215
Views
2
CrossRef citations to date
0
Altmetric
Research Article

New method for improving add round key in the advanced encryption standard algorithm

&

References

  • Akarsh, B. G., Darshan, K. S., Dheeraj, S. H., Girichandra, M. T., & Akalpita, K. (2018). An efficient VLSI architecture for data encryption using AES algorithm and its FPGA implementation. International Journal of Innovative Research in Computer and Communication Engineering, 6(4), 3253–3258.
  • Atheer, M. A., & Abdul Monem, S. R. (2015). Automating security and time balancing in institutional daily work on data transfer. [A master thesis submitted to the department of computer science university of technology].
  • Awadhesh, K., & Tewari, R. R. (2017). Expansion of round key generations in advanced encryption standard for secure communication. International Journal of Computational Intelligence Research, 13(7), 1679–1698.
  • Batuhan, A., Erol, K., & Kayhan, Ç. (2020). A new algorithm for the colored image encryption via the modified Chua’s circuit. Engineering Science and Technology, an International Journal, 595–604.
  • D. S. Abdul. Elminaam, H. M. Abdul Kader, M. M. Hadhoud. (2010). Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA 8, 58–64.
  • Hala, B. A., & Abdul Monem, S. R., (2009). Proposed new quantum cryptography system using quantum description techniques for generated curves. The 2009 International conference on security and management, SAM 2009 July 13–16 2009, LasVegas.
  • Krishnamurthy, G. N., & Ramaswamy. (2008). Making AES stronger: AES with key dependent S-box. IJCSNS International Journal of Computer Science and Network Security, 8(9).
  • Marwan, A. A., Olayemi, O., Kiejo, H., & Pekka, T. (2018). Novel hybrid encryption algorithm based on AES, RSA, and twofish for bluetooth encryption. Journal of Information Security, 9(168).
  • Mohammad, U. B., & Qahtan, M. S. (2016). A review on symmetric key encryption techniques in cryptography 1. International Journal of Computer Applications, 147, 10.
  • Mohammed, N. A., Abdulrahman, A., Babak, E., & Mohamad, M. (2018, August). A comparison of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish for guessing attacks prevention. Journal of Computer Science Applications and Information Technology, 3(2), 1–7.
  • Nada, H. M., Abdul Monem, S. R., & Abdul Mohsen, J. (2013). Encryption using dual key transformation based on creation of multi S- boxes in AES algorithm. International Journal of Computer Applications, 83(10).
  • Niharika, T., & Priyanka. (2014). A survey on ensemble of modifications on AES algorithm. Journal of Basic and Applied Engineering Research Print, 1(7).
  • Prerna, M., & Abhishek, S. (2013). A study of encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology Network, Web & Security, 13, 15.
  • Rehab, F. H. (2010). New approach for modifying DES algorithm using 4-states multi keys. Eng. & Tech. Journal, 28(20).
  • Rehab, F. H., & Afaf, M. A. A. (2011). New approach for modifying blowfish algorithm using 4-states keys. IJCSNS International Journal of Computer Science and Network Security, 11(3).
  • Sahab, D. M., & Abdul Monem, S. R. (2019). Modifying des algorithm by using diagonal matrix based on irreducible polynomial. Journal of Theoretical and Applied Information Technology, 97, 5.
  • Salim, A. A., & Sh, A. K. (2015). A new approach for video encryption based on modified AES algorithm. IOSR: Journal of Computer Engineering (IOSR-JCE), 17, 3.
  • Stallings, W. (2007). Cryptography and network security: principles and practice (7th ed.). Pearson Education/Prentice Hall.
  • Vignesh, M., Raihana, P. A., Hakkim, S., & Sukanya, S. (2018). An efficient K-N secret sharing image and AES encryption algorithm in visual cryptography. International Journal of Advanced Research in Computer and Communication Engineering, 7(2), 233–239.
  • Vignesh, M., Raihana, P. A., Shahadha, H., & Sukanya, S. (2018). Efficient data security algorithm using combined AES and rail fence technique. International Journal of Pure and Applied Mathematics, 7, 2.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.