Implementation of AES-128 Using Multiple Cipher Keys

  • Shivani SachdevaEmail author
  • Ajay Kakkar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)


The growth in communication technology has connected billions of people all over the globe. The frequent sharing of data among individuals, organizations and even countries has raised concerns over the security and privacy of the communication process. A successful solution to this problem is Encryption, which converts the data to an unintelligible form. The keys for encrypting and decrypting the data are known only to authorised users. Thus, encryption can efficiently secure the communication process. The technique presented here is a modified form of Advanced Encryption Standard (AES) with multiple cipher keys of length 128 bits. AES uses symmetric cryptography which means that same keys are used for encryption and decryption. AES is known to be resistant against any known cryptanalytic attacks. Although it is known to be secure, various improvements have been suggested previously to further enhance the security of AES. The proposed technique enhances the security by using three cipher keys. By increasing the no. of keys, the encryption and decryption times are increased. Trading off with the increase in encryption time, advantage is gained because the attempt to hack the data will require drastic efforts and thus security is increased.


Encryption Decryption Cipher Security Ciphertext AES 


  1. 1.
    PGP Corporation: An Introduction to Cryptography. Version 8.0, October 2002Google Scholar
  2. 2.
    Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, Heidelberg (2010). Scholar
  3. 3.
    Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. 2nd edn. McGraw Hill Publication (2013)Google Scholar
  4. 4.
    Daemen, J., Rijmen, V.: The Design of Rijndael Cipher. Springer, Heidelberg (2002). ISBN 978-3-662-04722-4CrossRefGoogle Scholar
  5. 5.
    Announcing the Advanced Encryption Standard (AES). FIPS 197, 26 November 2001Google Scholar
  6. 6.
    Tankard, C.: Encryption as the corner stone of big data security. J. Netw. Secur. 2017(3), 5–7 (2017)CrossRefGoogle Scholar
  7. 7.
    Garfinkel, S.L.: Public key cryptography. Computer 29(6), 101–104 (1996)CrossRefGoogle Scholar
  8. 8.
    Tomhave, B.L.: Key management: the key to encryption. EDPACS J. 38(4), 12–19 (2009)CrossRefGoogle Scholar
  9. 9.
    Parker, D.B.: Cryptographic threat analysis. J. Inf. Syst. Secur. 2(3), 13–17 (2008)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Yang, M., Bourbakis, N., Li, S.: Data-image-video encryption. IEEE Potentials 23(3), 28–34 (2004)CrossRefGoogle Scholar
  11. 11.
    Patil, P., Narayankar, P., Narayan, D.G., Meena, S.M.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy (ICISP2015), 11–12 December 2015, Nagpur, India, pp. 617–624 (2015)Google Scholar
  12. 12.
    Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies, ICICT-2005, Karachi, Pakistan, August 2005Google Scholar
  13. 13.
    Buchanan, W.J., Woodward, A., Helme, S.: Cryptography across industry sectors. J. Cyber Secur. Technol. 1, 1–18 (2017)CrossRefGoogle Scholar
  14. 14.
    Rachh, R.R., Ananda Mohan, P.V., Anami, B.S.: Efficient implementations for AES encryption and decryption. J. Circuits Syst. Signal Process. 31(5), 1765–1785 (2012)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Foundations of Software Engineering (FSE) (2010)CrossRefGoogle Scholar
  16. 16.
    Jingmei, L., Baodian, W., Xinmei, W.: One AES S-box to increase complexity and its cryptanalysis. J. Syst. Eng. Electron. 18(2), 427–433 (2007)CrossRefGoogle Scholar
  17. 17.
    Gong, J., Liu, W., Zhang, H.: Multiple lookup table-based AES encryption algorithm implementation. In: International Conference on Solid State Devices and Materials Science (2012). Phys. Procedia 25, 842–847 (2012)CrossRefGoogle Scholar
  18. 18.
    Dara, M., Manochehri, K.: Using RC4 and AES key schedule to generate dynamic S-Box in AES. Inf. Secur. J.: Glob. Perspect. 23(1–2), 1–9 (2014)Google Scholar
  19. 19.
    Kumar, P., Rana, S.B.: Development of modified AES algorithm for data security. Int. J. Light. Electron Opt. 127(4), 2341–2345 (2016)CrossRefGoogle Scholar
  20. 20.
    Wahaballa, A., Wahballa, O., Li, F., Ramadan, M., Qin, Z.: Multiple-layered securities using steganography and cryptography. Int. J. Comput. Appl. 36(3), 93–100 (2015)Google Scholar
  21. 21.
    Kakkar, A., Singh, M.L., Bansal, P.K.: Mathematical analysis and simulation of multiple keys and S-Boxes in a multimode network for secure transmission. Int. J. Comput. Math. 89(16), 2123–2142 (2012)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Kaur, L., Kakkar, A.: Data Security in Wireless Communication using Multiple Keys.

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Thapar Institute of Engineering and TechnologyPatialaIndia

Personalised recommendations