SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 137
Security Enhancement in Next Generation Networks using Enhanced
AES with RC4 and Dynamic S-box
Ripal Patel1, Vikas kaul2
1 PG Student
Information Technology, Thakur College of Engineering and Technology
2 Assistant Professor
Information Technology, Thakur College of Engineering and Technology
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Encryptionisprimarymethodofprotecting
valuable electronic information transmitted over the
networks. SSL/TLS can help tosecuretransmitteddata
using various encryption algorithms. AES is one of
ciphering algorithm which is used for encryption,
decryptionofdatatoprovideconfidentialityforend-to-
end data transmission. To provideend-to–endsecurity
TLS/SSL (Transport layer security) is used.
This paper presents an enhancement of AES algorithm
by converting static S-box into dynamic using RC4 and
key scheduling thus making the system resistant to
linear and differential cryptanalysis by preventing
repetition of cipher key.
To increase the complexity of system AES is to be used
in round structure. In round structure, AES S-box
changes in every round.
Comparison of the traditional and enhanced AES will
be made on the basis of encryption Time, decryption
time, CPU usage and throughput. Here focus is to
achieve speed compatible with next generation LTE
network.
Key Words: LTE; AES; S-box; Round structure; RC4
1. INTRODUCTION
The mobile communication systems and the wireless
communicationtechnologieshavebeenimprovingvery
fast day by day. During last few decades, mobile
communication has been developed very rapidly. The
first generation (1G) wireless mobile communication
network which started at early 1980 was analog
system which was used for public voice service. The
second generation (2G) was launched early 1990s it
was based on digital technology and network
infrastructure. As compared to the firstgeneration, the
second generation supports text messaging. 2.5G
networks appearedinyear1999-2000andbroughtthe
internet into personal communication. 3G was
introduced in year 2000. It provides higher data rate
and broader bandwidth and also providesapplications
in wireless voice telephony, mobile, internet access,
fixed wireless internet access, video calls and mobile
TV.
After the release of previous generations of wireless
networks 4G network is considered for security
enhancement and reliable communication. The 4G
wireless networks operates entirely on the TCP/IP, so
it becomes completely IP based. It provides facility to
transfer large amount of data at higher speed from
anywhere and anytime. As large amount of data is
transmitted, security of these data is needed over the
networks.
1.1 Advanced Encryption Standard
AES is also called as Rijndael .It is developed by Joan
Daemen and Vincent Rijmen. It is a symmetric-key
algorithm. AES is a block cipher with a block length of
128 bits. It allows for three different key lengths: 128,
192, or 256 bits. Encryption consists of 10 rounds of
processing for 128-bit keys, 12 rounds for 192- bit
keys, and 14 rounds for 256-bit keys except for thelast
round in each case, all other rounds are identical. For
encryption, each round consists four steps:
Substitution bytes, Shift row, Mix column and Add
round key. For decryption, each round consists of the
four steps: Inverse shift rows, Inverse substitutebytes,
Inverse mix columns and Add round key.
1.1 AES S-box
The Rijndael S-box (substitution box) is a matrix
(square array of numbers) used in the Advanced
EncryptionStandard (AES) cryptographicalgorithm.It
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 138
serves as a lookup table. Substitution is a nonlinear
transformationwhichperformsconfusionofbits.S-box
is represented as a 16x16 array, rows and columns
indexed by hexadecimal bits. TheS-boxisgeneratedby
determining the multiplicative inverse for a given
number in GF (28).
1.2 RC4
RC4 is designed by Rivest for RSA Data Security. It is a
variable Key–size stream cipher with byte-oriented
operations. The algorithm is used for random
permutation.
RC4 is used for file encryption and also used for secure
communications, as in encryption oftraffictoandfrom
secure website using the SSL/TLS protocol.
2. LITERATURE REVIEW
The whole literature reviewisfocusedonthefollowing
literary works being done by an array of scholars and
researchers from the field of network and data
security. The following papers are selected for review
keeping in mind the traditional and conventional
approaches of ciphering algorithms.
Q. Cheng, C.Chuanhui andW. Li (2006) discussedsome
core technology of 4G mobile system and showed the
comparison between 3G and 4G on the basis of
network structure, core network mobile terminal and
core technology. The paper (2013) explains LTE/SAE
security algorithm and procedure and also summarise
the LTE/SAE 3GcryptographyalgorithmslikeKASUMI,
SNOW-3G, Milenge and ZUC. Razi Hosseinkhani and H.
Haj Seyyed Javadi (2012) introduced new algorithm to
generate dynamic S-box from original S-box using
cipher key. Inyear2012,JuliaJuremi,RamlanMahmod,
Salasiah Sulaiman made AES S-box key dependent
using S-box rotation property to make AES stronger.
Here, only the S-box is made key-dependent without
changing the value. Krishnamurthy G N and V
Ramaswamy (2008) improved the security of AES by
making S-box key dependent without changing its
value and without changing the inverse S-box. The
algorithm ensures that no trapdoor was present in the
cipher and expands the keys space to slow down
attacks. S Shivkumar, Dr.G.Umamaheswai (2011) used
RC4 stream cipher and key expansion procedure to
generate S-boxes and S-box is rotated for each round
based on the value calculated from the round key. In
the paper (2012), Mona Dara and Kooroush
Manochehri generated key dependent flexible S-box.
The Dynamic S-box is generated using RC4 and key
scheduling algorithm. In the paper (2013) Vikas kaul,
Prerna choudhari and S.K Narayankhedkar improved
AES by converting static S-box into dynamic using
cipher key. AES is used in round Structure to increase
complexity ofsystem.Comparisonswasmadebetween
AES and enhanced system basis on performance
evaluation based on runtime and throughput.
3. PROPOSED SYSTEM
To enhance the secure data transmission in next
generation network and make system resistant to
attacks, AES cipher algorithm is used in proposed
system. The work focuses on enhancement of
encryption algorithm. Encryption of transmitted data.
To improve strength of cryptography system AES is
enhanced by making static S-box into dynamic using
RC4 and AES key scheduling. Round structure will be
used to increase complexity of system. RSA and SHA-
256 is used for key exchange and message
authentication respectively.
1. End-to-End security is provided in SSL/TLS using
AES for next generation networks.
2. Integrity of data can be provided using SHA-256
algorithm.
3. RSA is to be used for key exchange mechanism.
4. AES is further enhanced using making static S-box
dynamic using RC4 and AES key scheduling algorithm
to make more secure S-box by preventing repetition
of cipher key.
5. System can be made more complex by using AES
round structure.
6. Performance evaluation of system is to be done by
measuring encryption and decryption time and
throughput.
Fig -1: Proposed System
4. DESIGN METHODOLOGY
1. Input data and key length for enhanced AES is taken
256 bits.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 139
2. Encryption and decryption of proposed system is
same as original AES algorithm.
3. In proposed system S-box is made dynamic by using
RC4 and key expansion procedure.
Fig -2: AES Dynamic S-box
4. The key Expansion transformation takes key and
generates expanded key and output of the key pseudo
expansion algorithm i.e. expanded key is used to
generate S-box by RC4 key Schedule algorithm to
prevent the repetitions.
5. RC4 cipher generate different 256 values each time
depending upon input key.
6. Static S-box is converted into dynamic before sub
byte transformation stage using RC4 cipher and key
expansion .Inverse S-box also modified accordingly.
7. For round structure 256 bits input data is divided
into two blocks of 128 bits.
8. First block is given as input to AES section of the
system and second block is given as input to AES
section of system in the next round as per round
structure.
9. Process is continued until all the fixed number of
round for AES are completed.
10. 256 bits block of encrypted data is constructed by
combining these output all together.
Fig -3: AES in Round structure
4. EXPERIMENTAL RESULTS
File: “plaintext.txt”, Size: 144 bytes (1552 bits), Key:
12345678901234561234567890123456
Table -1: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Sr.
No
Algorithm Block
size
No. of
Blocks Encryption
Time(Sec)
Decryption
Time(Sec)
Pentium i3 Pentium i3
1
AES 128 12 0.067 0.028 0.082 0.033
2 Enhanced
AES
128 12 0.0679 0.029 0.083 0.035
3 Round
Structure
(1R)
256 6 0.037 0.016 0.0455 0.017
4 Round
structure
with
Enhanced
AES(1R)
256 6 0.041 0.017 0.0481 0.019
5 Round
structure
with
Enhanced
AES(5R)
256 6
0.16142 0.066 0.19174 0.079
6 Round
structure
with
Enhanced
AES(5R)
256 6
0.16216 0.075 0.20169 0.087
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 140
7 Round
Structure
(10R)
256 6 0.314 0.137 0.3916 0.166
8
Round
structure
with
Enhanced
AES (10R)
256 6 0.330 0.134 0.3955 0.165
0
0.1
0.2
0.3
0.4
0.5
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Pentium i3
Time
Encryption Time Decryption Time
Fig -4: Graphical representation of runtime of AES
algorithm for text file
Table -2: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Fig -5: Graphical representation of throughput of AES
algorithm for text file
File: “smily.jpg”, Size: 2.35 KB (19328 bits), Key:
12345678901234561234567890123456
Table -3: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Sr.
No
Algorithm Block
size
No. of
Blocks
Encryption Time
(Sec)
Decryption
Time (Sec)
Pentium i3 Pentium i3
1
AES 128 151 0.66 0.27 0.80 0.32
2 Enhanced
AES
128 151 0.66 0.28 0.81 0.34
3 Round
Structure
(1R)
256 76 0.33 0.13 0.41 0.16
4 Round
structure
with
Enhanced
AES (1R)
256 76 0.34 0.14 0.42 0.18
5 Round
structure
with
Enhanced
AES (5R)
256 76 1.65 0.67 1.95 0.83
6 Round
structure
with
Enhanced
AES (5R)
256 76
1.67 0.70 2.10 0.914
7 Round
Structure
(10R)
256 76 3.22 1.37 3.96 1.753
8 Round
structure
with
Enhanced
AES (10R)
256 76 3.38 1.46 4.08 1.853
Sr.
No
Algorith
m
Block
size
No. of
Blocks
Throughput
(kbps)
Encryption Time
Throughput
(kbps)
Decryption Time
Pentium i3 Pentium i3
1 AES 128 12 22.94 53.75 18.77 45.78
2 Enhanced
AES
128 12 22.82 52.59 18.62 43.84
3 Round
Structure
(1R)
256 6 41.240 92.93 34.079 114.0
4 Round
structure
with
Enhanced
AES (1R)
256 6 37.653 90.10 32.225 115.3
5 Round
structure
with
Enhanced
AES (5R)
256 6 9.6146 23.51 8.0942 19.60
6 Round
structure
with
Enhanced
AES (5R)
256 6 9.5707 20.59 7.69497 17.66
7 Round
Structure
(10R)
256 6 4.94 11.27 3.96 9.338
8 Round
structure
with
Enhanced
AES (10R)
256 6 4.69 11.57 3.92 9.371
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 141
0
1
2
3
4
5
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Pentium i3
Time
Encryption time decryption time
Fig -6: Graphical representation of runtime of AES
algorithm for image file
Table -4: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Sr.
No
Algorith
m
Block
size
No. of
Blocks
Throughput
(kbps)
Encryption Time
Throughput(kbps)
Decryption Time
Pentium i3 Pentium i3
1
AES 128 151 29.27 69.09 23.91 58.79
2 Enhanced
AES
128 151 28.96 67.91 23.82 56.02
3 Round
Structure
(1R)
256 76 58.51 137 46.10 114.8
4 Round
structure
with
Enhanced
AES (1R)
256 76 56.61 132.8 45.96 107
5 Round
Structure
(5R)
256 76 9.614 23.51 9.87 23.28
6 Round
structure
with
Enhanced
AES (5R)
256 76 9.57 20.59 9.18 21.14
5 Round
Structure
(10R)
256 76 4.94 11.27 6.00 14.05
6 Round
structure
with
Enhanced
AES(10R)
256 76 4.69 11.57 5.70 13.16
Fig -7: Graphical representation of throughput of AES
algorithm for image file
5. CONCLUSIONS
As large amountofdatatransmittedoverthenetworks,
end-to-end security of this data is important. Hence
SSL/TLS is used to provide secure data using AES
algorithm. Proposed work is based on enhancing AES
algorithm by converting static S-box into dynamic
using RC4 and key schedulingalgorithm.Complexityof
system is increased the by using an AES Round
structure. It provides better non linearity to the
original AES andbecauseofitsroundstructure,thereis
better diffusion. Aim behind increasing the complexity
is to provide bettersecurityandmakethesystemresist
to various kind of attacks.
Performance is evaluated based on conversion of Text
file and Image file and result calculation is done basis
of Encryption time decryption time, throughput.
REFERENCES
[1] Cheng, C.Chuanhui and W. Li, “A Study of Some Key
Technologies of 4G System”, IEEE conference on Industrial
Electronics and Applications and Technologies, pp. 2292-
2295, June 2008.
[2] A. Bikos, N. Sklavos, “LTE/SAE Security Issues on 4G
Wireless Networks”, IEEE Security & Privacy, vol. 11, no.2,
pp. 55-62, April 2013.
[3] N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, “Security
Advances and Challenges in 4G Wireless Networks,”
International Conference on Privacy, Security and
Trust(PST) IEEE, pp.62-71, Aug 2010.
[4] The Verizon Wireless 4G LTE Network: Transforming
Business with Next-Generation Technology, Verizon
Wireless, Http://business.verizonwireless.com.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 142
[5] Razi Hosseinkhani and H. Haj Seyyed Javadi, “Using
Cipher Key to Generate Dynamic S-Box in AES Cipher
System,” International Journal of Computer Science and
Security (IJCSS), vol. 6, no.1, pp.19-21, 2012.
[6] J. Juremi, R. Mahmod, S. Sulaiman, “A Proposal for
Improving AES S-box with Rotation and Key-dependent,”
Cyber Warfare and Digital Forensic (CyberSec)international
conference, 2012.
[7] Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, “Key-
Dependent S-Box Generation in AES Block Cipher System,”
INFORMATICA, vol. 20, no. 1, pp. 23–34, 2009.
[8] Krishnamurthy G N, V Ramaswamy,” Making AES
Stronger: AES with Key Dependent S-Box,” IJCSNS
International Journal of Computer Science and Network
Security, vol.8, no.9, pp. 388-398, Sept 2008.
[9] I.Abd-ElGhafar, A. Rohiem, A. Diaa, and F.Mohammed, “
Generation of AES dependent S-boxes usingRC4algorithm,”
13th International Conference on Aerospace Sciences &
Aviation Technology (ASAT-13), Military Technical College,
Cairo, Egypt, May 26-28, 2009.
[10] Mahmoud, E.M., El Hafez, A.B., Elgarf, T.A., Zekry, A,”
Dynamic AES-128 with key-dependent S-box, International
Journal of Engineering Research and Applications, vol. 3,
Issue 1, pp.1662-1670, Jan -Feb 2013.
[11]S.Shivkumar, and G.Umamaheswari, “Performance
comparison of Advanced Ecryption Standard (AES) and AES
key dependent S-box simulation usingmatlab,”International
Conference on Process Automation, Control and
Computing (PACC), 2011, pp. 1–6.
[12] M. Dara, K. Manochehri, “Using RC4andAESschedule to
generate Dynamic S-box in AES,” Information Security
Journal: A Global Perspective, vol. 23, pp.1-9, 2014.
[13] V. Kaul, P. Choudhari, S K Narayankhedkar, “Security
Enhancement for Data Transmission In 4G Networks,” IEEE
The Next Generation Information Technology Summit
(Confluence), Sept 2014, pp. 373-378.
[14]B.Forouzan,D.Mukhopadhyay ,”Cryptography and
Network Security,” 2nd edition, Pearson Education , 2010.

More Related Content

What's hot

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverijmnct
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptographyShivam Singh
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecuritySarthak Patel
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...IJERA Editor
 
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...IRJET Journal
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Alexander Decker
 

What's hot (19)

IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
WPA2
WPA2WPA2
WPA2
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
 
Final report
Final reportFinal report
Final report
 
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
 
Unit 5
Unit 5Unit 5
Unit 5
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 

Viewers also liked

IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET Journal
 
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety ApproachIRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety ApproachIRJET Journal
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET Journal
 
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...IRJET Journal
 
IRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between SentencesIRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between SentencesIRJET Journal
 
Custom connectorsinmule
Custom connectorsinmuleCustom connectorsinmule
Custom connectorsinmuleAjay Rana
 
CONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIACONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIAFrancisco Velasco
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft bodyIRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft bodyIRJET Journal
 
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET Journal
 
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter SystemIRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter SystemIRJET Journal
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A SurveyIRJET Journal
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...IRJET Journal
 
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...IRJET Journal
 
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET Journal
 
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- 	  Simulation based design and analysis of combined effect of various ...IRJET- 	  Simulation based design and analysis of combined effect of various ...
IRJET- Simulation based design and analysis of combined effect of various ...IRJET Journal
 
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...IRJET Journal
 
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET Journal
 

Viewers also liked (20)

IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag RelevanceIRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
 
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety ApproachIRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety Approach
 
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret KeyIRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
 
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
 
IRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between SentencesIRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between Sentences
 
Auto verkaufen
Auto verkaufenAuto verkaufen
Auto verkaufen
 
Custom connectorsinmule
Custom connectorsinmuleCustom connectorsinmule
Custom connectorsinmule
 
CONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIACONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIA
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft bodyIRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
 
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
 
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter SystemIRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
 
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
 
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
 
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- 	  Simulation based design and analysis of combined effect of various ...IRJET- 	  Simulation based design and analysis of combined effect of various ...
IRJET- Simulation based design and analysis of combined effect of various ...
 
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
 
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
 

Similar to IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box

An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmTELKOMNIKA JOURNAL
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different HardwareIRJET Journal
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...IJECEIAES
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETIRJET Journal
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...IRJET Journal
 
A hybrid modified lightweight algorithm for achieving data integrity and con...
A hybrid modified lightweight algorithm for achieving data  integrity and con...A hybrid modified lightweight algorithm for achieving data  integrity and con...
A hybrid modified lightweight algorithm for achieving data integrity and con...IJECEIAES
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithmeSAT Journals
 
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxDeepikaShivam
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map andjpstudcorner
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 

Similar to IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box (20)

An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard AlgorithmHigh throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESET
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
 
A hybrid modified lightweight algorithm for achieving data integrity and con...
A hybrid modified lightweight algorithm for achieving data  integrity and con...A hybrid modified lightweight algorithm for achieving data  integrity and con...
A hybrid modified lightweight algorithm for achieving data integrity and con...
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptxIMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
An encryption scheme using chaotic map and
An encryption scheme using chaotic map andAn encryption scheme using chaotic map and
An encryption scheme using chaotic map and
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 137 Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box Ripal Patel1, Vikas kaul2 1 PG Student Information Technology, Thakur College of Engineering and Technology 2 Assistant Professor Information Technology, Thakur College of Engineering and Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Encryptionisprimarymethodofprotecting valuable electronic information transmitted over the networks. SSL/TLS can help tosecuretransmitteddata using various encryption algorithms. AES is one of ciphering algorithm which is used for encryption, decryptionofdatatoprovideconfidentialityforend-to- end data transmission. To provideend-to–endsecurity TLS/SSL (Transport layer security) is used. This paper presents an enhancement of AES algorithm by converting static S-box into dynamic using RC4 and key scheduling thus making the system resistant to linear and differential cryptanalysis by preventing repetition of cipher key. To increase the complexity of system AES is to be used in round structure. In round structure, AES S-box changes in every round. Comparison of the traditional and enhanced AES will be made on the basis of encryption Time, decryption time, CPU usage and throughput. Here focus is to achieve speed compatible with next generation LTE network. Key Words: LTE; AES; S-box; Round structure; RC4 1. INTRODUCTION The mobile communication systems and the wireless communicationtechnologieshavebeenimprovingvery fast day by day. During last few decades, mobile communication has been developed very rapidly. The first generation (1G) wireless mobile communication network which started at early 1980 was analog system which was used for public voice service. The second generation (2G) was launched early 1990s it was based on digital technology and network infrastructure. As compared to the firstgeneration, the second generation supports text messaging. 2.5G networks appearedinyear1999-2000andbroughtthe internet into personal communication. 3G was introduced in year 2000. It provides higher data rate and broader bandwidth and also providesapplications in wireless voice telephony, mobile, internet access, fixed wireless internet access, video calls and mobile TV. After the release of previous generations of wireless networks 4G network is considered for security enhancement and reliable communication. The 4G wireless networks operates entirely on the TCP/IP, so it becomes completely IP based. It provides facility to transfer large amount of data at higher speed from anywhere and anytime. As large amount of data is transmitted, security of these data is needed over the networks. 1.1 Advanced Encryption Standard AES is also called as Rijndael .It is developed by Joan Daemen and Vincent Rijmen. It is a symmetric-key algorithm. AES is a block cipher with a block length of 128 bits. It allows for three different key lengths: 128, 192, or 256 bits. Encryption consists of 10 rounds of processing for 128-bit keys, 12 rounds for 192- bit keys, and 14 rounds for 256-bit keys except for thelast round in each case, all other rounds are identical. For encryption, each round consists four steps: Substitution bytes, Shift row, Mix column and Add round key. For decryption, each round consists of the four steps: Inverse shift rows, Inverse substitutebytes, Inverse mix columns and Add round key. 1.1 AES S-box The Rijndael S-box (substitution box) is a matrix (square array of numbers) used in the Advanced EncryptionStandard (AES) cryptographicalgorithm.It
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 138 serves as a lookup table. Substitution is a nonlinear transformationwhichperformsconfusionofbits.S-box is represented as a 16x16 array, rows and columns indexed by hexadecimal bits. TheS-boxisgeneratedby determining the multiplicative inverse for a given number in GF (28). 1.2 RC4 RC4 is designed by Rivest for RSA Data Security. It is a variable Key–size stream cipher with byte-oriented operations. The algorithm is used for random permutation. RC4 is used for file encryption and also used for secure communications, as in encryption oftraffictoandfrom secure website using the SSL/TLS protocol. 2. LITERATURE REVIEW The whole literature reviewisfocusedonthefollowing literary works being done by an array of scholars and researchers from the field of network and data security. The following papers are selected for review keeping in mind the traditional and conventional approaches of ciphering algorithms. Q. Cheng, C.Chuanhui andW. Li (2006) discussedsome core technology of 4G mobile system and showed the comparison between 3G and 4G on the basis of network structure, core network mobile terminal and core technology. The paper (2013) explains LTE/SAE security algorithm and procedure and also summarise the LTE/SAE 3GcryptographyalgorithmslikeKASUMI, SNOW-3G, Milenge and ZUC. Razi Hosseinkhani and H. Haj Seyyed Javadi (2012) introduced new algorithm to generate dynamic S-box from original S-box using cipher key. Inyear2012,JuliaJuremi,RamlanMahmod, Salasiah Sulaiman made AES S-box key dependent using S-box rotation property to make AES stronger. Here, only the S-box is made key-dependent without changing the value. Krishnamurthy G N and V Ramaswamy (2008) improved the security of AES by making S-box key dependent without changing its value and without changing the inverse S-box. The algorithm ensures that no trapdoor was present in the cipher and expands the keys space to slow down attacks. S Shivkumar, Dr.G.Umamaheswai (2011) used RC4 stream cipher and key expansion procedure to generate S-boxes and S-box is rotated for each round based on the value calculated from the round key. In the paper (2012), Mona Dara and Kooroush Manochehri generated key dependent flexible S-box. The Dynamic S-box is generated using RC4 and key scheduling algorithm. In the paper (2013) Vikas kaul, Prerna choudhari and S.K Narayankhedkar improved AES by converting static S-box into dynamic using cipher key. AES is used in round Structure to increase complexity ofsystem.Comparisonswasmadebetween AES and enhanced system basis on performance evaluation based on runtime and throughput. 3. PROPOSED SYSTEM To enhance the secure data transmission in next generation network and make system resistant to attacks, AES cipher algorithm is used in proposed system. The work focuses on enhancement of encryption algorithm. Encryption of transmitted data. To improve strength of cryptography system AES is enhanced by making static S-box into dynamic using RC4 and AES key scheduling. Round structure will be used to increase complexity of system. RSA and SHA- 256 is used for key exchange and message authentication respectively. 1. End-to-End security is provided in SSL/TLS using AES for next generation networks. 2. Integrity of data can be provided using SHA-256 algorithm. 3. RSA is to be used for key exchange mechanism. 4. AES is further enhanced using making static S-box dynamic using RC4 and AES key scheduling algorithm to make more secure S-box by preventing repetition of cipher key. 5. System can be made more complex by using AES round structure. 6. Performance evaluation of system is to be done by measuring encryption and decryption time and throughput. Fig -1: Proposed System 4. DESIGN METHODOLOGY 1. Input data and key length for enhanced AES is taken 256 bits.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 139 2. Encryption and decryption of proposed system is same as original AES algorithm. 3. In proposed system S-box is made dynamic by using RC4 and key expansion procedure. Fig -2: AES Dynamic S-box 4. The key Expansion transformation takes key and generates expanded key and output of the key pseudo expansion algorithm i.e. expanded key is used to generate S-box by RC4 key Schedule algorithm to prevent the repetitions. 5. RC4 cipher generate different 256 values each time depending upon input key. 6. Static S-box is converted into dynamic before sub byte transformation stage using RC4 cipher and key expansion .Inverse S-box also modified accordingly. 7. For round structure 256 bits input data is divided into two blocks of 128 bits. 8. First block is given as input to AES section of the system and second block is given as input to AES section of system in the next round as per round structure. 9. Process is continued until all the fixed number of round for AES are completed. 10. 256 bits block of encrypted data is constructed by combining these output all together. Fig -3: AES in Round structure 4. EXPERIMENTAL RESULTS File: “plaintext.txt”, Size: 144 bytes (1552 bits), Key: 12345678901234561234567890123456 Table -1: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorithm Block size No. of Blocks Encryption Time(Sec) Decryption Time(Sec) Pentium i3 Pentium i3 1 AES 128 12 0.067 0.028 0.082 0.033 2 Enhanced AES 128 12 0.0679 0.029 0.083 0.035 3 Round Structure (1R) 256 6 0.037 0.016 0.0455 0.017 4 Round structure with Enhanced AES(1R) 256 6 0.041 0.017 0.0481 0.019 5 Round structure with Enhanced AES(5R) 256 6 0.16142 0.066 0.19174 0.079 6 Round structure with Enhanced AES(5R) 256 6 0.16216 0.075 0.20169 0.087
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 140 7 Round Structure (10R) 256 6 0.314 0.137 0.3916 0.166 8 Round structure with Enhanced AES (10R) 256 6 0.330 0.134 0.3955 0.165 0 0.1 0.2 0.3 0.4 0.5 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Pentium i3 Time Encryption Time Decryption Time Fig -4: Graphical representation of runtime of AES algorithm for text file Table -2: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Fig -5: Graphical representation of throughput of AES algorithm for text file File: “smily.jpg”, Size: 2.35 KB (19328 bits), Key: 12345678901234561234567890123456 Table -3: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorithm Block size No. of Blocks Encryption Time (Sec) Decryption Time (Sec) Pentium i3 Pentium i3 1 AES 128 151 0.66 0.27 0.80 0.32 2 Enhanced AES 128 151 0.66 0.28 0.81 0.34 3 Round Structure (1R) 256 76 0.33 0.13 0.41 0.16 4 Round structure with Enhanced AES (1R) 256 76 0.34 0.14 0.42 0.18 5 Round structure with Enhanced AES (5R) 256 76 1.65 0.67 1.95 0.83 6 Round structure with Enhanced AES (5R) 256 76 1.67 0.70 2.10 0.914 7 Round Structure (10R) 256 76 3.22 1.37 3.96 1.753 8 Round structure with Enhanced AES (10R) 256 76 3.38 1.46 4.08 1.853 Sr. No Algorith m Block size No. of Blocks Throughput (kbps) Encryption Time Throughput (kbps) Decryption Time Pentium i3 Pentium i3 1 AES 128 12 22.94 53.75 18.77 45.78 2 Enhanced AES 128 12 22.82 52.59 18.62 43.84 3 Round Structure (1R) 256 6 41.240 92.93 34.079 114.0 4 Round structure with Enhanced AES (1R) 256 6 37.653 90.10 32.225 115.3 5 Round structure with Enhanced AES (5R) 256 6 9.6146 23.51 8.0942 19.60 6 Round structure with Enhanced AES (5R) 256 6 9.5707 20.59 7.69497 17.66 7 Round Structure (10R) 256 6 4.94 11.27 3.96 9.338 8 Round structure with Enhanced AES (10R) 256 6 4.69 11.57 3.92 9.371
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 141 0 1 2 3 4 5 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Pentium i3 Time Encryption time decryption time Fig -6: Graphical representation of runtime of AES algorithm for image file Table -4: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorith m Block size No. of Blocks Throughput (kbps) Encryption Time Throughput(kbps) Decryption Time Pentium i3 Pentium i3 1 AES 128 151 29.27 69.09 23.91 58.79 2 Enhanced AES 128 151 28.96 67.91 23.82 56.02 3 Round Structure (1R) 256 76 58.51 137 46.10 114.8 4 Round structure with Enhanced AES (1R) 256 76 56.61 132.8 45.96 107 5 Round Structure (5R) 256 76 9.614 23.51 9.87 23.28 6 Round structure with Enhanced AES (5R) 256 76 9.57 20.59 9.18 21.14 5 Round Structure (10R) 256 76 4.94 11.27 6.00 14.05 6 Round structure with Enhanced AES(10R) 256 76 4.69 11.57 5.70 13.16 Fig -7: Graphical representation of throughput of AES algorithm for image file 5. CONCLUSIONS As large amountofdatatransmittedoverthenetworks, end-to-end security of this data is important. Hence SSL/TLS is used to provide secure data using AES algorithm. Proposed work is based on enhancing AES algorithm by converting static S-box into dynamic using RC4 and key schedulingalgorithm.Complexityof system is increased the by using an AES Round structure. It provides better non linearity to the original AES andbecauseofitsroundstructure,thereis better diffusion. Aim behind increasing the complexity is to provide bettersecurityandmakethesystemresist to various kind of attacks. Performance is evaluated based on conversion of Text file and Image file and result calculation is done basis of Encryption time decryption time, throughput. REFERENCES [1] Cheng, C.Chuanhui and W. Li, “A Study of Some Key Technologies of 4G System”, IEEE conference on Industrial Electronics and Applications and Technologies, pp. 2292- 2295, June 2008. [2] A. Bikos, N. Sklavos, “LTE/SAE Security Issues on 4G Wireless Networks”, IEEE Security & Privacy, vol. 11, no.2, pp. 55-62, April 2013. [3] N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, “Security Advances and Challenges in 4G Wireless Networks,” International Conference on Privacy, Security and Trust(PST) IEEE, pp.62-71, Aug 2010. [4] The Verizon Wireless 4G LTE Network: Transforming Business with Next-Generation Technology, Verizon Wireless, Http://business.verizonwireless.com.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 142 [5] Razi Hosseinkhani and H. Haj Seyyed Javadi, “Using Cipher Key to Generate Dynamic S-Box in AES Cipher System,” International Journal of Computer Science and Security (IJCSS), vol. 6, no.1, pp.19-21, 2012. [6] J. Juremi, R. Mahmod, S. Sulaiman, “A Proposal for Improving AES S-box with Rotation and Key-dependent,” Cyber Warfare and Digital Forensic (CyberSec)international conference, 2012. [7] Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, “Key- Dependent S-Box Generation in AES Block Cipher System,” INFORMATICA, vol. 20, no. 1, pp. 23–34, 2009. [8] Krishnamurthy G N, V Ramaswamy,” Making AES Stronger: AES with Key Dependent S-Box,” IJCSNS International Journal of Computer Science and Network Security, vol.8, no.9, pp. 388-398, Sept 2008. [9] I.Abd-ElGhafar, A. Rohiem, A. Diaa, and F.Mohammed, “ Generation of AES dependent S-boxes usingRC4algorithm,” 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT-13), Military Technical College, Cairo, Egypt, May 26-28, 2009. [10] Mahmoud, E.M., El Hafez, A.B., Elgarf, T.A., Zekry, A,” Dynamic AES-128 with key-dependent S-box, International Journal of Engineering Research and Applications, vol. 3, Issue 1, pp.1662-1670, Jan -Feb 2013. [11]S.Shivkumar, and G.Umamaheswari, “Performance comparison of Advanced Ecryption Standard (AES) and AES key dependent S-box simulation usingmatlab,”International Conference on Process Automation, Control and Computing (PACC), 2011, pp. 1–6. [12] M. Dara, K. Manochehri, “Using RC4andAESschedule to generate Dynamic S-box in AES,” Information Security Journal: A Global Perspective, vol. 23, pp.1-9, 2014. [13] V. Kaul, P. Choudhari, S K Narayankhedkar, “Security Enhancement for Data Transmission In 4G Networks,” IEEE The Next Generation Information Technology Summit (Confluence), Sept 2014, pp. 373-378. [14]B.Forouzan,D.Mukhopadhyay ,”Cryptography and Network Security,” 2nd edition, Pearson Education , 2010.