Skip to main content

Security Enhancement Using Modified AES and Diffie–Hellman Key Exchange

  • Conference paper
  • First Online:
Advances in Computational Intelligence and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1086))

Abstract

In today’s world, providing data security is a primary concern. For this purpose, many researchers have introduced asymmetric and symmetric algorithms to ensure security. But they are not resistant to many attacks. In this paper, we combine symmetric and asymmetric techniques to provide more security. Advanced Encryption Standard algorithm is modified by generating Dynamic S-Boxes (DS-Boxes) to provide a better attack-resistant algorithm. In our approach, Diffie–Hellman is used to generate and exchange both keys and random numbers. These random numbers create DS-Boxes used in Modified AES. The proposed algorithm is resistant to timing attacks, linear, and differential cryptanalysis attacks due to the usage of DS-Boxes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Kahate, Cryptography and Network Security (Tata McGraw-Hill Companies, 2008)

    Google Scholar 

  2. A. Eskicioglu, L. Litwin, Cryptography. IEEE Potent. 20(1) (2001). https://doi.org/10.1109/45.913211

  3. S. Chandra, S. Paira, S.K. Alam, S. Bhattacharyya, A comparative survey of symmetric and asymmetric key cryptography, in International Conference on Electronics, Communication and Computational Engineering, ICECCE 2014, pp. 83–93. https://doi.org/10.1109/icecce.2014.7086640

  4. W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Google Scholar 

  5. P. Sehgal, N. Agarwal, S. Dutta, P.M. Durai Raj Vincent, Modification of Diffie-Hellman algorithm to provide more secure key exchange. Int. J. Eng. Technol. (IJET) 5(3), 2498–2501 (2013)

    Google Scholar 

  6. J. Daemen, V. Rijmen, The Design of Rijndael AES-The Advanced Encryption Standard (Springer, Berlin, 2002)

    Google Scholar 

  7. A. Abdullah, Advanced Encryption Standard (AES) algorithm to encrypt and decrypt data. Cryptogr. Netw. Security, pp. 1–12 (2017)

    Google Scholar 

  8. N. Mathur, R. Bansode, AES based text encryption using 12 Rounds with dynamic key selection, in International Conference on Communication Computing and Virtualization, vol. 79 (2016), pp. 1036–1043

    Google Scholar 

  9. B. Alex, G. Johann, Cryptanalysis of the full AES using GPU-like special-purpose hardware. J. Fundam. Inf. 114(3–4), 221–237 (2012). Cryptology in Progress: 10th Central European Conference on Cryptology

    Google Scholar 

  10. S. Hadi, S. Alireza, B. Behnam, A. Mohammadreza, Cryptanalysis of 7-Round AES-128. Int. J. Comput. Appl. 10(23), 21–29 (2013)

    Google Scholar 

  11. V. Kapoor, A. Jain, Novel hybrid cryptography for confidentiality, integrity, authentication. Int. J. Comput. Appl. 171(8), 35–40 (2017)

    Google Scholar 

  12. Y. Alkady, M.I. Habib, R.Y. Rizk, A new security protocol using hybrid cryptography algorithms, in 9th International Computer Engineering Conference (ICENCO), pp. 109–115 (2013). https://doi.org/10.1109/icenco.2013.6736485

  13. M.S. Henriques, N.K. Vernekar, Using symmetric and asymmetric cryptography to secure communication between devices in IoT, in International conference on IoT and Application(ICIOT) (2017)

    Google Scholar 

  14. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th edn. (Pearson Education, 2011). ISBN 10: 0-13-609704-9, ISBN 13: 978-0-13-609704-4

    Google Scholar 

  15. E.R. Harold, Java Network Programming: Developing Networked Applications (O’Reilly Media, Inc., 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Bhavani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhavani, Y., Jaya Krishna, B. (2021). Security Enhancement Using Modified AES and Diffie–Hellman Key Exchange. In: Gao, XZ., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Computational Intelligence and Communication Technology. Advances in Intelligent Systems and Computing, vol 1086. Springer, Singapore. https://doi.org/10.1007/978-981-15-1275-9_15

Download citation

Publish with us

Policies and ethics