Chaotic Variations of AES Algorithm
نویسندگان
چکیده
Advanced Encryption Standard (AES) algorithm is considered as a secured algorithm. Still, some security issues lie in the S-Box and the key used. In this paper, we have tried to give focus on the security of the key used. Here, the proposed modified algorithms for the AES have been simulated and tested with different chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of both. For the evaluation purpose, the CPU time has been taken as the parameter. Though the variations of AES algorithms are taking some more time as compared to the standard AES algorithm, still the variations can be taken into consideration in case of more sensitive information. As we are giving more security to the key used for AES algorithm, our proposed algorithms are very much secured from unauthorized people.
منابع مشابه
Design of IIR Digital Filter using Modified Chaotic Orthogonal Imperialist Competitive Algorithm (RESEARCH NOTE)
There are two types of digital filters including Infinite Impulse Response (IIR) and Finite Impulse Response (FIR). IIR filters attract more attention as they can decrease the filter order significantly compared to FIR filters. Owing to multi-modal error surface, simple powerful optimization techniques should be utilized in designing IIR digital filters to avoid local minimum. Imperialist compe...
متن کاملBlind Watermarking Technique Using Chaotic Variations of AES for Color Images in Wavelets
Modern digital communication requires watermarking technique for copyright and user’s authentication purpose. In this paper, a blind digital watermarking technique has been proposed using Discrete Wavelet Transform (DWT) to embed information in midfrequency. Three chaotic variations of standard AES algorithm are used to shuffle the original pixel positions of watermark color image. The original...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کاملParameter Estimation of Loranz Chaotic Dynamic System Using Bees Algorithm
An important problem in nonlinear science is the unknown parameters estimation in Loranz chaotic system. Clearly, the parameter estimation for chaotic systems is a multidimensional continuous optimization problem, where the optimization goal is to minimize mean squared errors (MSEs) between real and estimated responses for a number of given samples. The Bees algorithm (BA) is a new member of me...
متن کاملA Novel Method for Designing S-Boxes Based on Chaotic Logistic Maps Using Cipher Key
Advanced Encryption Standard (AES) block cipher system is widely used in cryptographic applications. Substitution boxes (S-boxes) are keystone of modern symmetric cryptosystems. They bring nonlinearity to cryptosystems and strengthen their cryptographic security. The S-box component that used in classic AES is fixed. If we generate this S-box dynamically, the cryptographic strength of AES ciphe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1307.3057 شماره
صفحات -
تاریخ انتشار 2013