EAES: Extended Advanced Encryption Standard with Extended Security

A R T I C L E I N F O A B S T R A C T Article history: Received: 29 March, 2018 Accepted: 24 April, 2018 Online :20 May, 2018 Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data block length is 128 bits, same as AES. But unlike AES each round of encryption and decryption of this proposed algorithm consists of five stages except the last one which consists of four stages. Unlike AES, this algorithm uses two different key expansion algorithms with two different round constants that ensure higher security than AES. Basically, this algorithm takes one cipher key and divides the selected key of two separate sub-keys: FirstKey and SecondKey. Then expand them through two different key expansion schedules. Performance analysis shows that the proposed extended AES algorithm takes almost same amount of time to encrypt and decrypt the same amount of data as AES but with higher security than AES.

[1]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[2]  S. Yamuna,et al.  Implementation of AES algorithm to overt fake keys against counter attacks , 2016, 2016 International Conference on Computer Communication and Informatics (ICCCI).

[3]  Thomas Peyrin,et al.  Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations , 2010, FSE.

[4]  Bruce Schneier,et al.  Improved Cryptanalysis of Rijndael , 2000, FSE.

[5]  Hongjun Wu,et al.  Improving the Biclique Cryptanalysis of AES , 2015, ACISP.

[6]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[7]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[8]  Manjula G.,et al.  Constructing key dependent dynamic S-Box for AES block cipher system , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[9]  Massoud Masoumi,et al.  Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis , 2015, IEEE Transactions on Information Forensics and Security.

[10]  K. Kalaiselvi,et al.  Enhanced AES cryptosystem by using genetic algorithm and neural network in S-box , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).

[11]  Seung-Jae Lee,et al.  Parallel Execution of AES-CTR Algorithm Using Extended Block Size , 2011, 2011 14th IEEE International Conference on Computational Science and Engineering.

[12]  Kenli Li,et al.  Implementation and Optimization of AES Algorithm on the Sunway TaihuLight , 2016, 2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).

[13]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[14]  Yaser Jararweh,et al.  AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[15]  Daniyal M. Alghazzawi,et al.  Advanced Encryption Standard - Cryptanalysis research , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[16]  Krerk Piromsopa,et al.  An implementation of AES-128 and AES-512 on Apple mobile processor , 2017, 2017 14th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).