Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation
There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method, for the most part, depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.
Daemon, J & Rijman, V. (2003). Computer Security Resource Center. Available from: http://www.csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf. [Last accessed on 2016 Aug 08].
Daemen, J & Rijmen, V. (2013). The Design of Rijndael: AES - The Advanced Encryption Standard. Brussel: Springer
Science and Business Media.
DI Management Services Pty Limited. (2003). DI Management. Available from: http://www.di-mgt.com.au/cryptopad.html. [Last accessed on 2016 Aug 08].
Jain, R. (2011). Washington University. Available from: http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_05aes.pdf. [Last accessed on 2016 Aug 08].
Kaufman, C., Perlman, R & Speciner, M. (2002). Network Security: Private Communication in a Public World. Upper Saddle River, NJ: Prentice Hall Press.
McGill. (2000). RIJNDAEL Advanced Encryption Standard. Available from: http://www.cs.mcgill.ca/~kaleigh/computers/crypto_rijndael.html. [Last accessed on 2017 Apr 24].
National Institute of Standards and Technology. (2001). Computer Security Resource Center. Available from: http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf. [Last accessed on 2016 Aug 08].
Shneier, B. (2009). Shneier on Security. Available from: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html. [Last accessed on 2016 Aug 08].
Trenholme, S. (n.d). Sam Trenholme. Available from: http://www.samiam.org/s-box.html. [Last accessed on 2016 Aug 08].
Trenholme, S. (n.d). Sam Trenholme. Available from: http://www.samiam.org/mix-column.html. [Last accessed on 2016 Aug 08].
Wagner, N.R. (2002). The University of Texas at San Antonio. Available from: http://www.cs.utsa.edu/~wagner/laws. [Last retrieved on 2016 Aug 08].
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to email@example.com.