Hybrid Security Algorithms for Data Transmission u
Hybrid Security Algorithms for Data Transmission u
net/publication/276195784
CITATIONS READS
10 1,708
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Vikas j Kaul on 08 March 2017.
ABSTRACT
The fast evolution of digital data exchange has forced the AES operates on a 4×4 column-major order matrix of bytes,
information security to be of much important in data storage termed the state (versions of Rijndael with a larger block size
and transmission. As large amount of data is transmitted over have additional columns in the state). Most AES calculations
the network, it is preliminary to secure all types of data before are done in a special finite field. The AES cipher is specified
sending them. The problem with AES, most extensively used as a number of repetitions of transformation rounds that
encryption is that it uses many multi variant equations which convert the input plaintext into the final output of cipher text.
are linear in nature. Thus it can be broken using algebraic Each round consists of several processing steps, including one
cryptanalysis. This provides a serious threat as AES was that depends on the encryption key. A set of reverse rounds
considered to be unbreakable and thus it was used in many are applied to transform cipher text back into the original
encryption systems. plaintext using the same encryption key[13].
The current paper presents the design and implementation of a The key size used for an AES cipher specifies the number of
hybrid based 128 bit key AES-DES algorithm as a security repetitions of transformation rounds that convert the input
enhancement. plain text into the final output, called the cipher text. The
number of cycles of repetition are as follows:
Keywords
Cipher, DES, AES, Hybrid AES DES, Key matrix. 10 cycles of repetition for 128-bit keys.
12 cycles of repetition for 192-bit keys.
1. INTRODUCTION 14 cycles of repetition for 256-bit keys[5].
The DES (Data Encryption Standard) is a cryptographic
standard. The algorithm is designed to encipher and decipher
blocks of data consisting of 64 bits under control of a 64-bit 1 .2 DES
key. DES is the block cipher algorithm that takes a fixed-length
In cryptography, the Advanced Encryption Standard (AES) string of plaintext bits and transforms it through a series of
cipher has a 128-bit block size, with key sizes of 128, 192 and complicated operations into another cipher text bit string of
the same length. In the case of DES, the block size is 64 bits.
256 bits, respectively.
DES also uses a key to customize the transformation so that
The integration of AES with DES is to enhance security for decryption can be performed by authentic user used to
input mode as text ,image, audio and video. The paper encrypt the key. The key ostensibly consists of 64 bits
outlines the possible weaknesses within the current AES however only 56 of these are actually used by the algorithm.
encryption algorithm especially against algebraic based Eight bits are used solely for checking parity, and are
cryptanalysis. To understand the need for minimizing thereafter discarded. Hence the effective key length is 56 bits,
algebraic attacks on AES there by the idea of integrating and it is never quoted as such. Every 8th bit of the selected
AES with DES is proposed. Hence the development of the key is discarded, that is, positions 8, 16, 24, 32, 40, 48, 56, 64
Hybrid AES-DES algorithm. are removed from the 64 bit key leaving behind only the 56
bit key [17].
1.1 Cryptanalysis of AES
The F-function, operates on half a block (32 bits) at a time
AES is based on a design principle known as a Substitution and consists of four stages:
permutation network. It is fast in both software and hardware.
Unlike its predecessor DES, AES does not use a Feistel 1. Expansion — The 32-bit half-block is expanded to 48 bits
network[12]. using the expansion permutation by duplicating half of the
bits. The output consists of eight 6-bit(8*6=48bits) chunk,
AES has a fixed block size of 128 bits and a key size of 128, each containing a copy of 4 corresponding input bits, plus a
192, or 256 bits, whereas Rijndael can be specified with block copy of the immediately adjacent bit from each of the input
and key sizes in any multiple of 32 bits, with a minimum of pieces to either side[17].
128 bits. The block size has a maximum of 256 bits[7].
15
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 2– No.2, February 2012 – www.ijais.org
2. Key mixing — The result is combined with a sub key using field generator and the remainder is taken as the result. Since
an XOR operation. Sixteen 48-bit sub keys one for each round there are 256 possible polynomials, a look up table can be
are derived from the main key using the key schedule[3]. created for a specific field generator. So the lookup table
contain 256 * 256 entries [16].
3. Substitution — After mixing in the sub key, the block is
divided into eight 6-bit pieces before processing by the S-
boxes, or substitution boxes. Each of the eight S-boxes
replaces its six input bits with four output bits according to a
non-linear transformation, provided in the form of a lookup
table. The S-boxes provide the core of the security of DES
without them, the cipher would be linear, and trivially
breakable[19].
16
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 2– No.2, February 2012 – www.ijais.org
shift done time to the left, third row shifted two times and
fourth rows shifted three times[3].
17
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 2– No.2, February 2012 – www.ijais.org
3. Implementation
In this system the implementation of DES, AES, and Hybrid
AES-DES is done for comparative study so it can be easily
understood that time requirement for encryption of Hybrid
AES-DES is greater than that of the time requirement of 3.2 Hybrid AES-DES algorithm implemented in this
individual AES and DES. The time getting during the snapshot for input mode (video)
experimental result may varies for same input because it
depends upon the processor and memory available during the
execution of the program. The decryption time is less because
the decryption is done continuously with the encryption.
18
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 2– No.2, February 2012 – www.ijais.org
3.3 Hybrid AES-DES algorithm implemented in this 4. Results and Performance Analysis
snapshot for input mode (audio)
19
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 2– No.2, February 2012 – www.ijais.org
5. Conclusion
An improved Hybrid AES-DES algorithm as means of
strengthening the current AES architecture. The hybrid model
gives a better non linearity to the plain AES and as it is
merged with DES there is better diffusion hence the
possibility of an algebraic attack on the hybrid model is
reduced.
Also the time shown on the analysis are average time because
the time may vary depend upon the processor availability and
processor speed. one can’t get the different time for same
input for encryption as well as decryption because of same.
In this algorithm the image are only for (jpeg) file format is
supported and audio file for (8 bit low level wav file) format
is supported and video only (avi) format is supported.
20
International Journal of Applied Information Systems (IJAIS) – ISSN : 2249-0868
Foundation of Computer Science FCS, New York, USA
Volume 2– No.2, February 2012 – www.ijais.org
Being a hybrid of two powerful encryption standards the [7] Tingyuan Nie, Chuanwang Song, Xulong Zhi, 2010
algorithm will act as efficient and reliable encryption “ Performance Evaluation of DES and Blowfish
technique for data. The proposed algorithm can also use a Algorithms”, Biomedical Engineering and Computer
double key approach which makes it resistant to linear attacks. Science International Conference.
In this case, the safety of encryption algorithm can be further
improved Improving DES by adding the irrational number and [8] Xiang Li, Junli Chen, Dinghu Qin, Wanggen Wan. 2010
integrating the AES algorithm into DES structure to further “ Research and Realization Based on hybrid encryption
improve its security. algorithm of improved AES and ECC”, Audio Language
and Image Processing (ICALIP).
In this system the mode of inputs are different like text, [9] M.Zeghid , M.Machhout, L. khriji, A.baganne and
image, audio and video. Converting this mode in binary mode R.Tourki, 2007 “A modified AES based algorithm for
and taken as input to the system and on this apply the image encryption ”,World Academy of Science
encryption and decryption. ,Engineering and Technology .
[10] Abdinasir hasan Ali, “Analysis and implementation of
6. ACKNOWLEDGMENTS security algorithms for wireless communication”, IEEE,
Our thanks to the experts who have contributed towards 2010.
development of the template.
[11] Craig Teegarden,Mudit Bhargava,Ken mai, 2010 “Side
7. REFERENCES channel attack Resistant ROM based AES S-Box”, IEEE
[1]Carlos Cid, Sean Murphy and Matthew Robshaw,2004 Int.
“Computational and Algebraic aspects of the Advanced
[12] Manhee Lee, Student Member, IEEE, and Eun Jung Kim,
Encryption Standard”, In Proceedings of the Seventh
Member, IEEE Computer Society, 2007 “A
International Workshop on Computer Algebra in
Comprehensive Framework for Enhancing Security in
Scientific Computing .
InfiniBand Architecture”,IEEE Int.
[2] Aida Janadi, 2008 “ AES immunity Enhancement against
[13] H. Nover, 2005 “algebraic cryptanalysis of aes:
algebraic attacks by using dynamic S-Boxes”,
overview”, university of wisconsin, usa,.
Information and Communication Technologies from
Theory to Applications, ICTTA2008. [14] S. Murphy, mj.b robshaw, 2002 “essential algebraic
structure within the aes”, advances in cryptology crypto
[3] Jing Wang & Guo-ping Jiang, 2008 “Improved DES
2002, lecture notes in computer science, springer-verlag.
algorith based on irrational number”, IEEE Int.
Conference Neural Networks & Signal Processing. [15] MATLAB Description, Available:
http://www.mathworks.in/help/
[4] M.B. Vishnu & S.K. Tiong, 2008 “Security Enhancement
of Digital Motion Image Transmission Using Hybrid [16] AES Description, Available:
AES-DES Algorithm”, IEEE Int. http://people.eku.edu/styere/Encrypt/JS-AES.html
[5] Tingyuan Nie, 2009 “A Study of DES and Blowfish [17] DES Description, Available:
Encryption Algorithm”. http://orlingrabbe.com/des.htm
[6] Yuan Kun, Zhang HanLi Zhaohui, 2009 “An Improved [18] AES mix column
AES algorithm based on chaos”,Multimedia Information http://www.angelfire.com/biz7/atleast/mix_columns.pdf
NetworkingandSecurity,INES'09.International
Conference. [19] Forouzan Behrouz “Cryptography & Network
Security”,McGraw-Hill Forouzan Networking , 2007.
21