Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation

Authors

  • Renas R. Asaad Department of Computer science, College of Computer and IT, Nawroz University, Duhok, Kurdistan Region - Iraq http://orcid.org/0000-0002-1762-662X
  • Saman M. Abdulrahman Department of Computer science, College of Computer and IT, Nawroz University, Duhok, Kurdistan Region - Iraq
  • Ahmed A. Hani Department of Computer science, College of Computer and IT, Nawroz University, Duhok, Kurdistan Region - Iraq

DOI:

https://doi.org/10.25007/ajnu.v6n3a70

Keywords:

Advanced Encryption Standard, Output Feedback Block, Block Cipher Mode Operation, Cryptography

Abstract

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method, for the most part, depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.

Downloads

Download data is not yet available.

References

Dar, M.H., Mittal, P & Kumar, V. (2014). A comparative study of cryptographic algorithms. International Journal of Computer Science and Network, 3(3), 1190.

Daemon, J & Rijman, V. (2003). Computer Security Resource Center. Available from: http://www.csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf. [Last accessed on 2016 Aug 08].

Daemen, J & Rijmen, V. (2013). The Design of Rijndael: AES - The Advanced Encryption Standard. Brussel: Springer
Science and Business Media.

DI Management Services Pty Limited. (2003). DI Management. Available from: http://www.di-mgt.com.au/cryptopad.html. [Last accessed on 2016 Aug 08].

Jain, R. (2011). Washington University. Available from: http://www.cse.wustl.edu/~jain/cse571-11/ftp/l_05aes.pdf. [Last accessed on 2016 Aug 08].

Kaufman, C., Perlman, R & Speciner, M. (2002). Network Security: Private Communication in a Public World. Upper Saddle River, NJ: Prentice Hall Press.

McGill. (2000). RIJNDAEL Advanced Encryption Standard. Available from: http://www.cs.mcgill.ca/~kaleigh/computers/crypto_rijndael.html. [Last accessed on 2017 Apr 24].

National Institute of Standards and Technology. (2001). Computer Security Resource Center. Available from: http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdf. [Last accessed on 2016 Aug 08].

Shneier, B. (2009). Shneier on Security. Available from: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html. [Last accessed on 2016 Aug 08].

Trenholme, S. (n.d). Sam Trenholme. Available from: http://www.samiam.org/s-box.html. [Last accessed on 2016 Aug 08].

Trenholme, S. (n.d). Sam Trenholme. Available from: http://www.samiam.org/mix-column.html. [Last accessed on 2016 Aug 08].

Wagner, N.R. (2002). The University of Texas at San Antonio. Available from: http://www.cs.utsa.edu/~wagner/laws. [Last retrieved on 2016 Aug 08].

Published

2017-07-18

How to Cite

Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10. https://doi.org/10.25007/ajnu.v6n3a70

Issue

Section

Articles