Mdiwmtmymje=

Page 1

International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064

Analytical Study of AES and Proposed Variant with Enhance Block Length and Key Length Sayed Tathir Abbas1, Ravindera Kumar2 1

Al-falah School of Engineering & Technology, Faridabad Haryana, India

2

Al-falah School of Engineering & Technology, Faridabad Haryana, India

Abstract: Encryption and decryption are both methods used to ensure the secure passing of messages and other sensitive documents and information. The encryption process plays a major factor in our technology advanced lives. Encryption basically means to convert the message into code or scrambled form. Advanced Encryption Standard (AES) is a specification for the encryption of electronic data. It has been adopted by the U.S. government and is now used worldwide. AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. This paper defines the method to enhance the block and key length of the conventional AES. Keywords: Plaintext, Cipher text, key length, block length

1. Introduction In the United States, AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a five-year standardization process in which fifteen competing designs were presented and evaluated before it was selected as the most suitable.AES is the first publicly accessible and open cipher approved by the National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module. AES is a symmetric block cipher with a block size of 128 bits. Key lengths can be 128 bits, 192 bits, or 256 bits called AES-128, AES-192 and AES-256 respectively. AES-128 uses 10 rounds, AES-192 uses 12 rounds, and AES-256 uses 14 rounds. In the proposed work the block length and key length are enhanced to two hundred.

2. Architecture The architecture of this proposal is exactly same as the conventional system. The size of the input key and input data are different than conventional. Here, the block and key length has been enhanced to two hundred. Hence the data matrix used here is 5X5 matrix rather than 4X4 matrix as in conventional AES.

Figure 1: Architecture

3. Operations Performed There are several transformations performed to extract the AES cipher. Various transformations are done on byte basis to build AES cipher. The operations performed here are quite different as compared to the conventional addition and multiplication. In AES the addition and multiplication are performed under the “Galois Field� operations. Galois Field is the finite field operation which is named after the brilliant young French mathematician who discovered them.

Volume 2 Issue 8, August 2013 www.ijsr.net

176


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.