Modified AES Cipher Round and Key Schedule

In this paper, Advanced Encryption Standard was modified to address the low diffusion rate at the early rounds by adding additional operations in both the cipher round and the key schedule. The cipher round modifications for rounds 1 to 9 of the encryption cycle were the addition of XOR operation between the SubBytes and the ShiftRow processes and the inclusion of modulo addition between the ShiftRow and MixColumn operations. In the final round of the encryption cycle, modulo addition is inserted between the SubBytes and the ShiftRow. In the decryption cycle of the cipher round, all functions were replaced by their inverses, e.g. SubBytes to InverseSubBytes, Modulo Addition to Modulo Subtraction and so on. Furthermore, the modification in the key schedule algorithm were byte substitution and round constant addition appended to the key schedule algorithm before the key expansion. The byte substitution was utilized by transforming the bytes of the 128-bit master cipher key using the AES S-box and then the result was divided into four 32-bit words. Each word was then XORed with a variable round constant dependent on a specific byte value of the word. The metrics used for evaluation were avalanche effect and frequency test to measure the diffusion and confusion characteristics respectively. Avalanche effect was measured by changing one bit of the input plaintext and determining the percentage of bits that have changed states in the cipher text. While the frequency test determines the randomness of the string by assessing the distribution of ones and zeros. The results of the avalanche effect and the frequency test of the modified AES cipher round and key schedule was compared to the standard AES. The results of the avalanche effect evaluation show that there was an average increase in diffusion of 61.98% in round 1, 14.79% in round 2 and 13.87% in round 3. Consequently, the results of the frequency test demonstrated an improvement in the randomness of the ciphertext since the average difference between the number of ones to zeros is reduced from 11.6 to 6.4 bits along with better-computed p-values. The results clearly show that the modified AES has improved diffusion and confusion properties over the standard AES.

[1]  Ken Choi,et al.  Power dissipation and area comparison of 512-bit and 1024-bit key AES , 2013, Comput. Math. Appl..

[2]  B. R. Pushpa,et al.  Enhanced cloud data security using AES algorithm , 2017, 2017 International Conference on Intelligent Computing and Control (I2C2).

[3]  Retantyo Wardoyo,et al.  Review of Image Compression and Encryption Techniques , 2017 .

[4]  Ariel M. Sison,et al.  Modified Blowfish Algorithm , 2018 .

[5]  Elshazly Emad,et al.  A secure image steganography algorithm based on least significant bit and integer wavelet transform , 2018 .

[6]  Anamika Rangra,et al.  A Review on DES, AES and Blowfish for Image Encryption & Decryption , 2015 .

[7]  Ariel M. Sison,et al.  Modified AES for Text and Image Encryption , 2018 .

[8]  Tao Wang,et al.  Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations , 2014, IEEE Transactions on Information Forensics and Security.

[9]  Priyadarshini Patila,et al.  A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .

[10]  Prashant Dwivedy,et al.  Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption , 2017, 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE).

[11]  Hae-Yeoun Lee,et al.  Deep Learning-Based Steganalysis Against Spatial Domain Steganography , 2017, 2017 European Conference on Electrical Engineering and Computer Science (EECS).

[12]  Mohamed Waleed Fakhr,et al.  Joint image compression and encryption based on compressed sensing and entropy coding , 2017, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA).

[13]  Manoj Kumar,et al.  A wavelet based approach for simultaneous compression and encryption of fused images , 2017, J. King Saud Univ. Comput. Inf. Sci..

[14]  Zaiton Muda,et al.  Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits , 2017 .

[15]  Hoang Duc Tho,et al.  On the improving diffusion layer and performance of AES algorithm , 2017, 2017 International Conference on Information and Communications (ICIC).

[16]  Zafar Shahid,et al.  Denoising and error correction in noisy AES-encrypted images using statistical measures , 2016, Signal Process. Image Commun..

[17]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[18]  Petr Socha,et al.  Attacking AES implementations using correlation power analysis on ZYBO Zynq-7000 SoC board , 2018, 2018 7th Mediterranean Conference on Embedded Computing (MECO).

[19]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[20]  Jialin Huang,et al.  Transposition of AES Key Schedule , 2016, Inscrypt.

[21]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[22]  Weiming Zhang,et al.  Ensemble Steganography , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[23]  Eiji Okamoto,et al.  A low-area unified hardware architecture for the AES and the cryptographic hash function Grøstl , 2017, J. Parallel Distributed Comput..