Open Access   Article Go Back

A Brief Study on AES Technique With Double and Triple Block Cipher

P. Lakshmi Devi1 , K. Madhusudhan Reddy2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 73-76, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.7376

Online published on Mar 20, 2019

Copyright © P. Lakshmi Devi, K. Madhusudhan Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Lakshmi Devi, K. Madhusudhan Reddy, “A Brief Study on AES Technique With Double and Triple Block Cipher,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.73-76, 2019.

MLA Style Citation: P. Lakshmi Devi, K. Madhusudhan Reddy "A Brief Study on AES Technique With Double and Triple Block Cipher." International Journal of Computer Sciences and Engineering 07.06 (2019): 73-76.

APA Style Citation: P. Lakshmi Devi, K. Madhusudhan Reddy, (2019). A Brief Study on AES Technique With Double and Triple Block Cipher. International Journal of Computer Sciences and Engineering, 07(06), 73-76.

BibTex Style Citation:
@article{Devi_2019,
author = {P. Lakshmi Devi, K. Madhusudhan Reddy},
title = {A Brief Study on AES Technique With Double and Triple Block Cipher},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {73-76},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=870},
doi = {https://doi.org/10.26438/ijcse/v7i6.7376}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.7376}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=870
TI - A Brief Study on AES Technique With Double and Triple Block Cipher
T2 - International Journal of Computer Sciences and Engineering
AU - P. Lakshmi Devi, K. Madhusudhan Reddy
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 73-76
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cryptography plays an important role in data security. During digital exchange of data, it is important; data should not be access by an unauthorized user. Cryptography methods are based on symmetric and asymmetric encryption. It is challenging researchers to find out advanced encryption security development algorithm. Cryptography techniques are based on, symmetric key or private key and asymmetric key or public key. Researchers worked on secure and efficient data transmission and presented various cryptographic techniques. For secure and efficient data transmission over the network, it is necessary to use correct encryption method. Symmetric encryption is widely used technique. In this research work, we are presenting an efficient block cipher encryption techniques based on triple method and improved key. Proposed AESD method is based on block level symmetric encryption. The proposed AESD method is based on improve cubes. A pair of binary inputs are contains by each cell. The Cube can able to provide a various number of combinations, by that system will generate a strong cipher text. For efficient and strong cipher, proposed technique uses shuffling of bits in cube. Proposed AESD algorithm, performed a series of bit transformations, by using of S-BOX, operation XOR, and operation AND. The performance analysis of proposed encryption technique are compared with different existing symmetric encryptions methods, based on block cipher encryption, such as Data encryption standard, 3-Data encryption standard, Advance encryption standard, and blowfish fish, based on various comparison parameters such as encryption and decryption time, Avalanche effect and cipher text size. Simulation results clearly shows that proposed method performs outstanding in terms of encryption and decryption time, Avalanche effect and size, as compared to existing methods.

Key-Words / Index Term

Encryption, decryption, Block Cipher, DES, AESD, 3-DES, AES, Blowfish, and Encryption

References

[1] Priyadarshini Patil, Prashant Narayankar ,Narayan D G , Meena S M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish”, Science Direct, Elsevier, International Conference on Information Security & Privacy (ICISP), 11-12 December 2017, Nagpur, INDIA ,PP 617-624, 2017.
[2] Guy-Armand Yandji, Lui Lian Hao,“Research on a normal file encryption and decryption”, IEEE conference, PP 978-982, 2017.
[3] P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi,” Peformance Analysis Of Data Encryption Algorithms”, IEEE conference, PP 542-547, 2016.
[4] Sharad Boni,Jaimik Bhatt,Santosh Bhat,” Improving the Diffie-Hellman Key Exchange Algorithm by Proposing the Multiplicative Key Exchange Algorithm”, International Journal of Computer Applications (0975 – 8887)Volume 130, No.15, PP 7-11,November-2015.
[5] Manju Rani,Dr. Sudesh Kumar,”Analysis on Different Parameters of Encryption Algorithms for Information Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, PP 104-108,August 2015.
[6] Swati Kashyap, Er. Neeraj Madan,”A Review on: Network Security and Cryptographic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, PP 1414-1419 ,April 2015.
[7] Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi,” Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, MIS Review, Vol. 19, No. 2, pp. 1-13, March (2014).
[8] Dharitri Talukdar, “Study on symmetric key encryption: An Overview”, International Journal of Applied Research, PP 543-546, 2015.
[9] Rajesh R Mane,” A Review on Cryptography Algorithms, Attacks and Encryption Tools”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 9, PP 8509-8515, September 2015.
[10] Dharitri Talukdar, Prof (Dr.) Lakshmi P. Saikia,” A Review On Different Encryption Techniques: A Comparative Study”, International Journal of Engineering Research and General Science Volume 3, Issue 3, PP 1622-1626,May-June, 2015.
[11] Obaida Mohammad Awad Al-Hazaimeh,”A new approach for complex encrypting and decrypting data”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, PP 96-105, March 2013.
[12] Rajdeep Bhanot and Rahul Hans, “A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and Its Applications, Vol. 9, No. 4, pp. 289-306, 2015.
[13] Rashmi A. Gandhi,Atul M. Gosai,“A Study on Current Scenario of Audio Encryption”, International Journal of Computer Applications (0975 – 8887) ,Volume 116, No. 7, April 2015.
[14] Pahrul Irfan, Yudi Prayudi,Yogyakarta,Imam Riadi, Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA)”, International Journal of Computer Applications (0975 -8887)Volume 123 ,No.6, August 2015.
[15] Dhishan Dhammearatchi,” Particlemagic: need for quantum Cryptography research in the south Asian region”, International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 5, PP 99-109, September 2015.
[16] Harsh Mathur, Prof.Zahid Alam,” Analysis In Symmetric And Asymmetric Cryptology Algorithm”, International Journal of Emerging Trends & Technology in Computer Science, Volume 4, Issue 1, PP 44-47,January-February 2015.
[17] Pranjala G Kolapwar,” An improved geo-encryption algorithm in location based services”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163, Volume: 04 Issue: 05,547-551, May-2015.
[18] Rupinder Kaur, Dr. Madhu Goel,”Effective Symmetric Key Block Ciphers Technique for Data Security: RIJNDAEL”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7,PP 224-228, July 2014.
[19] Soheila Omer AL Faroog Mohammed Koko, Dr.Amin Babiker A/Nabi Mustafa,” Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication”, IOSR Journal of Computer Engineering, Volume 17, Issue 1, Ver. III, PP 62-69, Feb. 2015.
[20] Neha,Paramjeet Singh, Shaveta Rani, “Optimal Keyless Algorithm for Security”, International Journal of Computer Applications (0975 – 8887),Volume 124 - No.10,PP28-33,, August 2015.