Development of modified AES algorithm for data security
Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication to the wireless communication system. As there is need for secure communication, efficient cryptogra...
        Saved in:
      
    
          | Published in | Optik (Stuttgart) Vol. 127; no. 4; pp. 2341 - 2345 | 
|---|---|
| Main Authors | , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
            Elsevier GmbH
    
        01.02.2016
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 0030-4026 1618-1336  | 
| DOI | 10.1016/j.ijleo.2015.11.188 | 
Cover
| Abstract | Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication to the wireless communication system. As there is need for secure communication, efficient cryptographic processing is required for good system performance. One of the basic fundamental tools used in information security is known as the signature. Thus, the security for internet banking, account passwords, emails accounts password etc. requires text protection in digital media. This paper presents the security and compression for the data with the advance encryption standard (AES). In our research, we increase the number of rounds (Nr) to 16 for the encryption and decryption process of AES algorithm, which results in more security to the system. Experimental results and Theoretical analysis proved that this AES technique provide high speed as well as less transfer of data over the unsecured channels. | 
    
|---|---|
| AbstractList | Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication to the wireless communication system. As there is need for secure communication, efficient cryptographic processing is required for good system performance. One of the basic fundamental tools used in information security is known as the signature. Thus, the security for internet banking, account passwords, emails accounts password etc. requires text protection in digital media. This paper presents the security and compression for the data with the advance encryption standard (AES). In our research, we increase the number of rounds (Nr) to 16 for the encryption and decryption process of AES algorithm, which results in more security to the system. Experimental results and Theoretical analysis proved that this AES technique provide high speed as well as less transfer of data over the unsecured channels. | 
    
| Author | Kumar, Puneet Rana, Shashi B.  | 
    
| Author_xml | – sequence: 1 givenname: Puneet surname: Kumar fullname: Kumar, Puneet email: pkumar3397@gmail.com – sequence: 2 givenname: Shashi B. surname: Rana fullname: Rana, Shashi B. email: shashi_rana12@yahoo.co.in  | 
    
| BookMark | eNqFkMtOwzAQRS1UJNrCF7DJDyTMxImdLFhUpTykSiyAteXaE3CUxpVjKvXvSSkrFrAa6WrOle6ZsUnve2LsGiFDQHHTZq7tyGc5YJkhZlhVZ2yKAqsUORcTNgXgkBaQiws2G4YWAKQEOWXyjvbU-d2W-pj4Jtl66xpHNlmsXhLdvfvg4sc2aXxIrI46Gch8jtHhkp03uhvo6ufO2dv96nX5mK6fH56Wi3VqOPCYFtKCyLHmfKOrjdS2LG1VYJ2XhcCNhZqX3HBZVFgaQZoarrUAWViU41NT8TmrT70m-GEI1Cjjoo7O9zFo1ykEdTSgWvVtQB0NKEQ1GhhZ_ovdBbfV4fAPdXuiaJy1dxTUYBz1hqwLZKKy3v3JfwH5Nncs | 
    
| CitedBy_id | crossref_primary_10_1016_j_jksuci_2018_09_024 crossref_primary_10_4018_IJERTCS_2019040102 crossref_primary_10_1080_03772063_2020_1782781 crossref_primary_10_1108_AEAT_10_2023_0261 crossref_primary_10_3934_math_2024537 crossref_primary_10_3233_JIFS_191687 crossref_primary_10_1109_ACCESS_2020_3021055 crossref_primary_10_1155_2021_9961172 crossref_primary_10_1166_jmihi_2021_3888 crossref_primary_10_1109_ACCESS_2023_3267718 crossref_primary_10_1051_matecconf_202439201112 crossref_primary_10_1186_s12911_024_02548_6 crossref_primary_10_1007_s11042_017_4755_1 crossref_primary_10_1016_j_ijleo_2023_171253 crossref_primary_10_1088_1742_6596_1196_1_012049 crossref_primary_10_1007_s11276_020_02470_5 crossref_primary_10_1007_s11042_023_15289_x crossref_primary_10_1109_ACCESS_2021_3051556 crossref_primary_10_1016_j_micpro_2020_103041 crossref_primary_10_1155_2022_8424100 crossref_primary_10_3390_sym11121484 crossref_primary_10_1016_j_jksuci_2019_10_006 crossref_primary_10_1016_j_jksuci_2020_08_005 crossref_primary_10_1142_S0219649224500977 crossref_primary_10_2478_cait_2023_0036 crossref_primary_10_1007_s11042_020_10061_x crossref_primary_10_1007_s11227_024_06707_4 crossref_primary_10_37394_23207_2021_18_143 crossref_primary_10_1007_s11042_019_08086_y crossref_primary_10_2139_ssrn_4150686 crossref_primary_10_1155_2020_4676578 crossref_primary_10_1080_1206212X_2019_1710342 crossref_primary_10_21923_jesd_978517 crossref_primary_10_1007_s11277_021_08542_9 crossref_primary_10_1080_19361610_2020_1736458 crossref_primary_10_1007_s11277_020_07897_9 crossref_primary_10_1007_s11042_020_10308_7 crossref_primary_10_32604_iasc_2021_015129 crossref_primary_10_1002_spy2_230 crossref_primary_10_1049_cmu2_12756  | 
    
| Cites_doi | 10.1016/S0167-4048(02)00815-5 10.1109/TIT.1976.1055638 10.1145/1455526.1455531 10.1007/s11277-014-1888-7 10.1016/S0140-3664(97)00100-X  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2015 Elsevier GmbH | 
    
| Copyright_xml | – notice: 2015 Elsevier GmbH | 
    
| DBID | AAYXX CITATION  | 
    
| DOI | 10.1016/j.ijleo.2015.11.188 | 
    
| DatabaseName | CrossRef | 
    
| DatabaseTitle | CrossRef | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Physics | 
    
| EISSN | 1618-1336 | 
    
| EndPage | 2345 | 
    
| ExternalDocumentID | 10_1016_j_ijleo_2015_11_188 S0030402615018215  | 
    
| GroupedDBID | --K --M -~X .~1 0R~ 123 1B1 1RT 1~. 1~5 29N 4.4 457 4G. 53G 5VS 7-5 71M 8P~ AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABEFU ABFNM ABLJU ABMAC ABNEU ABTAH ABXDB ABYKQ ACDAQ ACFVG ACGFS ACNNM ACRLP ADBBV ADEZE ADMUD ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHJVU AIEXJ AIKHN AITUG AIVDX AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CAG COF CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 N9A O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ SDF SDG SES SEW SPC SPCBC SPD SSQ SST SSZ T5K TN5 VOH XOL ZY4 ~02 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD  | 
    
| ID | FETCH-LOGICAL-c303t-47d0621933ba8b7ad55d841925461bd09353c374815c6eaef3aa6074d17192f83 | 
    
| IEDL.DBID | .~1 | 
    
| ISSN | 0030-4026 | 
    
| IngestDate | Wed Oct 01 00:41:13 EDT 2025 Thu Apr 24 23:02:18 EDT 2025 Fri Feb 23 02:30:02 EST 2024  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 4 | 
    
| Keywords | Symmetric cipher Cryptography Symmetric key algorithm Advance encryption standard (AES)  | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c303t-47d0621933ba8b7ad55d841925461bd09353c374815c6eaef3aa6074d17192f83 | 
    
| PageCount | 5 | 
    
| ParticipantIDs | crossref_citationtrail_10_1016_j_ijleo_2015_11_188 crossref_primary_10_1016_j_ijleo_2015_11_188 elsevier_sciencedirect_doi_10_1016_j_ijleo_2015_11_188  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2016-02-01 | 
    
| PublicationDateYYYYMMDD | 2016-02-01 | 
    
| PublicationDate_xml | – month: 02 year: 2016 text: 2016-02-01 day: 01  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | Optik (Stuttgart) | 
    
| PublicationYear | 2016 | 
    
| Publisher | Elsevier GmbH | 
    
| Publisher_xml | – name: Elsevier GmbH | 
    
| References | Mandal, Parakash, Tiwari (bib0145) 2012 Gaspar, Drutarovsky, Fischer, Bochard (bib0155) 2009 Selimis, Fournaris, Koufopavlou (bib0160) 2006 Atallah, Blanton, Fazio, Frikken (bib0120) 2009; 12 Wadi, Zainal (bib0165) 2014 Kakkar, Singh, Bansal (bib0075) 2010; 2 Park, Yi, Choi (bib0150) 2011 Staling (bib0085) 2011 Goodwin, Wilson (bib0170) 2008 Kumar, Rana (bib0140) 2015; 5 Lin (bib0125) 1997; 20 Zhong (bib0130) 2002; 21 Schneier (bib0080) January 1996 Diffiee, Hellman (bib0135) 1976; IT–22 Selimis (10.1016/j.ijleo.2015.11.188_bib0160) 2006 Kumar (10.1016/j.ijleo.2015.11.188_bib0140) 2015; 5 Lin (10.1016/j.ijleo.2015.11.188_bib0125) 1997; 20 Mandal (10.1016/j.ijleo.2015.11.188_bib0145) 2012 Atallah (10.1016/j.ijleo.2015.11.188_bib0120) 2009; 12 Staling (10.1016/j.ijleo.2015.11.188_bib0085) 2011 Zhong (10.1016/j.ijleo.2015.11.188_bib0130) 2002; 21 Wadi (10.1016/j.ijleo.2015.11.188_bib0165) 2014 Diffiee (10.1016/j.ijleo.2015.11.188_bib0135) 1976; IT–22 Schneier (10.1016/j.ijleo.2015.11.188_bib0080) 1996 Goodwin (10.1016/j.ijleo.2015.11.188_bib0170) 2008 Gaspar (10.1016/j.ijleo.2015.11.188_bib0155) 2009 Park (10.1016/j.ijleo.2015.11.188_bib0150) 2011 Kakkar (10.1016/j.ijleo.2015.11.188_bib0075) 2010; 2  | 
    
| References_xml | – year: January 1996 ident: bib0080 article-title: Applied Cryptography – volume: 21 start-page: 750 year: 2002 end-page: 759 ident: bib0130 article-title: A practical key management scheme for access control in a user hierarchy publication-title: Comput. Secur. – volume: 12 start-page: 1 year: 2009 end-page: 43 ident: bib0120 article-title: Dynamic and efficient key management for access hierarchies publication-title: ACM Trans. Inf. Syst. Secur. – start-page: 474 year: 2011 end-page: 479 ident: bib0150 article-title: Methods for practical whitebox cryptography publication-title: IEEE Transaction Paper – start-page: 3286 year: 2008 end-page: 3289 ident: bib0170 article-title: Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead publication-title: IEEE Transaction Paper – start-page: 1 year: 2012 end-page: 5 ident: bib0145 article-title: Performance evaluation of cryptographic algorithms: DES and AES publication-title: IEEE Students’ Conference on Electrical, Electronics and Computer Science – start-page: 811 year: 2014 end-page: 829 ident: bib0165 article-title: High definition image encryption algorithm based on AES modification publication-title: Springer Wireless Commun. – start-page: 649 year: 2009 end-page: 653 ident: bib0155 article-title: Efficient AES S-boxes implementation for non-volatile FPGAS publication-title: IEEE Transaction paper – volume: 5 start-page: 227 year: 2015 end-page: 229 ident: bib0140 article-title: Development of modified Polybius technique for data security publication-title: Int. J. Innov. Eng. Technol. – start-page: 1088 year: 2006 end-page: 1092 ident: bib0160 article-title: Applying low power techniques in AES MixColumn/InvMixColumn Transformations publication-title: IEEE Transaction – year: 2011 ident: bib0085 article-title: Network Security Essentials: Applications & Standards – volume: 20 start-page: 1381 year: 1997 end-page: 1385 ident: bib0125 article-title: Dynamic key management schemes for access control in a hierarchy publication-title: Comput. Commun. – volume: IT–22 start-page: 644 year: 1976 end-page: 654 ident: bib0135 article-title: New directions in cryptography publication-title: IEEE Trans. Inf. Theory – volume: 2 start-page: 787 year: 2010 end-page: 795 ident: bib0075 article-title: Efficient key mechanisms in multinode network for secured data transmission publication-title: Int. J. Eng. Sci. Technol. – volume: 5 start-page: 227 year: 2015 ident: 10.1016/j.ijleo.2015.11.188_bib0140 article-title: Development of modified Polybius technique for data security publication-title: Int. J. Innov. Eng. Technol. – volume: 2 start-page: 787 issue: 5 year: 2010 ident: 10.1016/j.ijleo.2015.11.188_bib0075 article-title: Efficient key mechanisms in multinode network for secured data transmission publication-title: Int. J. Eng. Sci. Technol. – start-page: 1088 year: 2006 ident: 10.1016/j.ijleo.2015.11.188_bib0160 article-title: Applying low power techniques in AES MixColumn/InvMixColumn Transformations – year: 2011 ident: 10.1016/j.ijleo.2015.11.188_bib0085 – start-page: 649 year: 2009 ident: 10.1016/j.ijleo.2015.11.188_bib0155 article-title: Efficient AES S-boxes implementation for non-volatile FPGAS publication-title: IEEE Transaction paper – volume: 21 start-page: 750 issue: 8 year: 2002 ident: 10.1016/j.ijleo.2015.11.188_bib0130 article-title: A practical key management scheme for access control in a user hierarchy publication-title: Comput. Secur. doi: 10.1016/S0167-4048(02)00815-5 – start-page: 3286 year: 2008 ident: 10.1016/j.ijleo.2015.11.188_bib0170 article-title: Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead – start-page: 1 year: 2012 ident: 10.1016/j.ijleo.2015.11.188_bib0145 article-title: Performance evaluation of cryptographic algorithms: DES and AES – volume: IT–22 start-page: 644 issue: Nov year: 1976 ident: 10.1016/j.ijleo.2015.11.188_bib0135 article-title: New directions in cryptography publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1976.1055638 – volume: 12 start-page: 1 issue: 3 year: 2009 ident: 10.1016/j.ijleo.2015.11.188_bib0120 article-title: Dynamic and efficient key management for access hierarchies publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/1455526.1455531 – start-page: 811 year: 2014 ident: 10.1016/j.ijleo.2015.11.188_bib0165 article-title: High definition image encryption algorithm based on AES modification publication-title: Springer Wireless Commun. doi: 10.1007/s11277-014-1888-7 – year: 1996 ident: 10.1016/j.ijleo.2015.11.188_bib0080 – volume: 20 start-page: 1381 year: 1997 ident: 10.1016/j.ijleo.2015.11.188_bib0125 article-title: Dynamic key management schemes for access control in a hierarchy publication-title: Comput. Commun. doi: 10.1016/S0140-3664(97)00100-X – start-page: 474 year: 2011 ident: 10.1016/j.ijleo.2015.11.188_bib0150 article-title: Methods for practical whitebox cryptography  | 
    
| SSID | ssj0007707 | 
    
| Score | 2.3033953 | 
    
| Snippet | Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as... | 
    
| SourceID | crossref elsevier  | 
    
| SourceType | Enrichment Source Index Database Publisher  | 
    
| StartPage | 2341 | 
    
| SubjectTerms | Advance encryption standard (AES) Cryptography Symmetric cipher Symmetric key algorithm  | 
    
| Title | Development of modified AES algorithm for data security | 
    
| URI | https://dx.doi.org/10.1016/j.ijleo.2015.11.188 | 
    
| Volume | 127 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1618-1336 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007707 issn: 0030-4026 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1618-1336 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007707 issn: 0030-4026 databaseCode: ACRLP dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) customDbUrl: eissn: 1618-1336 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007707 issn: 0030-4026 databaseCode: .~1 dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection Journals customDbUrl: eissn: 1618-1336 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007707 issn: 0030-4026 databaseCode: AIKHN dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1618-1336 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0007707 issn: 0030-4026 databaseCode: AKRWK dateStart: 20010101 isFulltext: true providerName: Library Specific Holdings  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KRfAiPrE-yh48mrabx25yLKWlKvaihd7CvqIpbVJsvfrbnd1stIL04DFhBpIv4ZsZ9psZhG6TWCiS6diDdIB6IVe-x8OAe4woLRnxqU5Mv_PThI6n4cMsmjXQoO6FMbJKx_0Vp1u2dne6Ds3uKs9Njy-U4qaEMDPpfNtoHobMbDHofP7IPBirWqbB2NRKtJ48ZDVe-XxhOwBJBNTRIXb9yh_RaSvijI7QoUsVcb96mmPU0MUJ2reSTbk-RWxL74PLDC9LlWeQUOL-8BnzxWsJZf_bEkNSio0MFK_dprozNB0NXwZjz61B8CTEl40XMtWjQCxBIHgsGFdRpGJzeAvoEqHMSWYgzRQZEkmquc4CzilkBoowMMri4Bw1i7LQFwgLP5KSST_IIg11WSK0kqSXyERQToTOWsivXz-Vbka4WVWxSGsx2Dy1mKUGM6geUsCshe6-nVbViIzd5rTGNf31pVMg8V2Ol_91vEIHcOW01teouXn_0DeQSmxE2_4rbbTXv38cT74ApPLHIQ | 
    
| linkProvider | Elsevier | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEN4QjNGL8RnxuQePFti2u9seCZGgAhch4bbZVxUClAhe_e3O9qGYGA5e25mknTYz82W_bwahuzhShiQ28qAdYF4oje_JMJAeJ8ZqTnxmY6d37g9YdxQ-jem4gtqlFsbRKovcn-f0LFsXVxpFNBvLycRpfAGKOwjhZtL5Tmi-E1KfOwRW__zheXCea6bB2oElVo4eykhek-kskwASCrmjTrL9K3-Up42S0zlEB0WviFv54xyhil0co92Ms6lXJ4hvEH5wmuB5aiYJdJS49fCC5ew1Bdz_NsfQlWLHA8WrYlXdKRp1HobtrlfsQfA0FJi1F3LTZJBZgkDJSHFpKDWRO72F8BJl3FFmoN0YGUI1s9ImgZQMWgNDOBglUXCGqot0Yc8RVj7Vmms_SKgFYBYrazRpxjpWTBJlkxryy9cXuhgS7nZVzETJBpuKLGbCxQzgg4CY1dD9t9Myn5Gx3ZyVcRW_PrWALL7N8eK_jrdorzvs90TvcfB8ifbhTkG8vkLV9fuHvYa-Yq1usv_mC3tfyLY | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development+of+modified+AES+algorithm+for+data+security&rft.jtitle=Optik+%28Stuttgart%29&rft.au=Kumar%2C+Puneet&rft.au=Rana%2C+Shashi+B.&rft.date=2016-02-01&rft.issn=0030-4026&rft.volume=127&rft.issue=4&rft.spage=2341&rft.epage=2345&rft_id=info:doi/10.1016%2Fj.ijleo.2015.11.188&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ijleo_2015_11_188 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0030-4026&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0030-4026&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0030-4026&client=summon |