Research on Improved AES Encryption Algorithm

Article Preview

Abstract:

AES (Advanced Encryption Standard) in May 26, 2002 became effective standard. AES algorithm research has become a hot topic at home and abroad, and the algorithm has been widely applied in the field of information security. Since the algorithm of AES key expansion part is open, so the key is between the wheel can be derived from each other, the AES algorithm designed for this security risk by generating pseudo-random number. Logistic mapping a certain length, after quantization is used as a key to improve the security of the AES algorithm.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

1861-1864

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ji Zhang, Tingting Yuan, Heping Lin. Research of the Combination Algorithm Based on AES and RSA [C]. The 2011 Asia-Pacific Youth Conference of Youth Communication and Technology, 2011: 217-220.

Google Scholar

[2] Abdullah Al Hasib, Abul Ahsan Md. Mahmudul Haque. A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography [C]. Third 2008 International Conference on Convergence and Hybrid Information Technology, 2008: 505-510.

DOI: 10.1109/iccit.2008.179

Google Scholar

[3] R. Matthews. A High-Through Put Low-Cost AES Processor [J]. Cryptologia, 1984, 8(1): 29-41.

Google Scholar

[4] Joan Daemen. AES-the Advanced Encryption Standard [J]. Physics Letters. 1998, 240: 50-54.

Google Scholar

[5] Lihong Zhang, Yifeng Zhang. Research on Lorenz Chaotic Stream Cipher [C]. IEEE International Workshop VLSI Design & Video Tech, 2005: 431-434.

DOI: 10.1109/iwvdvt.2005.1504642

Google Scholar

[6] Kocarev L. Chaos-based Cryptography: A Brief Overview [J]. IEEE Circuits and Systems, 2001, 1(3): 6-21.

DOI: 10.1109/7384.963463

Google Scholar

[7] Bin Zhang, Chenhui Jin. Cryptanalysis of a AES-based Steam Cipher [C]. The 9th International Conference for Young Computer Scientists, 2008: 2782-2785.

DOI: 10.1109/icycs.2008.136

Google Scholar