IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 7, July 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Novel Recommendation To AES Limitation

[Full Text]

 

AUTHOR(S)

Falguni Patel, Mohammed Farik

 

KEYWORDS

AES, Random-X Cipher, Cryptanalysis Attack, Brute-Force Attack

 

ABSTRACT

Among all available conventional encryption algorithms, the AES (Advanced Encryption Standard) is the most secured and highly used algorithm. AES algorithm is widely used by variety of applications like Archive and Compression tools, File Encryption, Encryption File System, Disk / Partition Encryption, Networking, Signal Protocol, among others. This paper highlights the Brute Force attack and Cryptanalysis attack on AES Algorithm. This paper also discusses about a novel recommendation of a combination model of AES Algorithm and Random-X Cipher.

 

REFERENCES

[1] W. Stallings, Network Security Essentials: Applications and Standards, Fourth Edition ed., NJ: Pearson Education, Inc., publishing as, 2011, pp. 27-60.

[2] Microsoft, "Data Confidentiality," 2017. [Online]. Available: https://msdn.microsoft.com/en-us/library/ff650720.aspx. [Accessed 08 06 2017].

[3] M. Arora, "How Secure is AES against Brute Force Attacks - EE Times," 2012. [Online]. Available: http://www.eetimes.com/document.asp?doc_id=1279619. [Accessed 20 04 2017].

[4] Reddit, "Time and Energy required to brute-force a AES-256 encryption key," 2017. [Online]. Available: https://www.reddit.com/r/theydidthemath/comments/1x50xl/time_and_energy_required_to_bruteforce_a_aes256/. [Accessed 10 06 2017].
[5] F. Patel and M. Farik, "A New Substitution Cipher - Random-X," International Journal of Scientific and Technology Research (IJSTR), vol. 5, no. 10, pp. 125-128, 2016.