Innovative Method for enhancing Key generation and management in the AES-algorithm

نویسندگان

  • Omer K. Jasim Mohammad
  • Safia Abbas
  • El-Sayed M. El-Horbaty
  • Abdel-Badeeh M. Salem
چکیده

With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

متن کامل

An innovative algorithm for planning and scheduling healthcare units with the aim of reducing the length of stay for patients (Case study: Cardiac SurgeryWard of Razavi Hospital of Mashhad)

One of the key applications of operational research in health systems management is to improve the mechanism of resource allocation and program planning in order to increase the system efficiency. This study seeks to offer an innovative method for the planning and scheduling of health service units with the aim of reducing the patients' Length of Stay (LOS) in the Cardiac Surgery Ward of Razavi...

متن کامل

Novel Impossible Differential Cryptanalysis of Zorro Block Cipher

Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...

متن کامل

Key drivers of innovative behavior in hotel industry: evidence from a developing country

The purpose of this paper is to determine the key drivers of innovative behavior of employees in hotel industry using evidence from a developing country. Measurement items were adapted from existing scales found in the organizational behavior literature. Academic colleagues reviewed the items for face validity and readability. The scales were evaluated for reliability, convergent validity, and ...

متن کامل

مدیریت کلید در سیستم‌های مدیریت حقوق دیجیتال در حالت برون‌خطی

By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1504.03406  شماره 

صفحات  -

تاریخ انتشار 2014