Innovative Method for enhancing Key generation and management in the AES-algorithm
نویسندگان
چکیده
With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution.
منابع مشابه
Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
متن کاملAn innovative algorithm for planning and scheduling healthcare units with the aim of reducing the length of stay for patients (Case study: Cardiac SurgeryWard of Razavi Hospital of Mashhad)
One of the key applications of operational research in health systems management is to improve the mechanism of resource allocation and program planning in order to increase the system efficiency. This study seeks to offer an innovative method for the planning and scheduling of health service units with the aim of reducing the patients' Length of Stay (LOS) in the Cardiac Surgery Ward of Razavi...
متن کاملNovel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملKey drivers of innovative behavior in hotel industry: evidence from a developing country
The purpose of this paper is to determine the key drivers of innovative behavior of employees in hotel industry using evidence from a developing country. Measurement items were adapted from existing scales found in the organizational behavior literature. Academic colleagues reviewed the items for face validity and readability. The scales were evaluated for reliability, convergent validity, and ...
متن کاملمدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1504.03406 شماره
صفحات -
تاریخ انتشار 2014