Submit Search
Upload
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box
•
0 likes
•
77 views
IRJET Journal
Follow
https://www.irjet.net/archives/V4/i1/IRJET-V4I125.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Y36146148
Y36146148
IJERA Editor
Go3611771182
Go3611771182
IJERA Editor
Parc4 i parallel implementation of
Parc4 i parallel implementation of
caijjournal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
IDES Editor
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
Recommended
Y36146148
Y36146148
IJERA Editor
Go3611771182
Go3611771182
IJERA Editor
Parc4 i parallel implementation of
Parc4 i parallel implementation of
caijjournal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
IDES Editor
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Wpa2 psk security measure
Wpa2 psk security measure
Shivam Singh
WPA2
WPA2
Mshari Alabdulkarim
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
ijmnct
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
Lightweight cryptography
Lightweight cryptography
Shivam Singh
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
Keymanagement of ipsec
Keymanagement of ipsec
PACHIYAPPAN PACHIYAPPAS
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
Sarthak Patel
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
Final report
Final report
Jagbir Kalirai
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
IRJET Journal
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
Alexander Decker
Unit 5
Unit 5
Vinod Kumar Gorrepati
Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
IRJET Journal
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET Journal
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET Journal
More Related Content
What's hot
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Wpa2 psk security measure
Wpa2 psk security measure
Shivam Singh
WPA2
WPA2
Mshari Alabdulkarim
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
ijmnct
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
Lightweight cryptography
Lightweight cryptography
Shivam Singh
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
Keymanagement of ipsec
Keymanagement of ipsec
PACHIYAPPAN PACHIYAPPAS
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
Sarthak Patel
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
IJERA Editor
Final report
Final report
Jagbir Kalirai
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
IRJET Journal
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
Alexander Decker
Unit 5
Unit 5
Vinod Kumar Gorrepati
Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
What's hot
(19)
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
Wpa2 psk security measure
Wpa2 psk security measure
WPA2
WPA2
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
State of the art realistic cryptographic
State of the art realistic cryptographic
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
Lightweight cryptography
Lightweight cryptography
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
Keymanagement of ipsec
Keymanagement of ipsec
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Final report
Final report
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
Unit 5
Unit 5
Wpa vs Wpa2
Wpa vs Wpa2
Viewers also liked
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
IRJET Journal
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET Journal
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET Journal
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET Journal
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET Journal
IRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between Sentences
IRJET Journal
Auto verkaufen
Auto verkaufen
Köln Autoankauf
Custom connectorsinmule
Custom connectorsinmule
Ajay Rana
CONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIA
Francisco Velasco
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET Journal
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET Journal
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET Journal
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET Journal
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET Journal
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET Journal
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET Journal
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET Journal
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET Journal
Viewers also liked
(20)
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Semantic Similarity Between Sentences
IRJET-Semantic Similarity Between Sentences
Auto verkaufen
Auto verkaufen
Custom connectorsinmule
Custom connectorsinmule
CONCEPTOS BASICOS DE TECNOLOGIA
CONCEPTOS BASICOS DE TECNOLOGIA
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
Similar to IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
TELKOMNIKA JOURNAL
Ijcnc050208
Ijcnc050208
IJCNCJournal
Tdp.a029a10
Tdp.a029a10
Nithirekha
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
IJECEIAES
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESET
IRJET Journal
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
A hybrid modified lightweight algorithm for achieving data integrity and con...
A hybrid modified lightweight algorithm for achieving data integrity and con...
IJECEIAES
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
IRJET Journal
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
DeepikaShivam
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
IJET - International Journal of Engineering and Techniques
An encryption scheme using chaotic map and
An encryption scheme using chaotic map and
jpstudcorner
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
Similar to IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box
(20)
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
Ijcnc050208
Ijcnc050208
Tdp.a029a10
Tdp.a029a10
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESET
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
A hybrid modified lightweight algorithm for achieving data integrity and con...
A hybrid modified lightweight algorithm for achieving data integrity and con...
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Arm recognition encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
An encryption scheme using chaotic map and
An encryption scheme using chaotic map and
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
result management system report for college project
result management system report for college project
Tonystark477637
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Recently uploaded
(20)
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
result management system report for college project
result management system report for college project
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 137 Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box Ripal Patel1, Vikas kaul2 1 PG Student Information Technology, Thakur College of Engineering and Technology 2 Assistant Professor Information Technology, Thakur College of Engineering and Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Encryptionisprimarymethodofprotecting valuable electronic information transmitted over the networks. SSL/TLS can help tosecuretransmitteddata using various encryption algorithms. AES is one of ciphering algorithm which is used for encryption, decryptionofdatatoprovideconfidentialityforend-to- end data transmission. To provideend-to–endsecurity TLS/SSL (Transport layer security) is used. This paper presents an enhancement of AES algorithm by converting static S-box into dynamic using RC4 and key scheduling thus making the system resistant to linear and differential cryptanalysis by preventing repetition of cipher key. To increase the complexity of system AES is to be used in round structure. In round structure, AES S-box changes in every round. Comparison of the traditional and enhanced AES will be made on the basis of encryption Time, decryption time, CPU usage and throughput. Here focus is to achieve speed compatible with next generation LTE network. Key Words: LTE; AES; S-box; Round structure; RC4 1. INTRODUCTION The mobile communication systems and the wireless communicationtechnologieshavebeenimprovingvery fast day by day. During last few decades, mobile communication has been developed very rapidly. The first generation (1G) wireless mobile communication network which started at early 1980 was analog system which was used for public voice service. The second generation (2G) was launched early 1990s it was based on digital technology and network infrastructure. As compared to the firstgeneration, the second generation supports text messaging. 2.5G networks appearedinyear1999-2000andbroughtthe internet into personal communication. 3G was introduced in year 2000. It provides higher data rate and broader bandwidth and also providesapplications in wireless voice telephony, mobile, internet access, fixed wireless internet access, video calls and mobile TV. After the release of previous generations of wireless networks 4G network is considered for security enhancement and reliable communication. The 4G wireless networks operates entirely on the TCP/IP, so it becomes completely IP based. It provides facility to transfer large amount of data at higher speed from anywhere and anytime. As large amount of data is transmitted, security of these data is needed over the networks. 1.1 Advanced Encryption Standard AES is also called as Rijndael .It is developed by Joan Daemen and Vincent Rijmen. It is a symmetric-key algorithm. AES is a block cipher with a block length of 128 bits. It allows for three different key lengths: 128, 192, or 256 bits. Encryption consists of 10 rounds of processing for 128-bit keys, 12 rounds for 192- bit keys, and 14 rounds for 256-bit keys except for thelast round in each case, all other rounds are identical. For encryption, each round consists four steps: Substitution bytes, Shift row, Mix column and Add round key. For decryption, each round consists of the four steps: Inverse shift rows, Inverse substitutebytes, Inverse mix columns and Add round key. 1.1 AES S-box The Rijndael S-box (substitution box) is a matrix (square array of numbers) used in the Advanced EncryptionStandard (AES) cryptographicalgorithm.It
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 138 serves as a lookup table. Substitution is a nonlinear transformationwhichperformsconfusionofbits.S-box is represented as a 16x16 array, rows and columns indexed by hexadecimal bits. TheS-boxisgeneratedby determining the multiplicative inverse for a given number in GF (28). 1.2 RC4 RC4 is designed by Rivest for RSA Data Security. It is a variable Key–size stream cipher with byte-oriented operations. The algorithm is used for random permutation. RC4 is used for file encryption and also used for secure communications, as in encryption oftraffictoandfrom secure website using the SSL/TLS protocol. 2. LITERATURE REVIEW The whole literature reviewisfocusedonthefollowing literary works being done by an array of scholars and researchers from the field of network and data security. The following papers are selected for review keeping in mind the traditional and conventional approaches of ciphering algorithms. Q. Cheng, C.Chuanhui andW. Li (2006) discussedsome core technology of 4G mobile system and showed the comparison between 3G and 4G on the basis of network structure, core network mobile terminal and core technology. The paper (2013) explains LTE/SAE security algorithm and procedure and also summarise the LTE/SAE 3GcryptographyalgorithmslikeKASUMI, SNOW-3G, Milenge and ZUC. Razi Hosseinkhani and H. Haj Seyyed Javadi (2012) introduced new algorithm to generate dynamic S-box from original S-box using cipher key. Inyear2012,JuliaJuremi,RamlanMahmod, Salasiah Sulaiman made AES S-box key dependent using S-box rotation property to make AES stronger. Here, only the S-box is made key-dependent without changing the value. Krishnamurthy G N and V Ramaswamy (2008) improved the security of AES by making S-box key dependent without changing its value and without changing the inverse S-box. The algorithm ensures that no trapdoor was present in the cipher and expands the keys space to slow down attacks. S Shivkumar, Dr.G.Umamaheswai (2011) used RC4 stream cipher and key expansion procedure to generate S-boxes and S-box is rotated for each round based on the value calculated from the round key. In the paper (2012), Mona Dara and Kooroush Manochehri generated key dependent flexible S-box. The Dynamic S-box is generated using RC4 and key scheduling algorithm. In the paper (2013) Vikas kaul, Prerna choudhari and S.K Narayankhedkar improved AES by converting static S-box into dynamic using cipher key. AES is used in round Structure to increase complexity ofsystem.Comparisonswasmadebetween AES and enhanced system basis on performance evaluation based on runtime and throughput. 3. PROPOSED SYSTEM To enhance the secure data transmission in next generation network and make system resistant to attacks, AES cipher algorithm is used in proposed system. The work focuses on enhancement of encryption algorithm. Encryption of transmitted data. To improve strength of cryptography system AES is enhanced by making static S-box into dynamic using RC4 and AES key scheduling. Round structure will be used to increase complexity of system. RSA and SHA- 256 is used for key exchange and message authentication respectively. 1. End-to-End security is provided in SSL/TLS using AES for next generation networks. 2. Integrity of data can be provided using SHA-256 algorithm. 3. RSA is to be used for key exchange mechanism. 4. AES is further enhanced using making static S-box dynamic using RC4 and AES key scheduling algorithm to make more secure S-box by preventing repetition of cipher key. 5. System can be made more complex by using AES round structure. 6. Performance evaluation of system is to be done by measuring encryption and decryption time and throughput. Fig -1: Proposed System 4. DESIGN METHODOLOGY 1. Input data and key length for enhanced AES is taken 256 bits.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 139 2. Encryption and decryption of proposed system is same as original AES algorithm. 3. In proposed system S-box is made dynamic by using RC4 and key expansion procedure. Fig -2: AES Dynamic S-box 4. The key Expansion transformation takes key and generates expanded key and output of the key pseudo expansion algorithm i.e. expanded key is used to generate S-box by RC4 key Schedule algorithm to prevent the repetitions. 5. RC4 cipher generate different 256 values each time depending upon input key. 6. Static S-box is converted into dynamic before sub byte transformation stage using RC4 cipher and key expansion .Inverse S-box also modified accordingly. 7. For round structure 256 bits input data is divided into two blocks of 128 bits. 8. First block is given as input to AES section of the system and second block is given as input to AES section of system in the next round as per round structure. 9. Process is continued until all the fixed number of round for AES are completed. 10. 256 bits block of encrypted data is constructed by combining these output all together. Fig -3: AES in Round structure 4. EXPERIMENTAL RESULTS File: “plaintext.txt”, Size: 144 bytes (1552 bits), Key: 12345678901234561234567890123456 Table -1: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorithm Block size No. of Blocks Encryption Time(Sec) Decryption Time(Sec) Pentium i3 Pentium i3 1 AES 128 12 0.067 0.028 0.082 0.033 2 Enhanced AES 128 12 0.0679 0.029 0.083 0.035 3 Round Structure (1R) 256 6 0.037 0.016 0.0455 0.017 4 Round structure with Enhanced AES(1R) 256 6 0.041 0.017 0.0481 0.019 5 Round structure with Enhanced AES(5R) 256 6 0.16142 0.066 0.19174 0.079 6 Round structure with Enhanced AES(5R) 256 6 0.16216 0.075 0.20169 0.087
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 140 7 Round Structure (10R) 256 6 0.314 0.137 0.3916 0.166 8 Round structure with Enhanced AES (10R) 256 6 0.330 0.134 0.3955 0.165 0 0.1 0.2 0.3 0.4 0.5 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Pentium i3 Time Encryption Time Decryption Time Fig -4: Graphical representation of runtime of AES algorithm for text file Table -2: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Fig -5: Graphical representation of throughput of AES algorithm for text file File: “smily.jpg”, Size: 2.35 KB (19328 bits), Key: 12345678901234561234567890123456 Table -3: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorithm Block size No. of Blocks Encryption Time (Sec) Decryption Time (Sec) Pentium i3 Pentium i3 1 AES 128 151 0.66 0.27 0.80 0.32 2 Enhanced AES 128 151 0.66 0.28 0.81 0.34 3 Round Structure (1R) 256 76 0.33 0.13 0.41 0.16 4 Round structure with Enhanced AES (1R) 256 76 0.34 0.14 0.42 0.18 5 Round structure with Enhanced AES (5R) 256 76 1.65 0.67 1.95 0.83 6 Round structure with Enhanced AES (5R) 256 76 1.67 0.70 2.10 0.914 7 Round Structure (10R) 256 76 3.22 1.37 3.96 1.753 8 Round structure with Enhanced AES (10R) 256 76 3.38 1.46 4.08 1.853 Sr. No Algorith m Block size No. of Blocks Throughput (kbps) Encryption Time Throughput (kbps) Decryption Time Pentium i3 Pentium i3 1 AES 128 12 22.94 53.75 18.77 45.78 2 Enhanced AES 128 12 22.82 52.59 18.62 43.84 3 Round Structure (1R) 256 6 41.240 92.93 34.079 114.0 4 Round structure with Enhanced AES (1R) 256 6 37.653 90.10 32.225 115.3 5 Round structure with Enhanced AES (5R) 256 6 9.6146 23.51 8.0942 19.60 6 Round structure with Enhanced AES (5R) 256 6 9.5707 20.59 7.69497 17.66 7 Round Structure (10R) 256 6 4.94 11.27 3.96 9.338 8 Round structure with Enhanced AES (10R) 256 6 4.69 11.57 3.92 9.371
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 141 0 1 2 3 4 5 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Pentium i3 Time Encryption time decryption time Fig -6: Graphical representation of runtime of AES algorithm for image file Table -4: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorith m Block size No. of Blocks Throughput (kbps) Encryption Time Throughput(kbps) Decryption Time Pentium i3 Pentium i3 1 AES 128 151 29.27 69.09 23.91 58.79 2 Enhanced AES 128 151 28.96 67.91 23.82 56.02 3 Round Structure (1R) 256 76 58.51 137 46.10 114.8 4 Round structure with Enhanced AES (1R) 256 76 56.61 132.8 45.96 107 5 Round Structure (5R) 256 76 9.614 23.51 9.87 23.28 6 Round structure with Enhanced AES (5R) 256 76 9.57 20.59 9.18 21.14 5 Round Structure (10R) 256 76 4.94 11.27 6.00 14.05 6 Round structure with Enhanced AES(10R) 256 76 4.69 11.57 5.70 13.16 Fig -7: Graphical representation of throughput of AES algorithm for image file 5. CONCLUSIONS As large amountofdatatransmittedoverthenetworks, end-to-end security of this data is important. Hence SSL/TLS is used to provide secure data using AES algorithm. Proposed work is based on enhancing AES algorithm by converting static S-box into dynamic using RC4 and key schedulingalgorithm.Complexityof system is increased the by using an AES Round structure. It provides better non linearity to the original AES andbecauseofitsroundstructure,thereis better diffusion. Aim behind increasing the complexity is to provide bettersecurityandmakethesystemresist to various kind of attacks. Performance is evaluated based on conversion of Text file and Image file and result calculation is done basis of Encryption time decryption time, throughput. REFERENCES [1] Cheng, C.Chuanhui and W. Li, “A Study of Some Key Technologies of 4G System”, IEEE conference on Industrial Electronics and Applications and Technologies, pp. 2292- 2295, June 2008. [2] A. Bikos, N. Sklavos, “LTE/SAE Security Issues on 4G Wireless Networks”, IEEE Security & Privacy, vol. 11, no.2, pp. 55-62, April 2013. [3] N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, “Security Advances and Challenges in 4G Wireless Networks,” International Conference on Privacy, Security and Trust(PST) IEEE, pp.62-71, Aug 2010. [4] The Verizon Wireless 4G LTE Network: Transforming Business with Next-Generation Technology, Verizon Wireless, Http://business.verizonwireless.com.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 142 [5] Razi Hosseinkhani and H. Haj Seyyed Javadi, “Using Cipher Key to Generate Dynamic S-Box in AES Cipher System,” International Journal of Computer Science and Security (IJCSS), vol. 6, no.1, pp.19-21, 2012. [6] J. Juremi, R. Mahmod, S. Sulaiman, “A Proposal for Improving AES S-box with Rotation and Key-dependent,” Cyber Warfare and Digital Forensic (CyberSec)international conference, 2012. [7] Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, “Key- Dependent S-Box Generation in AES Block Cipher System,” INFORMATICA, vol. 20, no. 1, pp. 23–34, 2009. [8] Krishnamurthy G N, V Ramaswamy,” Making AES Stronger: AES with Key Dependent S-Box,” IJCSNS International Journal of Computer Science and Network Security, vol.8, no.9, pp. 388-398, Sept 2008. [9] I.Abd-ElGhafar, A. Rohiem, A. Diaa, and F.Mohammed, “ Generation of AES dependent S-boxes usingRC4algorithm,” 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT-13), Military Technical College, Cairo, Egypt, May 26-28, 2009. [10] Mahmoud, E.M., El Hafez, A.B., Elgarf, T.A., Zekry, A,” Dynamic AES-128 with key-dependent S-box, International Journal of Engineering Research and Applications, vol. 3, Issue 1, pp.1662-1670, Jan -Feb 2013. [11]S.Shivkumar, and G.Umamaheswari, “Performance comparison of Advanced Ecryption Standard (AES) and AES key dependent S-box simulation usingmatlab,”International Conference on Process Automation, Control and Computing (PACC), 2011, pp. 1–6. [12] M. Dara, K. Manochehri, “Using RC4andAESschedule to generate Dynamic S-box in AES,” Information Security Journal: A Global Perspective, vol. 23, pp.1-9, 2014. [13] V. Kaul, P. Choudhari, S K Narayankhedkar, “Security Enhancement for Data Transmission In 4G Networks,” IEEE The Next Generation Information Technology Summit (Confluence), Sept 2014, pp. 373-378. [14]B.Forouzan,D.Mukhopadhyay ,”Cryptography and Network Security,” 2nd edition, Pearson Education , 2010.
Download now