SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
ISSN: 2319 – 4200, ISBN No. : 2319 – 4197 Volume 1, Issue 5 (Jan. - Feb 2013), PP 44-48
www.iosrjournals.org
www.iosrjournals.org 44 | Page
A Secure Software Implementation of Nonlinear Advanced
Encryption Standard
1
S.Vinoth John Prakash, 2
A.Arun.ME.,(Ph.D)
1
PG Scholar Saveetha Engineering College
2
Associate Professor Saveetha Engineering College
Abstract: Advanced Encryption Standard algorithm (AES) was introduced to resist classical methods of
cryptanalysis (i.e.) from linear or differential attacks. The cryptographic strength of the AES depends strongly
depends on the choice of S-box. The result of the new attack methods shows that there may be some lacuna in
the design of S-box in AES algorithm. The setback is the weakness of the existing linearity structure in the S-
box. After a detail analyze on the AES algorithm and a new performance scheme for rising complication of
nonlinear transformation in the structure of S- box is presented. In order to resist from the new attacks and to
execute the AES with the protected encryption and decryption by using verilog and to provide a further more
protection a Bio-metric scheme has been used in both the encryption and decryption schemes. The result shows
that the new nonlinear implementation of the AES S-Box by using Verilog provides enhanced security with good
enough speed for encryption and decryption.
Keywords: AES, Non-linear S-Box, Bio-metric Image.
I. Introduction
Network security is becoming more and more important as people spend more time connected.
Compromising network security is often much easier than compromising physical or local security, and is much
more common. Computer security is a general term that covers a wide area of computing and information
processing. Industries that depend on computer systems and networks to conduct daily business transactions and
access information regard their data as an important part of their overall assets. It is the process of preventing
and detecting unauthorized use of computer. Prevention measures help you to stop unauthorized users from
accessing any part of your computer system. Detection helps you to determine whether or not someone
attempted to break into your system, if they were successful, and what they may have done.
The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology
specification for the encryption of electronic data. It is expected to become the accepted means of encrypting
digital information, including financial, telecommunications, and government data. AES is the successor to the
older Data Encryption Standard (DES).
II. Advanced Encryption Standard
AES stands for Advanced Encryption Standard. AES is a symmetric key encryption algorithm which
replaces the commonly used Data Encryption Standard (DES). AES provides strong encryption and was selected
by NIST as a Federal Information Processing Standard. The AES algorithm uses three key sizes: a 128,192, or
256-bit encryption key. Each Encryption key size causes the algorithm to Behave slightly differently, so the
increasing key sizes not only offer a larger number of bits with which you can scramble the data, but also
increase the complexity of the cipher algorithm. The AES algorithm has four basic transformations as shown
below:
1. Sub Bytes Transformation:
This operates independently on each byte of the State using a substitution table (Sbox).
2. Shift Rows Transformation:
Left shift is performed on each row by a certain number of bytes.
3. Mix Columns Transformation:
Each byte of a column is mapped into a new value that is a function of all four bytes in that column.
4. Add Round Key Transformation:
The 128 bits of State are bitwise XORed with the 128 bits of the round key
III. Existing System
The security of sensitive Information transmitted via the Internet has been the focus of modem
cryptographist's attentions. The Rijndael algorithm was adopted as the Advanced Encryption Standard (AES) by
the (NIST). Data Encryption Standard (DES) is the first open encryption algorithm to protect the sensitive
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
www.iosrjournals.org 45 | Page
information. However, the shorter length of key, the complementary property and existence of weak and semi
weak keys reduce the security of DES; it is to find a stronger encryption algorithm to substitute the DES. The
objective in using the AES is to transfer the data so that only the desired receiver with a specific key would be
able to retrieve the original data. However, with the existence of malicious injected faults in non secure
environments. The existing scheme of the S-box is linear and it is not secure against cryptanalysis. So DES not
be secure as proposed system. The key size of the exciting system will not be small which increases the area.
Fig.1.Block diagram of AES Algorithm
IV. Proposed System
Through the research of Rijndael algorithm, we can see that a non-linear layer of S-box transformation
is a key to make the entire algorithm strong. It is well known that the cryptographic strength of the AES depends
on the choice of the S-box. Many cryptographists have discovered that there is some weakness in the design of
the existing S-box. To improve complexity of S-box structure our approach is combining a dynamic nonlinear
transformation method and linear function. A good S-box can be very well resist differential cryptanalysis,
linear cryptanalysis attacks and so on. The Advanced Encryption Standard (AES) has S-boxes in its Substitution
Bytes and Inverse Substitution bytes. To enhance the complexity of the S-Box's structure, the nonlinear and the
linear transformations models need to be reconsidered in the design of the S-box.
4.1 Non-Linearity:
In AES, the function of non linearity is achieved by means of the Substitute Bytes step. In the Sub
Bytes step, each byte in the array is updated using an 8-bit substitution box, the RijndaeI S-box. S-boxes
substitute or transform input bit into output bit. A good S-box will have the property that changing one input bit
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
www.iosrjournals.org 46 | Page
will change about half of the output bit. It will also have the property that each of the output bit will depend on
every input bit. Here we will design a dynamic S-box that is highly secure to all known attacks. Since
nonlinearity is applied to the S-box, the key is also protected. The key could not be known to the attackers due
to the dynamic formulation of the s-box. Thus it will provide an enhanced security.
4.2 Biometrics:
Biometrics is slightly different each time they are measured. Therefore they cannot be stored in
untreated form as passwords because the unprocessed form of the original biometric and the untreated form of a
later measurement of the same biometric would not match. For biometrics to be broadly accepted, it is needed a
way to store biometrics in a secure form that cannot be used by an attacker to impersonate a valid user. The
nonlinear structure of S-Box provides high security in the encryption and decryption process but to improve
authentication we go for biometrics. AES Encryption and then the Decryption takes place for the fingerprint to
improve the complexity. To make this as a complete application AES cryptography algorithm is combined with
biometric authentication scheme.
Fig.2. Proposed encryption architecture
V. IMPLEMENTATION
The entire construction is made tough by converting the existing linear structure of the S-box into a
nonlinear structure. The nonlinear structure can be achieved by substituting a random hexadecimal number to
the actual S-box value. When the real S-box value is called it is mapped to a random hexadecimal number which
is generated during the run time of the encryption process by the proposed structure. In the nonlinear
implementation three S-Boxes is being used. During encryption, the input value is first mapped to Default S-
Box (Pre-defined S-Box), which is the original AES S-Box and this value undergo a XOR process with the new
derived S-Box which is the l's complement of the actual S-Box to generate the virtual S-Box. Thus for each
different input value the virtual S-Box will be dynamically generated. Similarly for the decryption, the reverse
process will take place using the inverse virtual S-Box. During this encryption, the input value will be mapped
to the virtually created S-Box then this value will map to the default S Box to produce the encrypted result.
During decryption, the input value will be mapped to the default S-Box and then this value will map to the
virtually created S-Box to produce the decrypted original result.
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
www.iosrjournals.org 47 | Page
Fig.3.Proposed decryption architecture
Fig.4.Creation of dynamic S-Box
Fig.5.Decryption using Virtual S-Box
In the encryption side, for a given input image, the image transform is done by using the fuzzy vault
method in which the rows and columns are interchanged successive times to generate the encrypted image.
A Secure Software Implementation of Nonlinear Advanced Encryption Standard
www.iosrjournals.org 48 | Page
In the decryption side, when the user provides the input to the system, it is compared to the finger print
image already stored in the database. If both of them match, then authentication is provided and so enters the
decryption process.
VI. CONCLUSION
The methods of new attacks well show that the design of S-box has some weaknesses. The principal
weakness is the problem of linearity in the S-box and key schedule. It is necessary to improve nonlinear
transformations in the design of S-box and key schedule in order to protect from new attacks. Some measures
against new attacks were adopted by improving the complexity of nonlinear transformation of S-box in our
implementation scheme. This implementation scheme does not affect the originality of the AES algorithm but
makes it more non linear and dynamic, thus making it unbreakable. The scheme of Verilog implementation is
feasible in the networking environment, and has an acceptable speed of data encryption and decryption. This
implementation presents a New nonlinear transformation for AES S-box to enhance the complexity of the S-box
structure. The enhanced S-box structure provides a strong and expanded security. The alignment of the
biometrics scheme with AES algorithm provides an additional protection in authentication system.
References
[1] National Institute of Standards and Technology (NIST), "Recommendation for Block cipher modes of operation," Dec.2001.
[2] "A New Mutable Nonlinear Transformation Algorithm for S-box" Atsushi WATANABE, Hiroshi HARUKI,Shun SH1MOTOMAI,
Takeshi SAITO, Tomoyuki NAGASE
[3] "A Research and Improvement based On Rijndael Algorithm" Van chun, Yanxia GUO
[4] NIST, "Advanced Encryption Standard," FIPS PUB 197, pp. I-51, November 2001
[5] "AES Proposal: Rijndael”, Joan Daemen, Vincent Rijmen, Springer- Verlag, Berlin Heidelberg, 2002.
[6] Claude Carlet "Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function"
[7] Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard Mehran Mozaffari- Kermani,
and Arash Reyhani-Masoleh.
[8] "Efficient method for simplifYing and approximating the S-boxes based on power functions" by A. F arhadian and M.R. Aref in the
year 2009.
[9] "A High speed FGPA implementation of the rinjdael algorithm" by Refik Sever A., Neslin Ismailoglu, Yusuf C.Tekmen, Murat
Askar anc Burak Okcan.2004
[10] "Effect of Security Increment to Symmetric Data Encryption through AES Methodology" by Md. Nazrul.

Weitere ähnliche Inhalte

Was ist angesagt?

Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
Agate Studio
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 

Was ist angesagt? (20)

Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
G04701051058
G04701051058G04701051058
G04701051058
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
 
Final report
Final reportFinal report
Final report
 
50120140507006
5012014050700650120140507006
50120140507006
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
B03302007012
B03302007012B03302007012
B03302007012
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
82 86
82 8682 86
82 86
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 

Andere mochten auch

Andere mochten auch (20)

C0341923
C0341923C0341923
C0341923
 
K0216571
K0216571K0216571
K0216571
 
How to Create Little Planets
How to Create Little PlanetsHow to Create Little Planets
How to Create Little Planets
 
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
 
Pr
PrPr
Pr
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploit
 
Secured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD DeviceSecured E-Learning Content on USB/HDD Device
Secured E-Learning Content on USB/HDD Device
 
E0561719
E0561719E0561719
E0561719
 
Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data
 
J0564651
J0564651J0564651
J0564651
 
Advances in Automatic Speech Recognition: From Audio-Only To Audio-Visual Sp...
Advances in Automatic Speech Recognition: From Audio-Only  To Audio-Visual Sp...Advances in Automatic Speech Recognition: From Audio-Only  To Audio-Visual Sp...
Advances in Automatic Speech Recognition: From Audio-Only To Audio-Visual Sp...
 
On The Automated Classification of Web Pages Using Artificial Neural Network
On The Automated Classification of Web Pages Using Artificial  Neural NetworkOn The Automated Classification of Web Pages Using Artificial  Neural Network
On The Automated Classification of Web Pages Using Artificial Neural Network
 
H0434651
H0434651H0434651
H0434651
 
H0345259
H0345259H0345259
H0345259
 
Efficiency of TreeMatch Algorithm in XML Tree Pattern Matching
Efficiency of TreeMatch Algorithm in XML Tree Pattern  MatchingEfficiency of TreeMatch Algorithm in XML Tree Pattern  Matching
Efficiency of TreeMatch Algorithm in XML Tree Pattern Matching
 
I01066062
I01066062I01066062
I01066062
 
The Impact Of Positive Thinking On Your Internet Business
The Impact Of Positive Thinking On Your Internet BusinessThe Impact Of Positive Thinking On Your Internet Business
The Impact Of Positive Thinking On Your Internet Business
 
Immigration and Visas for International Medics
Immigration and Visas for International MedicsImmigration and Visas for International Medics
Immigration and Visas for International Medics
 
Rp presentation
Rp presentationRp presentation
Rp presentation
 
Bahasa indonesia
Bahasa indonesiaBahasa indonesia
Bahasa indonesia
 

Ähnlich wie H0154448

Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 

Ähnlich wie H0154448 (20)

Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptxDESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
DESIGN%20AND%20IMPLEMENTATION%20OF%20DATA%20SECURITY%20USING%20ADVANCED.pptx
 
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
Data Encryption using Combination of RSA Cryptography and PLS based Steganogr...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
IRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES AlgorithmIRJET - Enhancement in AES Algorithm
IRJET - Enhancement in AES Algorithm
 
Ci25500508
Ci25500508Ci25500508
Ci25500508
 
A03530107
A03530107A03530107
A03530107
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
F017364451
F017364451F017364451
F017364451
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
 
Enhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESETEnhanced Advanced Encryption Standard (E-AES): using ESET
Enhanced Advanced Encryption Standard (E-AES): using ESET
 
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card NumbersEfficient Fpe Algorithm For Encrypting Credit Card Numbers
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 

Mehr von IOSR Journals

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 

H0154448

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) ISSN: 2319 – 4200, ISBN No. : 2319 – 4197 Volume 1, Issue 5 (Jan. - Feb 2013), PP 44-48 www.iosrjournals.org www.iosrjournals.org 44 | Page A Secure Software Implementation of Nonlinear Advanced Encryption Standard 1 S.Vinoth John Prakash, 2 A.Arun.ME.,(Ph.D) 1 PG Scholar Saveetha Engineering College 2 Associate Professor Saveetha Engineering College Abstract: Advanced Encryption Standard algorithm (AES) was introduced to resist classical methods of cryptanalysis (i.e.) from linear or differential attacks. The cryptographic strength of the AES depends strongly depends on the choice of S-box. The result of the new attack methods shows that there may be some lacuna in the design of S-box in AES algorithm. The setback is the weakness of the existing linearity structure in the S- box. After a detail analyze on the AES algorithm and a new performance scheme for rising complication of nonlinear transformation in the structure of S- box is presented. In order to resist from the new attacks and to execute the AES with the protected encryption and decryption by using verilog and to provide a further more protection a Bio-metric scheme has been used in both the encryption and decryption schemes. The result shows that the new nonlinear implementation of the AES S-Box by using Verilog provides enhanced security with good enough speed for encryption and decryption. Keywords: AES, Non-linear S-Box, Bio-metric Image. I. Introduction Network security is becoming more and more important as people spend more time connected. Compromising network security is often much easier than compromising physical or local security, and is much more common. Computer security is a general term that covers a wide area of computing and information processing. Industries that depend on computer systems and networks to conduct daily business transactions and access information regard their data as an important part of their overall assets. It is the process of preventing and detecting unauthorized use of computer. Prevention measures help you to stop unauthorized users from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology specification for the encryption of electronic data. It is expected to become the accepted means of encrypting digital information, including financial, telecommunications, and government data. AES is the successor to the older Data Encryption Standard (DES). II. Advanced Encryption Standard AES stands for Advanced Encryption Standard. AES is a symmetric key encryption algorithm which replaces the commonly used Data Encryption Standard (DES). AES provides strong encryption and was selected by NIST as a Federal Information Processing Standard. The AES algorithm uses three key sizes: a 128,192, or 256-bit encryption key. Each Encryption key size causes the algorithm to Behave slightly differently, so the increasing key sizes not only offer a larger number of bits with which you can scramble the data, but also increase the complexity of the cipher algorithm. The AES algorithm has four basic transformations as shown below: 1. Sub Bytes Transformation: This operates independently on each byte of the State using a substitution table (Sbox). 2. Shift Rows Transformation: Left shift is performed on each row by a certain number of bytes. 3. Mix Columns Transformation: Each byte of a column is mapped into a new value that is a function of all four bytes in that column. 4. Add Round Key Transformation: The 128 bits of State are bitwise XORed with the 128 bits of the round key III. Existing System The security of sensitive Information transmitted via the Internet has been the focus of modem cryptographist's attentions. The Rijndael algorithm was adopted as the Advanced Encryption Standard (AES) by the (NIST). Data Encryption Standard (DES) is the first open encryption algorithm to protect the sensitive
  • 2. A Secure Software Implementation of Nonlinear Advanced Encryption Standard www.iosrjournals.org 45 | Page information. However, the shorter length of key, the complementary property and existence of weak and semi weak keys reduce the security of DES; it is to find a stronger encryption algorithm to substitute the DES. The objective in using the AES is to transfer the data so that only the desired receiver with a specific key would be able to retrieve the original data. However, with the existence of malicious injected faults in non secure environments. The existing scheme of the S-box is linear and it is not secure against cryptanalysis. So DES not be secure as proposed system. The key size of the exciting system will not be small which increases the area. Fig.1.Block diagram of AES Algorithm IV. Proposed System Through the research of Rijndael algorithm, we can see that a non-linear layer of S-box transformation is a key to make the entire algorithm strong. It is well known that the cryptographic strength of the AES depends on the choice of the S-box. Many cryptographists have discovered that there is some weakness in the design of the existing S-box. To improve complexity of S-box structure our approach is combining a dynamic nonlinear transformation method and linear function. A good S-box can be very well resist differential cryptanalysis, linear cryptanalysis attacks and so on. The Advanced Encryption Standard (AES) has S-boxes in its Substitution Bytes and Inverse Substitution bytes. To enhance the complexity of the S-Box's structure, the nonlinear and the linear transformations models need to be reconsidered in the design of the S-box. 4.1 Non-Linearity: In AES, the function of non linearity is achieved by means of the Substitute Bytes step. In the Sub Bytes step, each byte in the array is updated using an 8-bit substitution box, the RijndaeI S-box. S-boxes substitute or transform input bit into output bit. A good S-box will have the property that changing one input bit
  • 3. A Secure Software Implementation of Nonlinear Advanced Encryption Standard www.iosrjournals.org 46 | Page will change about half of the output bit. It will also have the property that each of the output bit will depend on every input bit. Here we will design a dynamic S-box that is highly secure to all known attacks. Since nonlinearity is applied to the S-box, the key is also protected. The key could not be known to the attackers due to the dynamic formulation of the s-box. Thus it will provide an enhanced security. 4.2 Biometrics: Biometrics is slightly different each time they are measured. Therefore they cannot be stored in untreated form as passwords because the unprocessed form of the original biometric and the untreated form of a later measurement of the same biometric would not match. For biometrics to be broadly accepted, it is needed a way to store biometrics in a secure form that cannot be used by an attacker to impersonate a valid user. The nonlinear structure of S-Box provides high security in the encryption and decryption process but to improve authentication we go for biometrics. AES Encryption and then the Decryption takes place for the fingerprint to improve the complexity. To make this as a complete application AES cryptography algorithm is combined with biometric authentication scheme. Fig.2. Proposed encryption architecture V. IMPLEMENTATION The entire construction is made tough by converting the existing linear structure of the S-box into a nonlinear structure. The nonlinear structure can be achieved by substituting a random hexadecimal number to the actual S-box value. When the real S-box value is called it is mapped to a random hexadecimal number which is generated during the run time of the encryption process by the proposed structure. In the nonlinear implementation three S-Boxes is being used. During encryption, the input value is first mapped to Default S- Box (Pre-defined S-Box), which is the original AES S-Box and this value undergo a XOR process with the new derived S-Box which is the l's complement of the actual S-Box to generate the virtual S-Box. Thus for each different input value the virtual S-Box will be dynamically generated. Similarly for the decryption, the reverse process will take place using the inverse virtual S-Box. During this encryption, the input value will be mapped to the virtually created S-Box then this value will map to the default S Box to produce the encrypted result. During decryption, the input value will be mapped to the default S-Box and then this value will map to the virtually created S-Box to produce the decrypted original result.
  • 4. A Secure Software Implementation of Nonlinear Advanced Encryption Standard www.iosrjournals.org 47 | Page Fig.3.Proposed decryption architecture Fig.4.Creation of dynamic S-Box Fig.5.Decryption using Virtual S-Box In the encryption side, for a given input image, the image transform is done by using the fuzzy vault method in which the rows and columns are interchanged successive times to generate the encrypted image.
  • 5. A Secure Software Implementation of Nonlinear Advanced Encryption Standard www.iosrjournals.org 48 | Page In the decryption side, when the user provides the input to the system, it is compared to the finger print image already stored in the database. If both of them match, then authentication is provided and so enters the decryption process. VI. CONCLUSION The methods of new attacks well show that the design of S-box has some weaknesses. The principal weakness is the problem of linearity in the S-box and key schedule. It is necessary to improve nonlinear transformations in the design of S-box and key schedule in order to protect from new attacks. Some measures against new attacks were adopted by improving the complexity of nonlinear transformation of S-box in our implementation scheme. This implementation scheme does not affect the originality of the AES algorithm but makes it more non linear and dynamic, thus making it unbreakable. The scheme of Verilog implementation is feasible in the networking environment, and has an acceptable speed of data encryption and decryption. This implementation presents a New nonlinear transformation for AES S-box to enhance the complexity of the S-box structure. The enhanced S-box structure provides a strong and expanded security. The alignment of the biometrics scheme with AES algorithm provides an additional protection in authentication system. References [1] National Institute of Standards and Technology (NIST), "Recommendation for Block cipher modes of operation," Dec.2001. [2] "A New Mutable Nonlinear Transformation Algorithm for S-box" Atsushi WATANABE, Hiroshi HARUKI,Shun SH1MOTOMAI, Takeshi SAITO, Tomoyuki NAGASE [3] "A Research and Improvement based On Rijndael Algorithm" Van chun, Yanxia GUO [4] NIST, "Advanced Encryption Standard," FIPS PUB 197, pp. I-51, November 2001 [5] "AES Proposal: Rijndael”, Joan Daemen, Vincent Rijmen, Springer- Verlag, Berlin Heidelberg, 2002. [6] Claude Carlet "Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function" [7] Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard Mehran Mozaffari- Kermani, and Arash Reyhani-Masoleh. [8] "Efficient method for simplifYing and approximating the S-boxes based on power functions" by A. F arhadian and M.R. Aref in the year 2009. [9] "A High speed FGPA implementation of the rinjdael algorithm" by Refik Sever A., Neslin Ismailoglu, Yusuf C.Tekmen, Murat Askar anc Burak Okcan.2004 [10] "Effect of Security Increment to Symmetric Data Encryption through AES Methodology" by Md. Nazrul.