Abstract
In today’s world, providing data security is a primary concern. For this purpose, many researchers have introduced asymmetric and symmetric algorithms to ensure security. But they are not resistant to many attacks. In this paper, we combine symmetric and asymmetric techniques to provide more security. Advanced Encryption Standard algorithm is modified by generating Dynamic S-Boxes (DS-Boxes) to provide a better attack-resistant algorithm. In our approach, Diffie–Hellman is used to generate and exchange both keys and random numbers. These random numbers create DS-Boxes used in Modified AES. The proposed algorithm is resistant to timing attacks, linear, and differential cryptanalysis attacks due to the usage of DS-Boxes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Kahate, Cryptography and Network Security (Tata McGraw-Hill Companies, 2008)
A. Eskicioglu, L. Litwin, Cryptography. IEEE Potent. 20(1) (2001). https://doi.org/10.1109/45.913211
S. Chandra, S. Paira, S.K. Alam, S. Bhattacharyya, A comparative survey of symmetric and asymmetric key cryptography, in International Conference on Electronics, Communication and Computational Engineering, ICECCE 2014, pp. 83–93. https://doi.org/10.1109/icecce.2014.7086640
W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
P. Sehgal, N. Agarwal, S. Dutta, P.M. Durai Raj Vincent, Modification of Diffie-Hellman algorithm to provide more secure key exchange. Int. J. Eng. Technol. (IJET) 5(3), 2498–2501 (2013)
J. Daemen, V. Rijmen, The Design of Rijndael AES-The Advanced Encryption Standard (Springer, Berlin, 2002)
A. Abdullah, Advanced Encryption Standard (AES) algorithm to encrypt and decrypt data. Cryptogr. Netw. Security, pp. 1–12 (2017)
N. Mathur, R. Bansode, AES based text encryption using 12 Rounds with dynamic key selection, in International Conference on Communication Computing and Virtualization, vol. 79 (2016), pp. 1036–1043
B. Alex, G. Johann, Cryptanalysis of the full AES using GPU-like special-purpose hardware. J. Fundam. Inf. 114(3–4), 221–237 (2012). Cryptology in Progress: 10th Central European Conference on Cryptology
S. Hadi, S. Alireza, B. Behnam, A. Mohammadreza, Cryptanalysis of 7-Round AES-128. Int. J. Comput. Appl. 10(23), 21–29 (2013)
V. Kapoor, A. Jain, Novel hybrid cryptography for confidentiality, integrity, authentication. Int. J. Comput. Appl. 171(8), 35–40 (2017)
Y. Alkady, M.I. Habib, R.Y. Rizk, A new security protocol using hybrid cryptography algorithms, in 9th International Computer Engineering Conference (ICENCO), pp. 109–115 (2013). https://doi.org/10.1109/icenco.2013.6736485
M.S. Henriques, N.K. Vernekar, Using symmetric and asymmetric cryptography to secure communication between devices in IoT, in International conference on IoT and Application(ICIOT) (2017)
W. Stallings, Cryptography and Network Security: Principles and Practice, 5th edn. (Pearson Education, 2011). ISBN 10: 0-13-609704-9, ISBN 13: 978-0-13-609704-4
E.R. Harold, Java Network Programming: Developing Networked Applications (O’Reilly Media, Inc., 2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhavani, Y., Jaya Krishna, B. (2021). Security Enhancement Using Modified AES and Diffie–Hellman Key Exchange. In: Gao, XZ., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Computational Intelligence and Communication Technology. Advances in Intelligent Systems and Computing, vol 1086. Springer, Singapore. https://doi.org/10.1007/978-981-15-1275-9_15
Download citation
DOI: https://doi.org/10.1007/978-981-15-1275-9_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1274-2
Online ISBN: 978-981-15-1275-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)