Pages

This tutorial covers the basics of the science of cryptography. It explains how programmers and network professionals can use cryptography to maintain the privacy of computer data. Starting with the origins of cryptography, it moves on to explain cryptosystems, various traditional and modern ciphers, public key encryption, data integration, message authentication, and digital signatures.

Wednesday 30 October 2019

[E-journal Cryptography] Extended AES Algorithm with Custom Encryption for government-level Classified Messages

Extended AES Algorithm with Custom Encryption for government-level Classified Messages
Sreyam Dasgupta, Pritish Das


Abstract: The paper is primarily concerned with the data security issues faced while sending the data over the network. The issues are can be avoided with the proposed algorithm: Extended AES Algorithm with Custom Configurable Encryption. The added layer of security is based on the Caesar Cipher encryption algorithm. Although the algorithm is highly vulnerable to a few attacks, our modifications in the algorithm are tailor-made to deny those attacks completely. The user has no
idea that Caesar's cipher is being used. Moreover, the key is changed for every word in the message, thus removing the vulnerability to the frequency analysis attack. This layer will give some added protection to the underlying AES algorithm, which is already very secure. In today’s electronic age, the importance of digital cryptography in securing electronic data transactions is unquestionable. Every day, users electronically generate and communicate a large volume of information with others. This information includes medical, financial and legal files; automatic and Internet banking; phone conversations, pay-per-view television, and other e-commerce transactions as well as military information and some top-secret government intel. To meet these requirements, Advanced Encryption
Standard (AES) for encryption of electronic data can be used. Governments prefer using AES for encryption of classified messages. Although no major attack on AES has been discovered yet, it is presumed that AES might have been broken without the attack being known to us. Thus, an added layer is used to make it safer.
Index Terms: AES, Cyber Security, Caesar Cipher



0 comments:

Post a Comment