Key-dependent Advanced Encryption Standard

Rijndael has been selected by the National Institute for Standards and Technology (NIST) as the Advanced Encryption Standard (AES). In compliance with Kerckhoffs's principle, and to preserve and promote interoperability, the design and internal operation of AES must remain open. However, we suggest that there is no need to retain the static nature of the design. Consequently, this research paper main objective is to introduce a dynamic algorithm, that determines the exact steps used for encrypting or decrypting payloads during execution time. This has been achieved by making AES parameters key dependent, rather than reuse fixed, pre-determined values.The result is an armored version of the AES that changes its internal design with almost every new encryption key. The proposed design is provided and analyzed in terms of security, implementation cost and possibility for further improvements.

[1]  Christophe Clavier,et al.  Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks , 2014, Cryptography and Communications.

[2]  Prerna Mahajan,et al.  A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .

[3]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[4]  N KrishnamurthyG,et al.  Making AES Stronger: AES with Key Dependent S-Box , 2008 .

[5]  Ritu Vijay,et al.  An implementation and performance evaluation of an improved chaotic image encryption approach , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[6]  Ritu Vijay,et al.  An AES–CHAOS-Based Hybrid Approach to Encrypt Multiple Images , 2017 .

[7]  Abdelrahman Altigani,et al.  Analyzing the Performance of the Advanced Encryption Standard Block Cipher Modes of Operation: Highlighting the National Institute of Standards and Technology Recommendations , 2016 .

[8]  H.A.M. Luiijf,et al.  National Cyber Security Framework Manual , 2013 .

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[11]  Abdelrahman Altigani,et al.  A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol , 2013, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE).

[12]  Shashi B. Rana,et al.  Development of modified AES algorithm for data security , 2016 .

[13]  Nisha Nisha,et al.  A Hybrid Approach of AES and File Encryption to Enhance The Cloud Security , 2015 .

[14]  Mahamod Ismail,et al.  Enhancement of AES algorithm based on chaotic maps and shift operation for image encryption , 2015 .