CFP last date
15 May 2024
Reseach Article

Enhanced Data Encryption Algorithm for Next Generation Networks

Published on July 2013 by Vikas Kaul, S K Narayankhedkar, Kushal Khaitan, Aditya Patil, Rohit Dube
International Conference and workshop on Advanced Computing 2013
Foundation of Computer Science USA
ICWAC - Number 4
July 2013
Authors: Vikas Kaul, S K Narayankhedkar, Kushal Khaitan, Aditya Patil, Rohit Dube
f3e2b447-cd81-407c-b22c-dd8a2e9f1774

Vikas Kaul, S K Narayankhedkar, Kushal Khaitan, Aditya Patil, Rohit Dube . Enhanced Data Encryption Algorithm for Next Generation Networks. International Conference and workshop on Advanced Computing 2013. ICWAC, 4 (July 2013), 0-0.

@article{
author = { Vikas Kaul, S K Narayankhedkar, Kushal Khaitan, Aditya Patil, Rohit Dube },
title = { Enhanced Data Encryption Algorithm for Next Generation Networks },
journal = { International Conference and workshop on Advanced Computing 2013 },
issue_date = { July 2013 },
volume = { ICWAC },
number = { 4 },
month = { July },
year = { 2013 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwac/number4/500-1309/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and workshop on Advanced Computing 2013
%A Vikas Kaul
%A S K Narayankhedkar
%A Kushal Khaitan
%A Aditya Patil
%A Rohit Dube
%T Enhanced Data Encryption Algorithm for Next Generation Networks
%J International Conference and workshop on Advanced Computing 2013
%@ 2249-0868
%V ICWAC
%N 4
%P 0-0
%D 2013
%I International Journal of Applied Information Systems
Abstract

In an age where data transmission over the network has become a vital aspect of communication and information sharing it is very essential to ensure robust data security. Keeping the above fact in mind, we aim to enhance the existing security standards by designing a more efficient Encryption Algorithm. In this paper we propose the idea of using a combination of AES-DES and incorporating it in the Feistal structure. Being a hybrid of two powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard.

References
  1. William Stallings, "Cryptography and Network Security", Pearson Group,4th Edition.
  2. Behrouz. A. Forouzan, "Cryptography and Network Security", McGraw Hill Group, 5th Edition.
  3. "Cisco Next Generation Encryption Guidelines", http://www. cisco. com/web/about/security/intelligence/nextgen_crypto. html.
  4. Guillaume Lehembre, "Wi-Fi security – -WEP, WAP and WPA2".
  5. John Padgette, Karen Scarfone, Lily Chen, "Guide to Bluetooth Security", NIST Special Publication 800-121 Revision 1.
  6. D. Coppersmith, "The Data Encryption Standard (DES) and its Strength against Attacks", IBM J. RES. DEVELOP. Vol. 38 No. 3 May 1994.
  7. B. Schneier, "Applied Cryptography: Protocols, Algorithms & Source Code", C. John Wiley and Sons, 1994.
  8. Mitsuru Matsui, "Linear Cryptanalysis Method for DES Cipher", In Advances in Cryptology – EUROCRYPT'93, volume 765 of LNCS, pages 386-397. Springer-Verlag, 1993.
  9. Eli Biham, Adi Shamir, "Differential Cryptanalysis of the Data Encryption Standard", Springer-Verlag, 1993.
  10. William C. Barker, Elaine Barker, "Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher", NIST, January 2012.
  11. J. Daemen, V. Rijmen, "AES Proposal: Rijndael", Banksys/Katholieke Universiteit Leuven, Belgium, AES submission, Jun 1998.
  12. NIST, "An Overview of Cryptanalysis Research for Advanced Encryption Standard", 2001.
  13. "An improved AES algorithm based on chaos" by Yuan Kun, Zhang Han, Li Zhaohui in 2009 at International Conference on Multimedia Information Networking and Security.
  14. H. Nover, "Algebraic Cryptanalysis of AES: Overview", University of Wisconsin, USA, 2005.
  15. Rashi kohli, Divya Sharma, Manoj Kr. Baliyan "S-Box Design Analysis and Parameter variation in AES Algorithm", 2012 IJCA.
  16. Aida Janadi and D. Anas Tarah "AES immunity Enhancement against algebraic attacks by using dynamic S-Boxes" in 2008, at IEEE Journal.
  17. Shuo Chen, Rui Wang, Xiao Feng Wang, Kehuan Zhang, "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow", IEEE Symposium on Security & Privacy, 2010.
  18. David Brumley, Dan Boneh, "Remote Timing Attacks are Practical", Stanford University, 2003.
  19. Vikas Kaul, S. K. Narayankhedkar, S. Archrekar, S. Agarwal, P. Goyal, "Security Enhancement Algorithm for Data Transmission for Next Generation Networks", IJCA 2012
  20. MATLAB Description, Available: http://www. mathworks. in/help/
  21. M. B. Vishnu, S. K. Tiong, "Security Enhancement using Hybrid AES-DES Algorithm" in 2008 at IEEE Journal.
  22. C. E. SHANNON, "A Mathematical Theory of Communication", The Bell System Technical Journal,Vol. 27, pp. 379–423, 623–656, July, October, 1948.
Index Terms

Computer Science
Information Sciences

Keywords

AES DES Hybrid Encryption Time Avalanche Effect Throughput CPU Usage