Publication | Closed Access
Review on Improvement of Advanced Encryption Standard (AES) Algorithm based on Time Execution, Differential Cryptanalysis and Level of Security
21
Citations
5
References
2018
Year
Multimedia DataEngineeringInformation SecurityCryptographic TechnologyBlock CipherSecurity AlgorithmHardware SecurityTime ExecutionInternet Of ThingsCryptanalytic AttackData Encryption StandardComputer EngineeringData PrivacyLightweight CryptographyComputer ScienceDifferential CryptanalysisData SecurityCryptographyEncryptionAdvanced Encryption StandardSymmetric Block CipherModified Aes AlgorithmsMultimedia Security
Multimedia data (text, audio, image, animation and video) have been widely used in the past few years for advanced digital content transmission. With the network technology focusing on Internet of Things (IoT) nowadays, the security of the multimedia content has raised researchers' concerns. The exchange of digital data over a network has exposed the multimedia data to various kinds of abuse such as Brute-Force attacks, unauthorized access, and network hacking. Therefore, the system must be safeguarded with an efficient media-aware security framework such as encryption methods that make use of standard symmetric encryption algorithms, which will be responsible for ensuring the security of the multimedia data. For the encryption of electronic data, one of the most prominent cryptographic algorithms is the Advanced Encryption Standard algorithm: A symmetric block cipher that was established by the U.S. National Institute of Standards and Technology (NIST). However, some of the challenges arising from the use of this algorithm are computational overhead, use of a fixed S-Box (which is a point of weakness) and pattern problems, which occur when handling more complex multimedia data such as text, image and video. Many researchers have carried out research aiming at improving the algorithm’s performance. This paper summarizes the modifications and benchmarks the performance results of the modified AES algorithms proposed by researchers in the previous studies.
| Year | Citations | |
|---|---|---|
Page 1
Page 1