now it is assumed that the probability of occurrence of a single bit error amidst the rounds must not reach 0.5 so that out of n cipher texts at most (n – 1)/2 number of cipher texts may be erroneous whereas the least number of error free cipher texts is (n + 1)/2 out of n. After getting n cipher texts, Majority Rule is applied over them and as a result the error free cipher text is achieved and is to transmit to the secured channel. It should be noted that since the number of error free cipher texts is higher than that of the erroneous ciphers, the Majority Rule applied will always culminate in the generation of the error free cipher. The proposed scheme would be made more transparent through a suitable block diagram shown in Figure 1. Index Terms–AES, encryption, decryption, bit error, error propagation, majority rule, secured communication. I. INTRODUCTION DES (Data Encryption Standard) was the sole authority of the Symmetric encryption schemes. Due to several recent past reports of failure [1, 2] of security or key of DES, AES (Advance Encryption Standard) has been developed as a supplement of DES. The supplement has aimed to provide higher level of security mainly with higher key size. Besides the higher level of security, AES has aimed to provide higher efficiency and better flexibility by means of encryption at different levels and with different block sizes [3]. But AES suffers from a major limitation of error propagation in the encryption process. The AES encryption is done at several rounds of iteration. Each round of iteration has different input data and different keys. The input data and the keys of different round are all generated from the original source data and the source key respectively. Thus the input data and the keys at rounds follow a data path and key path respectively. Any bit error(s) at any round, if occurs either at the data path or at the key path, results in the propagation of the error leading to the generation of huge errors at the output cipher. The research [4, 5] reported this limitation of AES in their authoritative work. In the thesis work we have proposed a probabilistic approach for the prevention of the Error Propagation Effect of AES, which definitely guarantees a secured communication. © 2012 ACEEE DOI: 01.IJNS.3.4. 2 Proposed Algorithm: SBM 1.2 1. Input the plain text (original message) P of 128 bits. 2. Encrypt the plain text n number of times with AES Encryptor to find ciphers {Ci, i = 1 to n}, n being odd. 3. Majority rule is applied over Ci to find the error-free cipher text C which may directly be transmitted through the channel. III. EXPERIMENTAL RESULT We have conducted the experiment with the following 128-bit plain text: B i k r a m j i t S a r k a r Below are the corresponding Hexadecimal values: 42 69 6B 72 61 6D 6A 69 74 20 53 61 72 6B 61 72 The message (plain text) is encrypted through a 128-bit Cipher key having the corresponding Hex values as follows: 2B 28 AB 09 7E AE F7 CF 15 D2 15 4F 16 A6 88 3C 1
  • 2. ACEEE Int. J. on Network Security , Vol. 03, No. 04, Oct 2012 for the same. In addition to the higher speed, the other advantage of the parallel scheme is that the probability of occurrence of errors in all the encryptors at the same time is very less. Figure 1. Block Diagram of the proposed scheme Figure 2. Block Diagram of the parallel architecture When there is no error injected/generated, the above mentioned plain text is transformed into the following cipher text (Hex values shown) with the above mentioned key: FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0 We conduct the experiment where the plain text is encrypted thrice, i.e., the value of n taken in the current experiment is 3 and according to the proposed scheme, not more than one cipher text can be erroneous and two others are quite error free. Now we forcibly inject a one bit error after the first round and as a result the following erroneous cipher text (Hex values shown) is generated: 24 E2 C9 55 1C 30 E0 58 5D D7 3C 64 EA 2F CA F7 Whereas other two ciphers are error free and are as follows (Hex values shown): FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0 Now Majority Rule is applied to the three cipher texts listed below: 24 E2 C9 55 1C 30 E0 58 5D D7 3C 64 EA 2F CA F7 CONCLUSION In this paper we have proposed a probabilistic approach towards the prevention of the Error Propagation of Effect. The proposed scheme suggests that n must be odd and the probability of occurrence of a single bit error amidst the rounds of AES encryption must not reach 0.5. That means the number of error free cipher texts is always greater than that of erroneous cipher texts, which ensures that the majority Rule, if applied to the n number of cipher texts generated, will always generate the error free cipher text. It can also be realized that with the increase in the number (n) of cipher texts, the scheme guarantees reliable communication on its part, even with the occurrence of error with higher probability (0.5 * (1 – 1/n)); that means, if n increases the tolerance also increases. Yet a tread off is required. In case of the parallel scheme, since the number of encryptors increases, the hardware complexity increases. Yet the scheme is a superior one. FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0 REFERENCE FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0 [1] NIST, “Announcing the ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication, No.197, 26 Nov’2001. [2] Chandan T Bhunia, “Information Technology, Networks and Internet”, New Age International Publishers, New Delhi, 2005. [3] G. Bertoni, L. Breveglieri, I. Koren, and V. Piuri, “Fault Detection in the Advanced Encryption Standard,” Proc. Conf. Massively Parallel Computing Systems (MPCS ’02), pp. 9297, 2002. [4] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, “On the Propagation of Faults and Their Detection in a Hardware Implementation of the Advanced Encryption And as a result, the following string is realized: FC 41 16 48 BE C0 16 A7 FC 5C 3F 43 F4 13 F4 A0 And this is nothing but the error free cipher text. The parallel architecture of the proposed scheme is shown in Figure 2. Here n numbers of AES Encryptor is used in order to minimize the time of the encryption of the plain text. If t is the time required for a single encryption process, the parallel architecture will take t time for n numbers of encryption processes where as the previous architecture takes n.t time © 2012 ACEEE DOI: 01.IJNS.3.4.2 2
  • 3. ACEEE Int. J. on Network Security , Vol. 03, No. 04, Oct 2012 [6] Chandin T Bhunia et al. Project Work on AES Error Propagation, ISM, Deemed University, India, June’2004. [7] C T Bhunia, New Approaches for Selective AES towards Tackling Error Propagation Effect of AES, Asian J of Information Technology, Pakistan, Vol 5, No. 9, pp 10171022, 2006. [8] Tom Lookabaugh et al, “Selective Encryption for Consumer Applications”, IEEE Communication Magazine, Vol 42, no 5, pp.124-129, April, 2004. Standard,” Proc. Int’l Conf. Application-Specific Systems, Architectures, and Processors (ASAP ’02), pp. 303-312, 2002. [5] Guido Bertoni et al. “Error analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard”, IEEE Trans on Computers, Vol 52, No 4, pp 492504, April’2004. © 2012 ACEEE DOI: 01.IJNS.3.4. 2 3