encryption and decryption of unified payment interface using generation of multiple random s-box with aes algorithm

D.Pamila,M.Mahalakshmi,B.Praisy,M. NAVANEETHAKRISHNAN,M.E.,Ph.D.,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 30 March,2021         Pages:1459-1463

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Cryptography is the use of codes and ciphers to protect secrets. AES is used to provide more security also used to prevent attacks. Security is a major problem in recent year. Several researchers for doing their research in information security domain to improve their security through their information sharing. Modern cryptography is achieved by algorithms that have key to encrypt and decrypt information. This keys convert messages and data into digital gibberish through encryption. In general longer key is, more difficult to Crack the code. In this paper we use AES algorithm to encrypt financial related data as AES uses higher length key sizes.

Kewords

AES 256 bit key, cipher key, MR S – Box multiple random s – box

Reference

[1] K. Tiri et al., “Prototype IC with WDDL and differential routing-DPA resistance assessment,” in Cryptographic Hardware and Embedded systems. Berlin, Germany: Springer- Verlag, 2005, pp. 354-365. [2] A. Moradi, A. Poschmann, S. Ling, C. Paar, and H. Wang, “Pushing the limits: A very compact and a threshold implementation of AES,”in Advances in Cryptology. Berlin, Germany: Springer- Verlag, 2011, pp, 69-88. [3] F. -X. Standard, O. Pereira, Y. Yu, J,- J. Quisquater, M. Yung, and E. Oswald, “Leakage resilient cryptography in practice,” in Towards Hardware - Intrinsic Security. Berlin, Germany: Springer-Verlag, 2010, pp, 99-134. [4] Y. Dodis and K. Pietrzak, “Leakage resilient pseudorandom functions and side-channel attacks on Feistel networks,” in Proc. 30th CRYPTO, 2010, pp, 21-40. [5] S. Faust, K. Pietrzak, and J. Schipper, “Practical leakage-resilient symmetric Cryptographic Hardware and Embedded Systems. Berlin, Germany: Springer- Verlag, 2012, pp, 213-232.