A Novel Approach to Improve Avalanche Effect of AES Algorithm
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
With the rapid progression of digital data exchange in electronic way, security of information is becoming more important in data storage and transmission. Therefore numerous ways of protecting information are being utilized by individuals, businesses, and governments. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security system uses some algorithms to scramble data into scribbled text which can be only being decoded or decrypted by party those possesses the associated key. In this paper a most widely used symmetric encryption techniques i.e. advanced encryption standard (AES) have been implemented using MATLAB software. The primary goal of this paper is to improve level of security. The implemented encryption technique is analyzed by using a parameter called Avalanche effect. Plaintext and encryption key are mapped in binary code before encryption process. Avalanche Effect is calculated by changing one bit in plaintext keeping the key constant and by changing one bit in encryption key keeping the key constant, Experimental results shows that the proposed algorithm exhibit significant high Avalanche Effect which improves the level of the security.
Authors and Affiliations
Chandra Prakash Dewangan, , Shashikant Agrawal,
Implementation of Radix-4 Multiplier with a Parallel MAC unit using MBE Algorithm
t— A radix-4/-8 multiplier is implemented using modified booth multiplier encoder that demand high speed and low energy operation. Depending on the input pattern, the multiplier operates in the radix-8 mode in 56%...
Performance Enhancement of CPU Scheduling by Hybrid Algorithms Using Genetic Approach
Scheduling is a fundamental operating-system function. The concept is to have computer resources shared by a number of processes. The productivity of a computer solely depends on the use of CPU scheduling algorithm...
Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks
Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not wor...
Price Adjustment for Double Auction Based Scheduling in Grid Environment
t— In Grid computing the resources are decentralized and dynamic in nature, managing the resources in such environment is a challenging task. Auction based scheduling is more attractive from the point of view of bu...
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES
The main objective of this paper is to have a best association between customer and organization. This project is proposed in order to discover knowledge from huge amount of data and to use the data efficiently b...