Skip to main content
Log in

Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR)

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud data storage is a service offered by cloud computing for storing the data. Though it has a lot of benefits, the security of the stored data is one of its major concerns. Many models have been developed to address this issue. These models encrypt the data and store them. Advanced encryption standard (AES) is one of the encryption methods that has been used prevalently. This paper presents a model that tries to further strengthen the AES algorithm. It alters the shift row of the AES by making it key dependent. The key dependency enhances the security of the algorithm and the results show that the statistical pattern of the plaintext is dispersed over the cipher text, thereby, defending the plaintext from the cryptanalysis. Experimental results indicate that the dispersion ratio of the plaintext over the cipher text increases from 0.75 for AES to approximately 1 for the proposed model. The model is also analyzed using the coefficient of variation metric. The proposed model also exhibits a significant level of avalanche effect.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael. http://csrc.nist.gov/encryption/aes/.

  2. NIST. (2001). Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication, no. 197, November 26.

  3. Shannon, C. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715.

    Article  MathSciNet  Google Scholar 

  4. Feistel, H. (1973). Cryptography and computer privacy. Scientific American, 228, 15–23.

    Article  Google Scholar 

  5. William, S. (2010). Cryptography and network security: Principles and practice (5th ed.). Upper Saddle River, NJ: Prentice Hall Press.

    Google Scholar 

  6. Hosseinkhani, R., & Javadi, H. H. S. (2012). Using cipher key to generate dynamic S-box in AES cipher system. International Journal of Computer Science and Security (IJCSS), 6(1), 19–28.

    Google Scholar 

  7. Krishnamurthy, G. N., & Ramaswamy, V. (2008). Making AES stronger: AES with key dependent S-box. IJCSNS International Journal of Computer Science and Network Security, 8(9), 388–398.

    Google Scholar 

  8. Vaicekauskas, G., Kazlauskas, K., & Smaliukas, R. (2016). A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. International Journal of Advanced Computer Science and Applications, 7(4), 93–99.

    Google Scholar 

  9. Thinn A. A, & Thwin, M. M. S. (2019). Modification of AES algorithm by using second key and modified subbytes operation for text encryption. In Computational science and technology, lecture notes in electrical engineering, vol. 481. Singapore: Springer.

  10. Basu, S., Karuppiah, M., Rajkumar, S., & Niranchana, R. (2018). Modification of AES using genetic algorithms for high-definition image encryption. International Journal of Intelligent Systems Technologies and Applications, 17(4), 452–466.

    Article  Google Scholar 

  11. Bader, A. S., & Sagheer, A. M. (2018). Modification on AES-GCM to increment ciphertext randomness. International Journal of Mathematical Sciences and Computing (IJMSC), 4(4), 34–40.

    Article  Google Scholar 

  12. Yang, M., Xiao, B., & Meng, Q. (2019). New AES dual ciphers based on rotation of columns. Wuhan University Journal of Natural Sciences, 24(2), 93–97.

    Article  Google Scholar 

  13. Naif, J. R., Abdul-Majeed, G. H., & Farhan, A. K. (2019). Secure IOT system based on chaos-modified lightweight AES. In International conference on advanced science and engineering (ICOASE), Zakho - Duhok, Iraq (pp. 1–6).

  14. Hamming, R. W. (1950). Error detecting and error correcting codes. Bell Labs Technical Journal, 29(2), 147–160.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Srisakthi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Srisakthi, S., Shanthi, A.P. Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR). Wireless Pers Commun 114, 3003–3015 (2020). https://doi.org/10.1007/s11277-020-07514-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07514-9

Keywords

Navigation