2019
DOI: 10.11591/ijeecs.v16.i2.pp897-905
|View full text |Cite
|
Sign up to set email alerts
|

File encryption based on reduced-round AES with revised round keys and key schedule

Abstract: The continuing advancement of technology had provided security issues in protecting the confidentiality of information. The need to protect unauthorized access of a third party is warranted.  In this paper, the reduced-round modified AES with revised round keys and key schedule is proposed to ensure file confidentiality.  The modifications to the AES cipher round was the reduction of the round iterations from 10 to 6, and additional key permutations were added in between states; while in the key schedule, addi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…AES is one of the most powerful encryption algorithms which is used to provide security over the Internet [23]. However, the AES has a limitation; that is, the huge calculations may reduce the algorithm speed [24].…”
Section: Introductionmentioning
confidence: 99%
“…AES is one of the most powerful encryption algorithms which is used to provide security over the Internet [23]. However, the AES has a limitation; that is, the huge calculations may reduce the algorithm speed [24].…”
Section: Introductionmentioning
confidence: 99%
“…There are several symmetric block cipher algorithms, TDES, RC2, AES, Twofish, Serpent. These algorithms work in Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  Data security using random dynamic salting and AES based on master-slave keys for … (Hussam J. Ali) 1021 different operating modes in encrypting each block, the most famous of which are: Cipher block chaining (CBC), electronic code book (ECB), and cipher feedback (CFB) In this research will adopt the CBC operating mode with AES because it has a high-performance speed compared to with CFB [8], each block is also uniquely encrypted [16], on the other hand, it is safer than ECB [17].…”
Section: Symmetric Block Ciphersmentioning
confidence: 99%
“…This emphasizes the importance of a flexible approach to file encryption, addressing diverse data formats encountered in modern workflows. Several scholarly investigations have been published, each reaching the consensus that the encryption of files [17], involving the application of a customized encryption algorithm to ensure the security of files [18], or the incorporation of an electronic document management system, designed to facilitate the efficient administration of documents within an organizational framework, both contribute to guaranteeing the preservation of data integrity and confidentiality.…”
Section: Introductionmentioning
confidence: 99%