Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR)

  • PDF / 1,030,380 Bytes
  • 13 Pages / 439.37 x 666.142 pts Page_size
  • 95 Downloads / 192 Views

DOWNLOAD

REPORT


Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR) S. Srisakthi1   · A. P. Shanthi2

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Cloud data storage is a service offered by cloud computing for storing the data. Though it has a lot of benefits, the security of the stored data is one of its major concerns. Many models have been developed to address this issue. These models encrypt the data and store them. Advanced encryption standard (AES) is one of the encryption methods that has been used prevalently. This paper presents a model that tries to further strengthen the AES algorithm. It alters the shift row of the AES by making it key dependent. The key dependency enhances the security of the algorithm and the results show that the statistical pattern of the plaintext is dispersed over the cipher text, thereby, defending the plaintext from the cryptanalysis. Experimental results indicate that the dispersion ratio of the plaintext over the cipher text increases from 0.75 for AES to approximately 1 for the proposed model. The model is also analyzed using the coefficient of variation metric. The proposed model also exhibits a significant level of avalanche effect. Keywords  Cloud storage · Data security · Encryption · Advanced encryption standard

1 Introduction Cloud data storage has been on the rise due to its enormous benefits, the prominent benefit being the ability to access the data, irrespective of any physical boundary or time. In using the cloud storage, the user is relieved from the cost related to purchase of an additional storage space and its maintenance. However, in spite of the advantages, outsourcing of the data makes the data vulnerable to attacks. Hence, there is a hesitance from the user side towards using it. For the cloud data storage to be used broadly, the user should get a guarantee that the outsourced data is safe at the place of its storage. To protect the data, cryptographic techniques have been employed. One such prevalent encryption method that has been used is the advanced encryption standard (AES), designed by Vincent Rijmen and * S. Srisakthi [email protected] 1

Department of Computer Applications, B. S. Abdur Rahman Crescent Institute of Science and Technology, Vandalur, Chennai 600 048, India

2

Department of Computer Science and Engineering, College of Engineering, Anna University, Guindy Campus, Chennai 600 025, India



13

Vol.:(0123456789)



S. Srisakthi, A. P. Shanthi

Joan Daemen [1]. It has been selected by NIST (National Institute of Standards and Technology) as the winner, among the other algorithms that have been proposed [2]. The AES algorithm is a symmetric key algorithm, where the same key is used for both encryption and decryption. AES algorithm holds many benefits when compared to other algorithms. The foremost is that, the data is encrypted in multiple rounds in an iterated block cipher mode. The other benefit is the variable key size and the dynamic generation of key for each round. This makes the key