Advanced encryption standard development based quantum key distribution

This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most important symmetric encryption algorithm. The development focuses on the generation of dynamic quantum S-Boxes (DQS-Boxes) based quantum cipher key, instead of the ordinary used static S-Boxes. Moreover, the paper introduces the integration between the developed AES based DQS-Boxes, and the specific selected secret key generated from the QKD using two different modes (online and off-line).

[1]  Julia Juremi,et al.  ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY , 2012 .

[2]  KazlauskasKazys,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009 .

[3]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[4]  Chen,et al.  The billion-mulmod-per-second PC , 2009 .

[5]  Nigel P. Smart,et al.  Generation and Testing of Random Numbers , 2014 .

[6]  Amit Chaturvedi,et al.  Analysis on AES Algorithm using symmetric cryptography , 2012 .

[7]  Abdel-Badeeh M. Salem,et al.  Statistical analysis for random bits generation on quantum key distribution , 2014, 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Alin SUCIU,et al.  GENERATION AND TESTING OF RANDOM NUMBERS FOR CRYPTOGRAPHIC APPLICATIONS , 2012 .

[10]  Warren D. Smith 1. AES seems weak. 2. Linear time secure cryptography , 2007, IACR Cryptol. ePrint Arch..

[11]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[12]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.

[13]  Guru Tegh Bahadur Cryptanalysis of Modern Cryptographic Algorithms , .

[14]  Alex Biryukov,et al.  Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others , 2010, EUROCRYPT.

[15]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[16]  Shaaban Sahmoud,et al.  Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher , 2013, Int. Arab. J. e Technol..

[17]  Neetu Settia Cryptanalysis of Modern Cryptographic Algorithms , 2010 .

[18]  Alex Biryukov,et al.  Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware , 2012, Fundam. Informaticae.

[19]  Payal P. Wasankar,et al.  An Invention of Quantum Cryptography over the Classical Cryptography for Enhancing Security , 2013 .

[20]  Jan Pelzl,et al.  A Simpler Sieving Device: Combining ECM and TWIRL , 2006, ICISC.

[21]  Vincent Rijmen,et al.  Improved Impossible Differential Cryptanalysis of 7-Round AES-128 , 2010, INDOCRYPT.