Please use this identifier to cite or link to this item: http://repository.kln.ac.lk/handle/123456789/15712
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPerera, P.S.L.-
dc.contributor.authorWijesiri, G.S.-
dc.date.accessioned2017-01-04T09:00:28Z-
dc.date.available2017-01-04T09:00:28Z-
dc.date.issued2016-
dc.identifier.citationPerera, P.S.L. and Wijesiri, G.S. 2016. A masking method for resisting key attacks on AES. In Proceedings of the International Research Symposium on Pure and Applied Sciences (IRSPAS 2016), Faculty of Science, University of Kelaniya, Sri Lanka. p 58.en_US
dc.identifier.isbn978-955-704-008-0-
dc.identifier.urihttp://repository.kln.ac.lk/handle/123456789/15712-
dc.description.abstractCryptography is the science of securing data. It makes us easy to store sensitive data and transmit across insecure networks. Modern cryptography is applied in smart cards, computer passwords, and electronic commerce. Data Encryption Standard (DES) was a popular symmetric-key (64-bit) block cipher in USA from 1970’s. It was broken in 1999 by making the key length insecure with the improved computer speed. Later AES (Advanced Encryption Standard) was introduced to replace DES. Both key expansion and encryption algorithms of AES depend on S-boxes and calculations are done on the finite field GF (28). AES uses substitution-permutation and 128 block size while DES uses a balanced fiestel structure and 64 block size. DES has already broken but AES is still in use and is not completely broken. Today, key attacks for AES are steadily in progress. Since AES has theoretically broken by some key attacks, it is already at a risk of practical breakthrough. Algebraic attacks and related- key attacks are two of the main key attacks. The objective of the algebraic attack is recovering the key by solving system of multivariate polynomial equations over a Galois field. Related-key attacks use multiple pairs of plaintexts and encrypt each of them using two keys. As a result, the encryption key can be recovered. In this paper, we are going to combine AES algorithm with DNA cryptography which is a branch of Nano-cryptography to enhance the security of AES. We propose an improved algorithm to provide security against key attacks. In the algorithm we use masking techniques and DNA cryptosystem concepts based on the Vigenere cipher. DNA cryptography concepts help to avoid the weaknesses of Vigenere cipher and provide both computational and biological security.en_US
dc.language.isoenen_US
dc.publisherFaculty of Science, University of Kelaniya, Sri Lankaen_US
dc.subjectSymmetric-key cryptographyen_US
dc.subjectDNA cryptographyen_US
dc.subjectVigenere cipheren_US
dc.titleA masking method for resisting key attacks on AESen_US
dc.typeArticleen_US
Appears in Collections:IRSPAS 2016

Files in This Item:
File Description SizeFormat 
58.pdf242.87 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.