An Advanced AES Algorithm Using Swap and 400 Bit Data Block With Flexible S-Box in Cloud Computing
An Advanced AES Algorithm Using Swap and 400 Bit Data Block With Flexible S-Box in Cloud Computing
Abstract— This paper suggests a new Advance Encryption supporting any combinations of data and key size of 128, 192,
Standard (AES) encryption technique. New Algorithm uses 400 and 256 bits. However, AES allows only a 128 bit data length
bit block encryption scheme and a key dependent rotated S-Box that can be divided into four basic operation blocks. Rijndael
which varies according to the 200 bit key provided by the user. was designed to have the following characteristics such as
Fixed S-box allows hackers to study S-box and find weaker resistance against all known attacks, speed and code
points, whereas using key-dependent S-Box, it is harder for compactness on a wide range of platforms and data simplicity.
attacker to do any offline analysis of an attack on one particular These blocks operate on array of bytes and are organized as
set of S-boxes. This helps to store data in cloud securely and to 4×4 matrix that is called the state. For full encryption, the data
transfer data without any obstruction or modification in Cloud is passed through Nr rounds (Nr = 10, 12, 14) [7], [12].
Computing and big data Rijndael rounds contain four different stages namely Sub Byte
Transformation, Shift Row, Mix Column, and Add Round Key
Keywords—AES, Encryption Techniques, Block Encryption, S-
[14].
Box Rotation, Swap, Cloud Computing, Data Transmission
1) Substitution Bytes Transformation
I. INTRODUCTION AES defines a 16 * 16 matrix of one byte or 8 bit
In the present day, technology has evolved very much, so now values, also called as an S-box, which contains the
a days, securing someone’s private data is very important, to do permutation of all possible 256 8-bit values. These values
so we need encryption or ciphering of the data to be transferred, are substituted with the values in state matrix at this stage.
to make data secure from illegal copying, distribution and This provides non linearity, uncertainty and confusion and
attackers. It is also highly needed that a Hacker must not even be also known as S-box substitution stage.
able to peep into the data. Enciphering is very important operation
to preserve the confidentiality and privacy of digital images [6] 2) Shift Rows
transmitted over public networks especially with rapid growth in This stage rotates each row of the block according to
usage of vast communication techniques. One of the strongest its row index providing inter column diffusion. This is also
encryption techniques is AES [1],[10]. This technique is used by known as rotation of rows.
government agencies and banks to secure their data. This 3) Mix Columns
technique is only vulnerable to brute force attack which is almost Some predefined operations with another fixed 4*4
impossible or negligible to be used in breaking, as it requires polynomial matrix are performed in this stage and value of
much amount of time in checking all the possibilities of keys that each cell is varied according to the operation. Here the
can be generated by given constraints.
bytes are treated as polynomials rather than numbers. This
A. Advance Encryption Standard provides inter–byte diffusion and is known as linear
In October 2000, after a four year consistent effort to combination stage.
replace the aging DES, NIST announced the selection of
Rijndael [1], as the proposed AES (NIST 2004). Draft of the 4) Add Round key
Federal Information Processing Standard (FIPS) [14] for the A rounded key is added to the State by bitwise
AES was published in February 2001, Standardization of AES Exclusive-OR (XOR) operation in AddRoundKey
was approved after public review and comments, and Transformation. This also provides diffusion and hence
published a final standard FIPS PUB-197 in December 2001. creates confusion.
Rijndael [14] is a block cipher algorithm developed by
Joan Daemen and Vincent Rijmen [3],[9]. The algorithm is
flexible in
2
International Conference on Computing, Communication and Automation (ICCCA2017)
and a Substitution box which varies according to the input key Xor these sections together to calculate a number say
given by the user which will make this new algorithm more ‘no’.
robust and secure [11]. The proposed algorithm contains two Shift the original S-box by ‘no’ number of times
extra stages, one for swapping of data blocks and other for towards right.
calculation of S-box based on the 200 bit key. }
4) Sub Byte Operation
For (i=0; i<5; i++)
{
For (j=0; j<5; j++)
{
Take each cell (1 Byte) for replacement. And set the
row no by the first nibble of the cell value and the col
no. by the second nibble of the cell value.
Replace the considered cell by the value at ‘row no.’
row and ‘col no.’ column in the modified S-box
calculated in S-box calculation step.
}
}
3
International Conference on Computing, Communication and Automation (ICCCA2017)
IV. EXAMPLE B. Increased Size of Data Block
The size of data has been increased from 128 bit to 400 bit
data block.
A. Flexible S – Box
The original Rijndael’s AES algorithm uses fixed S – Box
for the substitution operations and uses regular 16*16 matrix 00 05 0A 0F 14 19 1E 23 28 2D
for data and same size of Cipher key. The proposed AES
algorithm uses a flexible S – Box which changes its order 01 06 0B 10 15 1A 1F 24 29 2E
based on the given Cipher key of 200 bit size arranged in 5*5
size matrix. 02 07 0C 11 16 1B 20 25 2A 2F
03 08 0D 12 17 1C 21 26 2B 30
Procedure for generating S – Box: The new S – Box that
is generated will be used throughout the Encryption process. 04 09 0E 13 18 1D 22 27 2C 31
Elements from each cell are XORed from the 5*5 matrix of
Cipher Key given by the user. Then the S – Box is rotated to
the ‘value’ number of times. Fig 4.3: Data Block of 5*10 matrix
Fig 4.4: Data Block divided as left and right sub blocks
The 400 bit data block is divided as 200 bit left and
right data blocks.
4
International Conference on Computing, Communication and Automation (ICCCA2017)
D. Shift Row Operation 2. 4GB RAM
Shift Rows operation is performed similar to Orginal 3. 10 GB ROM
Rijndael’s Algorithm, but on 5 * 5 matrix. 4. Dev C++
5
International Conference on Computing, Communication and Automation (ICCCA2017)
X. REFERENCES