Abstract
Cloud data storage is a service offered by cloud computing for storing the data. Though it has a lot of benefits, the security of the stored data is one of its major concerns. Many models have been developed to address this issue. These models encrypt the data and store them. Advanced encryption standard (AES) is one of the encryption methods that has been used prevalently. This paper presents a model that tries to further strengthen the AES algorithm. It alters the shift row of the AES by making it key dependent. The key dependency enhances the security of the algorithm and the results show that the statistical pattern of the plaintext is dispersed over the cipher text, thereby, defending the plaintext from the cryptanalysis. Experimental results indicate that the dispersion ratio of the plaintext over the cipher text increases from 0.75 for AES to approximately 1 for the proposed model. The model is also analyzed using the coefficient of variation metric. The proposed model also exhibits a significant level of avalanche effect.
Similar content being viewed by others
References
Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael. http://csrc.nist.gov/encryption/aes/.
NIST. (2001). Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication, no. 197, November 26.
Shannon, C. (1949). Communication theory of secrecy systems. Bell Systems Technical Journal, 28, 656–715.
Feistel, H. (1973). Cryptography and computer privacy. Scientific American, 228, 15–23.
William, S. (2010). Cryptography and network security: Principles and practice (5th ed.). Upper Saddle River, NJ: Prentice Hall Press.
Hosseinkhani, R., & Javadi, H. H. S. (2012). Using cipher key to generate dynamic S-box in AES cipher system. International Journal of Computer Science and Security (IJCSS), 6(1), 19–28.
Krishnamurthy, G. N., & Ramaswamy, V. (2008). Making AES stronger: AES with key dependent S-box. IJCSNS International Journal of Computer Science and Network Security, 8(9), 388–398.
Vaicekauskas, G., Kazlauskas, K., & Smaliukas, R. (2016). A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. International Journal of Advanced Computer Science and Applications, 7(4), 93–99.
Thinn A. A, & Thwin, M. M. S. (2019). Modification of AES algorithm by using second key and modified subbytes operation for text encryption. In Computational science and technology, lecture notes in electrical engineering, vol. 481. Singapore: Springer.
Basu, S., Karuppiah, M., Rajkumar, S., & Niranchana, R. (2018). Modification of AES using genetic algorithms for high-definition image encryption. International Journal of Intelligent Systems Technologies and Applications, 17(4), 452–466.
Bader, A. S., & Sagheer, A. M. (2018). Modification on AES-GCM to increment ciphertext randomness. International Journal of Mathematical Sciences and Computing (IJMSC), 4(4), 34–40.
Yang, M., Xiao, B., & Meng, Q. (2019). New AES dual ciphers based on rotation of columns. Wuhan University Journal of Natural Sciences, 24(2), 93–97.
Naif, J. R., Abdul-Majeed, G. H., & Farhan, A. K. (2019). Secure IOT system based on chaos-modified lightweight AES. In International conference on advanced science and engineering (ICOASE), Zakho - Duhok, Iraq (pp. 1–6).
Hamming, R. W. (1950). Error detecting and error correcting codes. Bell Labs Technical Journal, 29(2), 147–160.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Srisakthi, S., Shanthi, A.P. Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR). Wireless Pers Commun 114, 3003–3015 (2020). https://doi.org/10.1007/s11277-020-07514-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07514-9