Development of modified AES algorithm for data security

Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication to the wireless communication system. As there is need for secure communication, efficient cryptogra...

Full description

Saved in:
Bibliographic Details
Published inOptik (Stuttgart) Vol. 127; no. 4; pp. 2341 - 2345
Main Authors Kumar, Puneet, Rana, Shashi B.
Format Journal Article
LanguageEnglish
Published Elsevier GmbH 01.02.2016
Subjects
Online AccessGet full text
ISSN0030-4026
1618-1336
DOI10.1016/j.ijleo.2015.11.188

Cover

Abstract Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication to the wireless communication system. As there is need for secure communication, efficient cryptographic processing is required for good system performance. One of the basic fundamental tools used in information security is known as the signature. Thus, the security for internet banking, account passwords, emails accounts password etc. requires text protection in digital media. This paper presents the security and compression for the data with the advance encryption standard (AES). In our research, we increase the number of rounds (Nr) to 16 for the encryption and decryption process of AES algorithm, which results in more security to the system. Experimental results and Theoretical analysis proved that this AES technique provide high speed as well as less transfer of data over the unsecured channels.
AbstractList Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as confidentiality, data integrity or authentication to the wireless communication system. As there is need for secure communication, efficient cryptographic processing is required for good system performance. One of the basic fundamental tools used in information security is known as the signature. Thus, the security for internet banking, account passwords, emails accounts password etc. requires text protection in digital media. This paper presents the security and compression for the data with the advance encryption standard (AES). In our research, we increase the number of rounds (Nr) to 16 for the encryption and decryption process of AES algorithm, which results in more security to the system. Experimental results and Theoretical analysis proved that this AES technique provide high speed as well as less transfer of data over the unsecured channels.
Author Kumar, Puneet
Rana, Shashi B.
Author_xml – sequence: 1
  givenname: Puneet
  surname: Kumar
  fullname: Kumar, Puneet
  email: pkumar3397@gmail.com
– sequence: 2
  givenname: Shashi B.
  surname: Rana
  fullname: Rana, Shashi B.
  email: shashi_rana12@yahoo.co.in
BookMark eNqFkMtOwzAQRS1UJNrCF7DJDyTMxImdLFhUpTykSiyAteXaE3CUxpVjKvXvSSkrFrAa6WrOle6ZsUnve2LsGiFDQHHTZq7tyGc5YJkhZlhVZ2yKAqsUORcTNgXgkBaQiws2G4YWAKQEOWXyjvbU-d2W-pj4Jtl66xpHNlmsXhLdvfvg4sc2aXxIrI46Gch8jtHhkp03uhvo6ufO2dv96nX5mK6fH56Wi3VqOPCYFtKCyLHmfKOrjdS2LG1VYJ2XhcCNhZqX3HBZVFgaQZoarrUAWViU41NT8TmrT70m-GEI1Cjjoo7O9zFo1ykEdTSgWvVtQB0NKEQ1GhhZ_ovdBbfV4fAPdXuiaJy1dxTUYBz1hqwLZKKy3v3JfwH5Nncs
CitedBy_id crossref_primary_10_1016_j_jksuci_2018_09_024
crossref_primary_10_4018_IJERTCS_2019040102
crossref_primary_10_1080_03772063_2020_1782781
crossref_primary_10_1108_AEAT_10_2023_0261
crossref_primary_10_3934_math_2024537
crossref_primary_10_3233_JIFS_191687
crossref_primary_10_1109_ACCESS_2020_3021055
crossref_primary_10_1155_2021_9961172
crossref_primary_10_1166_jmihi_2021_3888
crossref_primary_10_1109_ACCESS_2023_3267718
crossref_primary_10_1051_matecconf_202439201112
crossref_primary_10_1186_s12911_024_02548_6
crossref_primary_10_1007_s11042_017_4755_1
crossref_primary_10_1016_j_ijleo_2023_171253
crossref_primary_10_1088_1742_6596_1196_1_012049
crossref_primary_10_1007_s11276_020_02470_5
crossref_primary_10_1007_s11042_023_15289_x
crossref_primary_10_1109_ACCESS_2021_3051556
crossref_primary_10_1016_j_micpro_2020_103041
crossref_primary_10_1155_2022_8424100
crossref_primary_10_3390_sym11121484
crossref_primary_10_1016_j_jksuci_2019_10_006
crossref_primary_10_1016_j_jksuci_2020_08_005
crossref_primary_10_1142_S0219649224500977
crossref_primary_10_2478_cait_2023_0036
crossref_primary_10_1007_s11042_020_10061_x
crossref_primary_10_1007_s11227_024_06707_4
crossref_primary_10_37394_23207_2021_18_143
crossref_primary_10_1007_s11042_019_08086_y
crossref_primary_10_2139_ssrn_4150686
crossref_primary_10_1155_2020_4676578
crossref_primary_10_1080_1206212X_2019_1710342
crossref_primary_10_21923_jesd_978517
crossref_primary_10_1007_s11277_021_08542_9
crossref_primary_10_1080_19361610_2020_1736458
crossref_primary_10_1007_s11277_020_07897_9
crossref_primary_10_1007_s11042_020_10308_7
crossref_primary_10_32604_iasc_2021_015129
crossref_primary_10_1002_spy2_230
crossref_primary_10_1049_cmu2_12756
Cites_doi 10.1016/S0167-4048(02)00815-5
10.1109/TIT.1976.1055638
10.1145/1455526.1455531
10.1007/s11277-014-1888-7
10.1016/S0140-3664(97)00100-X
ContentType Journal Article
Copyright 2015 Elsevier GmbH
Copyright_xml – notice: 2015 Elsevier GmbH
DBID AAYXX
CITATION
DOI 10.1016/j.ijleo.2015.11.188
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 1618-1336
EndPage 2345
ExternalDocumentID 10_1016_j_ijleo_2015_11_188
S0030402615018215
GroupedDBID --K
--M
-~X
.~1
0R~
123
1B1
1RT
1~.
1~5
29N
4.4
457
4G.
53G
5VS
7-5
71M
8P~
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABEFU
ABFNM
ABLJU
ABMAC
ABNEU
ABTAH
ABXDB
ABYKQ
ACDAQ
ACFVG
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADMUD
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHJVU
AIEXJ
AIKHN
AITUG
AIVDX
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CAG
COF
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
SDF
SDG
SES
SEW
SPC
SPCBC
SPD
SSQ
SST
SSZ
T5K
TN5
VOH
XOL
ZY4
~02
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c303t-47d0621933ba8b7ad55d841925461bd09353c374815c6eaef3aa6074d17192f83
IEDL.DBID .~1
ISSN 0030-4026
IngestDate Wed Oct 01 00:41:13 EDT 2025
Thu Apr 24 23:02:18 EDT 2025
Fri Feb 23 02:30:02 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Symmetric cipher
Cryptography
Symmetric key algorithm
Advance encryption standard (AES)
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c303t-47d0621933ba8b7ad55d841925461bd09353c374815c6eaef3aa6074d17192f83
PageCount 5
ParticipantIDs crossref_citationtrail_10_1016_j_ijleo_2015_11_188
crossref_primary_10_1016_j_ijleo_2015_11_188
elsevier_sciencedirect_doi_10_1016_j_ijleo_2015_11_188
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-02-01
PublicationDateYYYYMMDD 2016-02-01
PublicationDate_xml – month: 02
  year: 2016
  text: 2016-02-01
  day: 01
PublicationDecade 2010
PublicationTitle Optik (Stuttgart)
PublicationYear 2016
Publisher Elsevier GmbH
Publisher_xml – name: Elsevier GmbH
References Mandal, Parakash, Tiwari (bib0145) 2012
Gaspar, Drutarovsky, Fischer, Bochard (bib0155) 2009
Selimis, Fournaris, Koufopavlou (bib0160) 2006
Atallah, Blanton, Fazio, Frikken (bib0120) 2009; 12
Wadi, Zainal (bib0165) 2014
Kakkar, Singh, Bansal (bib0075) 2010; 2
Park, Yi, Choi (bib0150) 2011
Staling (bib0085) 2011
Goodwin, Wilson (bib0170) 2008
Kumar, Rana (bib0140) 2015; 5
Lin (bib0125) 1997; 20
Zhong (bib0130) 2002; 21
Schneier (bib0080) January 1996
Diffiee, Hellman (bib0135) 1976; IT–22
Selimis (10.1016/j.ijleo.2015.11.188_bib0160) 2006
Kumar (10.1016/j.ijleo.2015.11.188_bib0140) 2015; 5
Lin (10.1016/j.ijleo.2015.11.188_bib0125) 1997; 20
Mandal (10.1016/j.ijleo.2015.11.188_bib0145) 2012
Atallah (10.1016/j.ijleo.2015.11.188_bib0120) 2009; 12
Staling (10.1016/j.ijleo.2015.11.188_bib0085) 2011
Zhong (10.1016/j.ijleo.2015.11.188_bib0130) 2002; 21
Wadi (10.1016/j.ijleo.2015.11.188_bib0165) 2014
Diffiee (10.1016/j.ijleo.2015.11.188_bib0135) 1976; IT–22
Schneier (10.1016/j.ijleo.2015.11.188_bib0080) 1996
Goodwin (10.1016/j.ijleo.2015.11.188_bib0170) 2008
Gaspar (10.1016/j.ijleo.2015.11.188_bib0155) 2009
Park (10.1016/j.ijleo.2015.11.188_bib0150) 2011
Kakkar (10.1016/j.ijleo.2015.11.188_bib0075) 2010; 2
References_xml – year: January 1996
  ident: bib0080
  article-title: Applied Cryptography
– volume: 21
  start-page: 750
  year: 2002
  end-page: 759
  ident: bib0130
  article-title: A practical key management scheme for access control in a user hierarchy
  publication-title: Comput. Secur.
– volume: 12
  start-page: 1
  year: 2009
  end-page: 43
  ident: bib0120
  article-title: Dynamic and efficient key management for access hierarchies
  publication-title: ACM Trans. Inf. Syst. Secur.
– start-page: 474
  year: 2011
  end-page: 479
  ident: bib0150
  article-title: Methods for practical whitebox cryptography
  publication-title: IEEE Transaction Paper
– start-page: 3286
  year: 2008
  end-page: 3289
  ident: bib0170
  article-title: Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead
  publication-title: IEEE Transaction Paper
– start-page: 1
  year: 2012
  end-page: 5
  ident: bib0145
  article-title: Performance evaluation of cryptographic algorithms: DES and AES
  publication-title: IEEE Students’ Conference on Electrical, Electronics and Computer Science
– start-page: 811
  year: 2014
  end-page: 829
  ident: bib0165
  article-title: High definition image encryption algorithm based on AES modification
  publication-title: Springer Wireless Commun.
– start-page: 649
  year: 2009
  end-page: 653
  ident: bib0155
  article-title: Efficient AES S-boxes implementation for non-volatile FPGAS
  publication-title: IEEE Transaction paper
– volume: 5
  start-page: 227
  year: 2015
  end-page: 229
  ident: bib0140
  article-title: Development of modified Polybius technique for data security
  publication-title: Int. J. Innov. Eng. Technol.
– start-page: 1088
  year: 2006
  end-page: 1092
  ident: bib0160
  article-title: Applying low power techniques in AES MixColumn/InvMixColumn Transformations
  publication-title: IEEE Transaction
– year: 2011
  ident: bib0085
  article-title: Network Security Essentials: Applications & Standards
– volume: 20
  start-page: 1381
  year: 1997
  end-page: 1385
  ident: bib0125
  article-title: Dynamic key management schemes for access control in a hierarchy
  publication-title: Comput. Commun.
– volume: IT–22
  start-page: 644
  year: 1976
  end-page: 654
  ident: bib0135
  article-title: New directions in cryptography
  publication-title: IEEE Trans. Inf. Theory
– volume: 2
  start-page: 787
  year: 2010
  end-page: 795
  ident: bib0075
  article-title: Efficient key mechanisms in multinode network for secured data transmission
  publication-title: Int. J. Eng. Sci. Technol.
– volume: 5
  start-page: 227
  year: 2015
  ident: 10.1016/j.ijleo.2015.11.188_bib0140
  article-title: Development of modified Polybius technique for data security
  publication-title: Int. J. Innov. Eng. Technol.
– volume: 2
  start-page: 787
  issue: 5
  year: 2010
  ident: 10.1016/j.ijleo.2015.11.188_bib0075
  article-title: Efficient key mechanisms in multinode network for secured data transmission
  publication-title: Int. J. Eng. Sci. Technol.
– start-page: 1088
  year: 2006
  ident: 10.1016/j.ijleo.2015.11.188_bib0160
  article-title: Applying low power techniques in AES MixColumn/InvMixColumn Transformations
– year: 2011
  ident: 10.1016/j.ijleo.2015.11.188_bib0085
– start-page: 649
  year: 2009
  ident: 10.1016/j.ijleo.2015.11.188_bib0155
  article-title: Efficient AES S-boxes implementation for non-volatile FPGAS
  publication-title: IEEE Transaction paper
– volume: 21
  start-page: 750
  issue: 8
  year: 2002
  ident: 10.1016/j.ijleo.2015.11.188_bib0130
  article-title: A practical key management scheme for access control in a user hierarchy
  publication-title: Comput. Secur.
  doi: 10.1016/S0167-4048(02)00815-5
– start-page: 3286
  year: 2008
  ident: 10.1016/j.ijleo.2015.11.188_bib0170
  article-title: Advanced encryption standard (AES) implementation with increased DPA resistance and low overhead
– start-page: 1
  year: 2012
  ident: 10.1016/j.ijleo.2015.11.188_bib0145
  article-title: Performance evaluation of cryptographic algorithms: DES and AES
– volume: IT–22
  start-page: 644
  issue: Nov
  year: 1976
  ident: 10.1016/j.ijleo.2015.11.188_bib0135
  article-title: New directions in cryptography
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1976.1055638
– volume: 12
  start-page: 1
  issue: 3
  year: 2009
  ident: 10.1016/j.ijleo.2015.11.188_bib0120
  article-title: Dynamic and efficient key management for access hierarchies
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/1455526.1455531
– start-page: 811
  year: 2014
  ident: 10.1016/j.ijleo.2015.11.188_bib0165
  article-title: High definition image encryption algorithm based on AES modification
  publication-title: Springer Wireless Commun.
  doi: 10.1007/s11277-014-1888-7
– year: 1996
  ident: 10.1016/j.ijleo.2015.11.188_bib0080
– volume: 20
  start-page: 1381
  year: 1997
  ident: 10.1016/j.ijleo.2015.11.188_bib0125
  article-title: Dynamic key management schemes for access control in a hierarchy
  publication-title: Comput. Commun.
  doi: 10.1016/S0140-3664(97)00100-X
– start-page: 474
  year: 2011
  ident: 10.1016/j.ijleo.2015.11.188_bib0150
  article-title: Methods for practical whitebox cryptography
SSID ssj0007707
Score 2.3033953
Snippet Cryptography is a process by which information or messages can be sent from one user to another user which provides several security services such as...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 2341
SubjectTerms Advance encryption standard (AES)
Cryptography
Symmetric cipher
Symmetric key algorithm
Title Development of modified AES algorithm for data security
URI https://dx.doi.org/10.1016/j.ijleo.2015.11.188
Volume 127
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1618-1336
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007707
  issn: 0030-4026
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1618-1336
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007707
  issn: 0030-4026
  databaseCode: ACRLP
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  customDbUrl:
  eissn: 1618-1336
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007707
  issn: 0030-4026
  databaseCode: .~1
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  customDbUrl:
  eissn: 1618-1336
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007707
  issn: 0030-4026
  databaseCode: AIKHN
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1618-1336
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0007707
  issn: 0030-4026
  databaseCode: AKRWK
  dateStart: 20010101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KRfAiPrE-yh48mrabx25yLKWlKvaihd7CvqIpbVJsvfrbnd1stIL04DFhBpIv4ZsZ9psZhG6TWCiS6diDdIB6IVe-x8OAe4woLRnxqU5Mv_PThI6n4cMsmjXQoO6FMbJKx_0Vp1u2dne6Ds3uKs9Njy-U4qaEMDPpfNtoHobMbDHofP7IPBirWqbB2NRKtJ48ZDVe-XxhOwBJBNTRIXb9yh_RaSvijI7QoUsVcb96mmPU0MUJ2reSTbk-RWxL74PLDC9LlWeQUOL-8BnzxWsJZf_bEkNSio0MFK_dprozNB0NXwZjz61B8CTEl40XMtWjQCxBIHgsGFdRpGJzeAvoEqHMSWYgzRQZEkmquc4CzilkBoowMMri4Bw1i7LQFwgLP5KSST_IIg11WSK0kqSXyERQToTOWsivXz-Vbka4WVWxSGsx2Dy1mKUGM6geUsCshe6-nVbViIzd5rTGNf31pVMg8V2Ol_91vEIHcOW01teouXn_0DeQSmxE2_4rbbTXv38cT74ApPLHIQ
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEN4QjNGL8RnxuQePFti2u9seCZGgAhch4bbZVxUClAhe_e3O9qGYGA5e25mknTYz82W_bwahuzhShiQ28qAdYF4oje_JMJAeJ8ZqTnxmY6d37g9YdxQ-jem4gtqlFsbRKovcn-f0LFsXVxpFNBvLycRpfAGKOwjhZtL5Tmi-E1KfOwRW__zheXCea6bB2oElVo4eykhek-kskwASCrmjTrL9K3-Up42S0zlEB0WviFv54xyhil0co92Ms6lXJ4hvEH5wmuB5aiYJdJS49fCC5ew1Bdz_NsfQlWLHA8WrYlXdKRp1HobtrlfsQfA0FJi1F3LTZJBZgkDJSHFpKDWRO72F8BJl3FFmoN0YGUI1s9ImgZQMWgNDOBglUXCGqot0Yc8RVj7Vmms_SKgFYBYrazRpxjpWTBJlkxryy9cXuhgS7nZVzETJBpuKLGbCxQzgg4CY1dD9t9Myn5Gx3ZyVcRW_PrWALL7N8eK_jrdorzvs90TvcfB8ifbhTkG8vkLV9fuHvYa-Yq1usv_mC3tfyLY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Development+of+modified+AES+algorithm+for+data+security&rft.jtitle=Optik+%28Stuttgart%29&rft.au=Kumar%2C+Puneet&rft.au=Rana%2C+Shashi+B.&rft.date=2016-02-01&rft.issn=0030-4026&rft.volume=127&rft.issue=4&rft.spage=2341&rft.epage=2345&rft_id=info:doi/10.1016%2Fj.ijleo.2015.11.188&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ijleo_2015_11_188
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0030-4026&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0030-4026&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0030-4026&client=summon