Security Enhancement Using Modified AES and Diffie–Hellman Key Exchange

  • Y. BhavaniEmail author
  • B. Jaya Krishna
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1086)


In today’s world, providing data security is a primary concern. For this purpose, many researchers have introduced asymmetric and symmetric algorithms to ensure security. But they are not resistant to many attacks. In this paper, we combine symmetric and asymmetric techniques to provide more security. Advanced Encryption Standard algorithm is modified by generating Dynamic S-Boxes (DS-Boxes) to provide a better attack-resistant algorithm. In our approach, Diffie–Hellman is used to generate and exchange both keys and random numbers. These random numbers create DS-Boxes used in Modified AES. The proposed algorithm is resistant to timing attacks, linear, and differential cryptanalysis attacks due to the usage of DS-Boxes.


AES Diffie–Hellman key exchange Cryptography Dynamic S-Boxes Attacks 


  1. 1.
    A. Kahate, Cryptography and Network Security (Tata McGraw-Hill Companies, 2008)Google Scholar
  2. 2.
    A. Eskicioglu, L. Litwin, Cryptography. IEEE Potent. 20(1) (2001).
  3. 3.
    S. Chandra, S. Paira, S.K. Alam, S. Bhattacharyya, A comparative survey of symmetric and asymmetric key cryptography, in International Conference on Electronics, Communication and Computational Engineering, ICECCE 2014, pp. 83–93.
  4. 4.
    W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)Google Scholar
  5. 5.
    P. Sehgal, N. Agarwal, S. Dutta, P.M. Durai Raj Vincent, Modification of Diffie-Hellman algorithm to provide more secure key exchange. Int. J. Eng. Technol. (IJET) 5(3), 2498–2501 (2013)Google Scholar
  6. 6.
    J. Daemen, V. Rijmen, The Design of Rijndael AES-The Advanced Encryption Standard (Springer, Berlin, 2002)Google Scholar
  7. 7.
    A. Abdullah, Advanced Encryption Standard (AES) algorithm to encrypt and decrypt data. Cryptogr. Netw. Security, pp. 1–12 (2017)Google Scholar
  8. 8.
    N. Mathur, R. Bansode, AES based text encryption using 12 Rounds with dynamic key selection, in International Conference on Communication Computing and Virtualization, vol. 79 (2016), pp. 1036–1043Google Scholar
  9. 9.
    B. Alex, G. Johann, Cryptanalysis of the full AES using GPU-like special-purpose hardware. J. Fundam. Inf. 114(3–4), 221–237 (2012). Cryptology in Progress: 10th Central European Conference on CryptologyGoogle Scholar
  10. 10.
    S. Hadi, S. Alireza, B. Behnam, A. Mohammadreza, Cryptanalysis of 7-Round AES-128. Int. J. Comput. Appl. 10(23), 21–29 (2013)Google Scholar
  11. 11.
    V. Kapoor, A. Jain, Novel hybrid cryptography for confidentiality, integrity, authentication. Int. J. Comput. Appl. 171(8), 35–40 (2017)Google Scholar
  12. 12.
    Y. Alkady, M.I. Habib, R.Y. Rizk, A new security protocol using hybrid cryptography algorithms, in 9th International Computer Engineering Conference (ICENCO), pp. 109–115 (2013).
  13. 13.
    M.S. Henriques, N.K. Vernekar, Using symmetric and asymmetric cryptography to secure communication between devices in IoT, in International conference on IoT and Application(ICIOT) (2017)Google Scholar
  14. 14.
    W. Stallings, Cryptography and Network Security: Principles and Practice, 5th edn. (Pearson Education, 2011). ISBN 10: 0-13-609704-9, ISBN 13: 978-0-13-609704-4Google Scholar
  15. 15.
    E.R. Harold, Java Network Programming: Developing Networked Applications (O’Reilly Media, Inc., 2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.Department of Information TechnologyKakatiya Institute of Technology and ScienceWarangalIndia

Personalised recommendations