2017 International Conference on Computing, Communication and Automation (ICCCA) 2017
DOI: 10.1109/ccaa.2017.8229881
|View full text |Cite
|
Sign up to set email alerts
|

Advanced encryption standard (AES) security enhancement using hybrid approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(18 citation statements)
references
References 6 publications
0
15
0
1
Order By: Relevance
“…The ciphertext size and encryption time results show that the overall encryption results in low computational requirements and high security. D'souza [21] proposes the AES algorithm with a hybrid approach to Dynamic Key Generation and Dynamic S-box Generation. This method adds more complexity in the data to increase confusion and diffusion in the ciphertext using Dynamic Key Generation.…”
Section: Related Workmentioning
confidence: 99%
“…The ciphertext size and encryption time results show that the overall encryption results in low computational requirements and high security. D'souza [21] proposes the AES algorithm with a hybrid approach to Dynamic Key Generation and Dynamic S-box Generation. This method adds more complexity in the data to increase confusion and diffusion in the ciphertext using Dynamic Key Generation.…”
Section: Related Workmentioning
confidence: 99%
“…Some previous studies have utilized asymmetric cryptography; for example, Purevjav, Kim & Lee (2016) and Harba (2017) employed Rivest Shamir Adleman (RSA), while Hong & Xuefeng (2013) and Xin (2015) used Elliptic Curve Cryptography (ECC). Other studies have applied symmetric cryptography, i.e., Altigani & Barry (2013) , D’souza & Panchal (2017) , Xin (2015) , and Harba (2017) used Advanced Encryption Standard (AES), while Hong et al (2017) implemented the Data Encryption Standard (DES) in combination with Rivest Code 4 (RC4). Singh et al (2015b) similarly used symmetric encoding, while Purevjav, Kim & Lee, (2016) combined a public key encryption system with a symmetric hash function, thereby ensuring that messages encrypted with the public key could only be decrypted reasonably quickly using the private key.…”
Section: Related Workmentioning
confidence: 99%
“…Using text and audio data for encryption, less encryption and decryption time was observed when compared to the conventional 128 bit AES algorithm. Similarly, Elliptic Curve Cryptography (ECC) was employed in [21] to generate irreversible random numbers used as AES secret keys. X and Y coordinates used for random number generation improved the entropy of the random numbers generated.…”
Section: Related Workmentioning
confidence: 99%