Authors:
M. Indrasena Reddy,A.P Siva Kumar,DOI NO:
https://doi.org/10.26782/jmcms.spl.5/2020.01.00027Keywords:
Modified Advanced Encryption Standard Algorithm,Flower Pollination Algorithm,Security,Encryption,Decryption,Key,Abstract
Over the internet and other network applications, the need for security is increasing each day due to its wide usage. There are a number of algorithms that have been developed for the secure transmission of data. This paper presents a novel approach for the generation of key using the Advanced Encryption Standard (AES) algorithm along with the Flower Pollination Algorithm (FPA). This combination is termed as Modified AES (MAES). Initially, a plain text of 128 bits is the input to this algorithm. This text is converted into a cipher text. The key generation is important for the generation of the S-Box (substitution box). The key generation in the proposed work is done using the Flower Pollination Algorithm. This step is done to generate the keys in such a way that the complexities of the S-Box enhances. This improves the security of the proposed approach for data transmission in a network. Then encryption is done. This is followed by decryption. Finally, the 128-bit plain text is retrieved at the receiver’s side. The MAES algorithm was compared with other traditional cryptographic algorithms. The proposed MAES algorithm yielded outstanding results.Refference:
I. A. A. Yavuz, F. Alagöz, E. Anarim, “A new multi-tier adaptive military
MANET security protocol using hybrid cryptography and
signcryption.” Turkish Journal of Electrical Engineering & Computer
Sciences, Vol.: 18, Issue: 1, pp. 1-22, 2010.
II. A. Kushwaha, H. R. Sharma, A. Ambhaikar, “Selective Encryption Using
Natural Language Processing for Text Data in Mobile Ad Hoc Network.”
In Modeling, Simulation, and Optimization, pp. 15-26, 2018
III. B. Bala, L. Kamboj, P. Luthra, “Secure File Storage in Cloud Computing
using Hybrid Cryptography, International Journal of Advanced Research in
Computer Science, Vol.: 9, Issue: 2, pp. 773-776, 2018.
IV. B. Pradhan, S. Sengupta, “Chaotic-cipher based memory efficient symmetric
key cryptosystem.” In 2018 Emerging Trends in Electronic Devices and
Computational Techniques, 2018.
V. Ç. Ünal, S. Kaçar, A. Zengin, I. Pehlivan, “A novel hybrid encryption
algorithm based on chaos and S-AES algorithm.” Nonlinear Dynamics 92,
Issue: 4, pp. 1745-1759, 2018.
VI. D. Parashar, S. Roy, N. Dey, V. Jain, U. S. Rawat, “Symmetric Key
Encryption Technique: A Cellular Automata Based Approach.” In
Proceedings of CSI Cyber Security, pp. 59-67, 2018.
VII. E. B. Kavun, H. Mihajloska, T. Yalçin, “A Survey on Authenticated
Encryption–ASIC Designer’s Perspective”, ACM Computing Surveys ,
Vol.: 50, Issue: 6, pp. 1-21, 2017.
VIII. G. J. Krishna, R. Vadlamani, S. N. Bhattu, “Key Generation for Plain Text
in Stream Cipher via Bi-Objective Evolutionary Computing”, Applied Soft
Computing, 2018.
IX. G. Kalpana, P. V. Kumar, S. Aljawarneh, R. V. Krishnaiah, “Shifted
Adaption Homomorphism Encryption for Mobile and Cloud
Learning”, Computers & Electrical Engineering , Vol.: 65, pp.178-195,
2018.
X. J. Liu, C. Fan, X. Tian, Q. Ding, “Optimization of AES and RSA Algorithm
and Its Mixed Encryption System.” In International Conference on
Intelligent Information Hiding and Multimedia Signal Processing, pp. 393-
403, 2017.
XI. K. S. Reddy, V. U. Kumar, “A Practical Approach for Secured Data
Transmission using Wavelet based Steganography and Cryptography”,
International Journal of Computer Applications, Vol.: 67, Issue: 10, 2013.
XII. K. S. Reddy, V. U. Kumar, “Secured Data Transmission using Wavelet
based Steganography and Cryptography”, International Journal of
Computers & Technology, Vol.: 6, Issue: 1, 2013.
XIII. K. V. N. Rao, P. K. Budda, K. Sruthi, “Authentication and Encryption Using
Modified Elliptic Curve Cryptography with Particle Swarm Optimization
and Cuckoo Search Algorithm.” Journal of The Institution of Engineers
(India): Series B, pp.1-9, 2018.
XIV. M. E. Hameed, M. M. Ibrahim, N. A. Manap, “Review on Improvement of
Advanced Encryption Standard (AES) Algorithm based on Time Execution,
Differential Cryptanalysis and Level of Security.” Journal of
Telecommunication, Electronic and Computer Engineering, Vol.: 10, Issue:
1, pp.139-145, 2018.
XV. M. Elhoseny, G. R. González, O. M. A. Elnasr, S. A. Shawkat, N.
Arunkumar, A. Farouk, “Secure medical data transmission model for IoTbased
healthcare systems.” IEEE Access, Vol.: 6. pp. 20596-20608, 2018.
XVI. M. I. S. Reddy, M. S. Reddy, “Key Distillation process on Quantum
cryptography protocals in Network Security”, International journal of Advanced Research computer science and Software Engineering, Vol.: 2,
Issue: 6, 2012.
XVII. M. I. S. Reddy, “Wireless Application Protocol for Potential Threats to
Mobile Agent Network Security”, Journal of Electronic science and
Technology, Vol.: 10, Issue: 3, 2012.
XVIII. M. P. Reddy, “Host Based Information Gathering Honeypots for Network
Security”, International Journal of computational Engineering & research,
Vol.: 2, Issue: 2, 2012.
XIX. M. Sookhak, A. Gani, M. K. Khan, R. Buyya, “Dynamic remote data
auditing for securing big data storage in cloud computing”, Information
Sciences , Vol.: 380 , pp.101-116, 2017.
XX. M. U. Bokhari, Q. M. Shallal, Y. K. Tamandani, “Reducing the Required
Time and Power for Data Encryption and Decryption Using K-NN Machine
Learning.” IETE Journal of Research, pp.1-9, 2018.
XXI. P. Dixit, A. K. Gupta, M. C. Trivedi, V. K. Yadav. “Traditional and Hybrid
Encryption Techniques: A Survey”, In Networking Communication and Data
Knowledge Engineering, pp. 239-248, 2018.
XXII. P. Li, K. T. Lo, “A Content-Adaptive Joint Image Compression and
Encryption Scheme”, IEEE Transactions on Multimedia, Vol.: 20, Issue: 8,
pp. 1960-1972, 2018.
XXIII. R. D. Gill, N. Kapur, H. S. Gill, “Increase Security of Data With Respect to
Both Confidentiality and Integrity over Cloud”, International Journal of
Applied Engineering Research , Vol.:13, Issue: 10, pp. 7388-7391, 2018.
XXIV. T. Hanqi, Q. T. Sun, X. Yang, K. Long, “A Network Coding and DES Based
Dynamic Encryption Scheme for Moving Target Defense.” IEEE Access,
Vol.: 6, pp.26059-26068, 2018.
XXV. Ü. Çavuşoğlu, A. Zengin, I. Pehlivan, S. Kaçar, “A novel approach for
strong S-Box generation algorithm design based on chaotic scaled
Zhongtang system.” Nonlinear Dynamics, Vol.: 87, Issue: 2, pp.1081-1094,
2017.
XXVI. V. Lozupone, “Analyze encryption and public key infrastructure
(PKI).” International Journal of Information Management , Vol.: 38, Issue: 1,
pp.42-44, 2018.
XXVII. Y. Ye, N. Wu, X. Zhang, L. Dong, F. Zhou, “An Optimized Design for
Compact Masked AES S-Box Based on Composite Field and Common
Subexpression Elimination Algorithm.” Journal of Circuits, Systems and
Computers, Vol.: 27, Issue: 11, pp.1-11, 2018.