Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and da...
Saved in:
| Published in | International journal of computer network and information security Vol. 7; no. 4; pp. 14 - 20 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Hong Kong
Modern Education and Computer Science Press
08.03.2015
|
| Online Access | Get full text |
| ISSN | 2074-9090 2074-9104 2074-9104 |
| DOI | 10.5815/ijcnis.2015.04.02 |
Cover
| Summary: | With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 2074-9090 2074-9104 2074-9104 |
| DOI: | 10.5815/ijcnis.2015.04.02 |