SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 137
Security Enhancement in Next Generation Networks using Enhanced
AES with RC4 and Dynamic S-box
Ripal Patel1, Vikas kaul2
1 PG Student
Information Technology, Thakur College of Engineering and Technology
2 Assistant Professor
Information Technology, Thakur College of Engineering and Technology
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Encryptionisprimarymethodofprotecting
valuable electronic information transmitted over the
networks. SSL/TLS can help tosecuretransmitteddata
using various encryption algorithms. AES is one of
ciphering algorithm which is used for encryption,
decryptionofdatatoprovideconfidentialityforend-to-
end data transmission. To provideend-to–endsecurity
TLS/SSL (Transport layer security) is used.
This paper presents an enhancement of AES algorithm
by converting static S-box into dynamic using RC4 and
key scheduling thus making the system resistant to
linear and differential cryptanalysis by preventing
repetition of cipher key.
To increase the complexity of system AES is to be used
in round structure. In round structure, AES S-box
changes in every round.
Comparison of the traditional and enhanced AES will
be made on the basis of encryption Time, decryption
time, CPU usage and throughput. Here focus is to
achieve speed compatible with next generation LTE
network.
Key Words: LTE; AES; S-box; Round structure; RC4
1. INTRODUCTION
The mobile communication systems and the wireless
communicationtechnologieshavebeenimprovingvery
fast day by day. During last few decades, mobile
communication has been developed very rapidly. The
first generation (1G) wireless mobile communication
network which started at early 1980 was analog
system which was used for public voice service. The
second generation (2G) was launched early 1990s it
was based on digital technology and network
infrastructure. As compared to the firstgeneration, the
second generation supports text messaging. 2.5G
networks appearedinyear1999-2000andbroughtthe
internet into personal communication. 3G was
introduced in year 2000. It provides higher data rate
and broader bandwidth and also providesapplications
in wireless voice telephony, mobile, internet access,
fixed wireless internet access, video calls and mobile
TV.
After the release of previous generations of wireless
networks 4G network is considered for security
enhancement and reliable communication. The 4G
wireless networks operates entirely on the TCP/IP, so
it becomes completely IP based. It provides facility to
transfer large amount of data at higher speed from
anywhere and anytime. As large amount of data is
transmitted, security of these data is needed over the
networks.
1.1 Advanced Encryption Standard
AES is also called as Rijndael .It is developed by Joan
Daemen and Vincent Rijmen. It is a symmetric-key
algorithm. AES is a block cipher with a block length of
128 bits. It allows for three different key lengths: 128,
192, or 256 bits. Encryption consists of 10 rounds of
processing for 128-bit keys, 12 rounds for 192- bit
keys, and 14 rounds for 256-bit keys except for thelast
round in each case, all other rounds are identical. For
encryption, each round consists four steps:
Substitution bytes, Shift row, Mix column and Add
round key. For decryption, each round consists of the
four steps: Inverse shift rows, Inverse substitutebytes,
Inverse mix columns and Add round key.
1.1 AES S-box
The Rijndael S-box (substitution box) is a matrix
(square array of numbers) used in the Advanced
EncryptionStandard (AES) cryptographicalgorithm.It
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 138
serves as a lookup table. Substitution is a nonlinear
transformationwhichperformsconfusionofbits.S-box
is represented as a 16x16 array, rows and columns
indexed by hexadecimal bits. TheS-boxisgeneratedby
determining the multiplicative inverse for a given
number in GF (28).
1.2 RC4
RC4 is designed by Rivest for RSA Data Security. It is a
variable Key–size stream cipher with byte-oriented
operations. The algorithm is used for random
permutation.
RC4 is used for file encryption and also used for secure
communications, as in encryption oftraffictoandfrom
secure website using the SSL/TLS protocol.
2. LITERATURE REVIEW
The whole literature reviewisfocusedonthefollowing
literary works being done by an array of scholars and
researchers from the field of network and data
security. The following papers are selected for review
keeping in mind the traditional and conventional
approaches of ciphering algorithms.
Q. Cheng, C.Chuanhui andW. Li (2006) discussedsome
core technology of 4G mobile system and showed the
comparison between 3G and 4G on the basis of
network structure, core network mobile terminal and
core technology. The paper (2013) explains LTE/SAE
security algorithm and procedure and also summarise
the LTE/SAE 3GcryptographyalgorithmslikeKASUMI,
SNOW-3G, Milenge and ZUC. Razi Hosseinkhani and H.
Haj Seyyed Javadi (2012) introduced new algorithm to
generate dynamic S-box from original S-box using
cipher key. Inyear2012,JuliaJuremi,RamlanMahmod,
Salasiah Sulaiman made AES S-box key dependent
using S-box rotation property to make AES stronger.
Here, only the S-box is made key-dependent without
changing the value. Krishnamurthy G N and V
Ramaswamy (2008) improved the security of AES by
making S-box key dependent without changing its
value and without changing the inverse S-box. The
algorithm ensures that no trapdoor was present in the
cipher and expands the keys space to slow down
attacks. S Shivkumar, Dr.G.Umamaheswai (2011) used
RC4 stream cipher and key expansion procedure to
generate S-boxes and S-box is rotated for each round
based on the value calculated from the round key. In
the paper (2012), Mona Dara and Kooroush
Manochehri generated key dependent flexible S-box.
The Dynamic S-box is generated using RC4 and key
scheduling algorithm. In the paper (2013) Vikas kaul,
Prerna choudhari and S.K Narayankhedkar improved
AES by converting static S-box into dynamic using
cipher key. AES is used in round Structure to increase
complexity ofsystem.Comparisonswasmadebetween
AES and enhanced system basis on performance
evaluation based on runtime and throughput.
3. PROPOSED SYSTEM
To enhance the secure data transmission in next
generation network and make system resistant to
attacks, AES cipher algorithm is used in proposed
system. The work focuses on enhancement of
encryption algorithm. Encryption of transmitted data.
To improve strength of cryptography system AES is
enhanced by making static S-box into dynamic using
RC4 and AES key scheduling. Round structure will be
used to increase complexity of system. RSA and SHA-
256 is used for key exchange and message
authentication respectively.
1. End-to-End security is provided in SSL/TLS using
AES for next generation networks.
2. Integrity of data can be provided using SHA-256
algorithm.
3. RSA is to be used for key exchange mechanism.
4. AES is further enhanced using making static S-box
dynamic using RC4 and AES key scheduling algorithm
to make more secure S-box by preventing repetition
of cipher key.
5. System can be made more complex by using AES
round structure.
6. Performance evaluation of system is to be done by
measuring encryption and decryption time and
throughput.
Fig -1: Proposed System
4. DESIGN METHODOLOGY
1. Input data and key length for enhanced AES is taken
256 bits.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 139
2. Encryption and decryption of proposed system is
same as original AES algorithm.
3. In proposed system S-box is made dynamic by using
RC4 and key expansion procedure.
Fig -2: AES Dynamic S-box
4. The key Expansion transformation takes key and
generates expanded key and output of the key pseudo
expansion algorithm i.e. expanded key is used to
generate S-box by RC4 key Schedule algorithm to
prevent the repetitions.
5. RC4 cipher generate different 256 values each time
depending upon input key.
6. Static S-box is converted into dynamic before sub
byte transformation stage using RC4 cipher and key
expansion .Inverse S-box also modified accordingly.
7. For round structure 256 bits input data is divided
into two blocks of 128 bits.
8. First block is given as input to AES section of the
system and second block is given as input to AES
section of system in the next round as per round
structure.
9. Process is continued until all the fixed number of
round for AES are completed.
10. 256 bits block of encrypted data is constructed by
combining these output all together.
Fig -3: AES in Round structure
4. EXPERIMENTAL RESULTS
File: “plaintext.txt”, Size: 144 bytes (1552 bits), Key:
12345678901234561234567890123456
Table -1: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Sr.
No
Algorithm Block
size
No. of
Blocks Encryption
Time(Sec)
Decryption
Time(Sec)
Pentium i3 Pentium i3
1
AES 128 12 0.067 0.028 0.082 0.033
2 Enhanced
AES
128 12 0.0679 0.029 0.083 0.035
3 Round
Structure
(1R)
256 6 0.037 0.016 0.0455 0.017
4 Round
structure
with
Enhanced
AES(1R)
256 6 0.041 0.017 0.0481 0.019
5 Round
structure
with
Enhanced
AES(5R)
256 6
0.16142 0.066 0.19174 0.079
6 Round
structure
with
Enhanced
AES(5R)
256 6
0.16216 0.075 0.20169 0.087
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 140
7 Round
Structure
(10R)
256 6 0.314 0.137 0.3916 0.166
8
Round
structure
with
Enhanced
AES (10R)
256 6 0.330 0.134 0.3955 0.165
0
0.1
0.2
0.3
0.4
0.5
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Pentium i3
Time
Encryption Time Decryption Time
Fig -4: Graphical representation of runtime of AES
algorithm for text file
Table -2: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Fig -5: Graphical representation of throughput of AES
algorithm for text file
File: “smily.jpg”, Size: 2.35 KB (19328 bits), Key:
12345678901234561234567890123456
Table -3: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Sr.
No
Algorithm Block
size
No. of
Blocks
Encryption Time
(Sec)
Decryption
Time (Sec)
Pentium i3 Pentium i3
1
AES 128 151 0.66 0.27 0.80 0.32
2 Enhanced
AES
128 151 0.66 0.28 0.81 0.34
3 Round
Structure
(1R)
256 76 0.33 0.13 0.41 0.16
4 Round
structure
with
Enhanced
AES (1R)
256 76 0.34 0.14 0.42 0.18
5 Round
structure
with
Enhanced
AES (5R)
256 76 1.65 0.67 1.95 0.83
6 Round
structure
with
Enhanced
AES (5R)
256 76
1.67 0.70 2.10 0.914
7 Round
Structure
(10R)
256 76 3.22 1.37 3.96 1.753
8 Round
structure
with
Enhanced
AES (10R)
256 76 3.38 1.46 4.08 1.853
Sr.
No
Algorith
m
Block
size
No. of
Blocks
Throughput
(kbps)
Encryption Time
Throughput
(kbps)
Decryption Time
Pentium i3 Pentium i3
1 AES 128 12 22.94 53.75 18.77 45.78
2 Enhanced
AES
128 12 22.82 52.59 18.62 43.84
3 Round
Structure
(1R)
256 6 41.240 92.93 34.079 114.0
4 Round
structure
with
Enhanced
AES (1R)
256 6 37.653 90.10 32.225 115.3
5 Round
structure
with
Enhanced
AES (5R)
256 6 9.6146 23.51 8.0942 19.60
6 Round
structure
with
Enhanced
AES (5R)
256 6 9.5707 20.59 7.69497 17.66
7 Round
Structure
(10R)
256 6 4.94 11.27 3.96 9.338
8 Round
structure
with
Enhanced
AES (10R)
256 6 4.69 11.57 3.92 9.371
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 141
0
1
2
3
4
5
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Pentium i3
Time
Encryption time decryption time
Fig -6: Graphical representation of runtime of AES
algorithm for image file
Table -4: Comparative analysis is done based throughput using
text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB
RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM
Sr.
No
Algorith
m
Block
size
No. of
Blocks
Throughput
(kbps)
Encryption Time
Throughput(kbps)
Decryption Time
Pentium i3 Pentium i3
1
AES 128 151 29.27 69.09 23.91 58.79
2 Enhanced
AES
128 151 28.96 67.91 23.82 56.02
3 Round
Structure
(1R)
256 76 58.51 137 46.10 114.8
4 Round
structure
with
Enhanced
AES (1R)
256 76 56.61 132.8 45.96 107
5 Round
Structure
(5R)
256 76 9.614 23.51 9.87 23.28
6 Round
structure
with
Enhanced
AES (5R)
256 76 9.57 20.59 9.18 21.14
5 Round
Structure
(10R)
256 76 4.94 11.27 6.00 14.05
6 Round
structure
with
Enhanced
AES(10R)
256 76 4.69 11.57 5.70 13.16
Fig -7: Graphical representation of throughput of AES
algorithm for image file
5. CONCLUSIONS
As large amountofdatatransmittedoverthenetworks,
end-to-end security of this data is important. Hence
SSL/TLS is used to provide secure data using AES
algorithm. Proposed work is based on enhancing AES
algorithm by converting static S-box into dynamic
using RC4 and key schedulingalgorithm.Complexityof
system is increased the by using an AES Round
structure. It provides better non linearity to the
original AES andbecauseofitsroundstructure,thereis
better diffusion. Aim behind increasing the complexity
is to provide bettersecurityandmakethesystemresist
to various kind of attacks.
Performance is evaluated based on conversion of Text
file and Image file and result calculation is done basis
of Encryption time decryption time, throughput.
REFERENCES
[1] Cheng, C.Chuanhui and W. Li, “A Study of Some Key
Technologies of 4G System”, IEEE conference on Industrial
Electronics and Applications and Technologies, pp. 2292-
2295, June 2008.
[2] A. Bikos, N. Sklavos, “LTE/SAE Security Issues on 4G
Wireless Networks”, IEEE Security & Privacy, vol. 11, no.2,
pp. 55-62, April 2013.
[3] N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, “Security
Advances and Challenges in 4G Wireless Networks,”
International Conference on Privacy, Security and
Trust(PST) IEEE, pp.62-71, Aug 2010.
[4] The Verizon Wireless 4G LTE Network: Transforming
Business with Next-Generation Technology, Verizon
Wireless, Http://business.verizonwireless.com.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 142
[5] Razi Hosseinkhani and H. Haj Seyyed Javadi, “Using
Cipher Key to Generate Dynamic S-Box in AES Cipher
System,” International Journal of Computer Science and
Security (IJCSS), vol. 6, no.1, pp.19-21, 2012.
[6] J. Juremi, R. Mahmod, S. Sulaiman, “A Proposal for
Improving AES S-box with Rotation and Key-dependent,”
Cyber Warfare and Digital Forensic (CyberSec)international
conference, 2012.
[7] Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, “Key-
Dependent S-Box Generation in AES Block Cipher System,”
INFORMATICA, vol. 20, no. 1, pp. 23–34, 2009.
[8] Krishnamurthy G N, V Ramaswamy,” Making AES
Stronger: AES with Key Dependent S-Box,” IJCSNS
International Journal of Computer Science and Network
Security, vol.8, no.9, pp. 388-398, Sept 2008.
[9] I.Abd-ElGhafar, A. Rohiem, A. Diaa, and F.Mohammed, “
Generation of AES dependent S-boxes usingRC4algorithm,”
13th International Conference on Aerospace Sciences &
Aviation Technology (ASAT-13), Military Technical College,
Cairo, Egypt, May 26-28, 2009.
[10] Mahmoud, E.M., El Hafez, A.B., Elgarf, T.A., Zekry, A,”
Dynamic AES-128 with key-dependent S-box, International
Journal of Engineering Research and Applications, vol. 3,
Issue 1, pp.1662-1670, Jan -Feb 2013.
[11]S.Shivkumar, and G.Umamaheswari, “Performance
comparison of Advanced Ecryption Standard (AES) and AES
key dependent S-box simulation usingmatlab,”International
Conference on Process Automation, Control and
Computing (PACC), 2011, pp. 1–6.
[12] M. Dara, K. Manochehri, “Using RC4andAESschedule to
generate Dynamic S-box in AES,” Information Security
Journal: A Global Perspective, vol. 23, pp.1-9, 2014.
[13] V. Kaul, P. Choudhari, S K Narayankhedkar, “Security
Enhancement for Data Transmission In 4G Networks,” IEEE
The Next Generation Information Technology Summit
(Confluence), Sept 2014, pp. 373-378.
[14]B.Forouzan,D.Mukhopadhyay ,”Cryptography and
Network Security,” 2nd edition, Pearson Education , 2010.

More Related Content

PDF
Y36146148
PDF
Go3611771182
PDF
Parc4 i parallel implementation of
PDF
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
PDF
Efficient two-stage cryptography scheme for secure distributed data storage i...
PDF
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
PDF
An Efficient VLSI Architecture for AES and It's FPGA Implementation
PDF
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
Y36146148
Go3611771182
Parc4 i parallel implementation of
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
Efficient two-stage cryptography scheme for secure distributed data storage i...
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...

What's hot (19)

PDF
IRJET- Storage Security in Cloud Computing
PPTX
Wpa2 psk security measure
PDF
Analysis of symmetric key cryptographic algorithms
PDF
State of the art realistic cryptographic
PDF
Design methodology for ip secured tunel based embedded platform for aaa server
PDF
A Secure Data Communication System Using Cryptography and Steganography
PDF
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
PPTX
Lightweight cryptography
PDF
Secure Data Storage on Cloud System for Privacy Preserving
PDF
Security Issues in Next Generation IP and Migration Networks
PPTX
Keymanagement of ipsec
PDF
IS Unit 8_IP Security and Email Security
PDF
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
PDF
Final report
PDF
Performance Analysis of Application for Security Enhancements using Cryptanal...
PDF
Look at ipv6 security advantages over ipv4
PPTX
Wpa vs Wpa2
IRJET- Storage Security in Cloud Computing
Wpa2 psk security measure
Analysis of symmetric key cryptographic algorithms
State of the art realistic cryptographic
Design methodology for ip secured tunel based embedded platform for aaa server
A Secure Data Communication System Using Cryptography and Steganography
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
Lightweight cryptography
Secure Data Storage on Cloud System for Privacy Preserving
Security Issues in Next Generation IP and Migration Networks
Keymanagement of ipsec
IS Unit 8_IP Security and Email Security
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Final report
Performance Analysis of Application for Security Enhancements using Cryptanal...
Look at ipv6 security advantages over ipv4
Wpa vs Wpa2
Ad

Viewers also liked (20)

PDF
IRJET-A Survey on provide security to wireless medical sensor data
PDF
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
PDF
IRJET-Pressure Vessel Accidents: Safety Approach
PDF
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
PDF
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
PDF
IRJET-Semantic Similarity Between Sentences
PPTX
Auto verkaufen
PPTX
Custom connectorsinmule
PPT
CONCEPTOS BASICOS DE TECNOLOGIA
PDF
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
PDF
IRJET-CFD Analysis of conceptual Aircraft body
PDF
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
PDF
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
PDF
IRJET- Missing Value Evaluation in SQL Queries: A Survey
PDF
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
PDF
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
PDF
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
PDF
IRJET- Simulation based design and analysis of combined effect of various ...
PDF
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
PDF
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Review on User Personalized Tag Based Image Search by Tag Relevance
IRJET-Pressure Vessel Accidents: Safety Approach
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
IRJET-Strength and Durability Properties of Self-Compacting Concrete With Mic...
IRJET-Semantic Similarity Between Sentences
Auto verkaufen
Custom connectorsinmule
CONCEPTOS BASICOS DE TECNOLOGIA
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Solar Power Generation with Capacitor Based Seven Level Inverter System
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET-Survival and Growth Rate of Clarias gariepinus Larvae Fed with Artemia ...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET-Design And Development Of Sugar Cane Sprout Cutter Machine By Human Pow...
IRJET-A Design Of Modified SSTBC Encoder to Noise Free Mimo Communication in ...
Ad

Similar to IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box (20)

PDF
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
PDF
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
PDF
Ijcnc050208
PDF
Tdp.a029a10
PDF
IRJET - A Review on Crypto-Algorithm using Different Hardware
PDF
Implementation of Cryptography Architecture with High Secure Core
PDF
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
PDF
Advanced Encryption Standard (AES)
PDF
Enhanced Advanced Encryption Standard (E-AES): using ESET
PDF
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
PDF
A hybrid modified lightweight algorithm for achieving data integrity and con...
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
PDF
Arm recognition encryption by using aes algorithm
PDF
Development and performance comparison of modified RSA algorithm with other c...
PDF
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
PPTX
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
PDF
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
DOCX
An encryption scheme using chaotic map and
PDF
IRJET- Data Transmission using RSA Algorithm
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
High throughput FPGA Implementation of Advanced Encryption Standard Algorithm
Ijcnc050208
Tdp.a029a10
IRJET - A Review on Crypto-Algorithm using Different Hardware
Implementation of Cryptography Architecture with High Secure Core
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Advanced Encryption Standard (AES)
Enhanced Advanced Encryption Standard (E-AES): using ESET
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
A hybrid modified lightweight algorithm for achieving data integrity and con...
Advanced Encryption Standard (AES) Implementaion using Java
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Arm recognition encryption by using aes algorithm
Development and performance comparison of modified RSA algorithm with other c...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IMPLEMENTATION OF DNA CRYPTOGRAPHY IN CLOUD COMPUTING AND.pptx
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
An encryption scheme using chaotic map and
IRJET- Data Transmission using RSA Algorithm

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
OOP with Java - Java Introduction (Basics)
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
PPTX
Geodesy 1.pptx...............................................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Digital Logic Computer Design lecture notes
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
OOP with Java - Java Introduction (Basics)
Embodied AI: Ushering in the Next Era of Intelligent Systems
UNIT 4 Total Quality Management .pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
additive manufacturing of ss316l using mig welding
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
bas. eng. economics group 4 presentation 1.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
Geodesy 1.pptx...............................................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Digital Logic Computer Design lecture notes
Automation-in-Manufacturing-Chapter-Introduction.pdf
Foundation to blockchain - A guide to Blockchain Tech
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf

IRJET-Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 137 Security Enhancement in Next Generation Networks using Enhanced AES with RC4 and Dynamic S-box Ripal Patel1, Vikas kaul2 1 PG Student Information Technology, Thakur College of Engineering and Technology 2 Assistant Professor Information Technology, Thakur College of Engineering and Technology ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Encryptionisprimarymethodofprotecting valuable electronic information transmitted over the networks. SSL/TLS can help tosecuretransmitteddata using various encryption algorithms. AES is one of ciphering algorithm which is used for encryption, decryptionofdatatoprovideconfidentialityforend-to- end data transmission. To provideend-to–endsecurity TLS/SSL (Transport layer security) is used. This paper presents an enhancement of AES algorithm by converting static S-box into dynamic using RC4 and key scheduling thus making the system resistant to linear and differential cryptanalysis by preventing repetition of cipher key. To increase the complexity of system AES is to be used in round structure. In round structure, AES S-box changes in every round. Comparison of the traditional and enhanced AES will be made on the basis of encryption Time, decryption time, CPU usage and throughput. Here focus is to achieve speed compatible with next generation LTE network. Key Words: LTE; AES; S-box; Round structure; RC4 1. INTRODUCTION The mobile communication systems and the wireless communicationtechnologieshavebeenimprovingvery fast day by day. During last few decades, mobile communication has been developed very rapidly. The first generation (1G) wireless mobile communication network which started at early 1980 was analog system which was used for public voice service. The second generation (2G) was launched early 1990s it was based on digital technology and network infrastructure. As compared to the firstgeneration, the second generation supports text messaging. 2.5G networks appearedinyear1999-2000andbroughtthe internet into personal communication. 3G was introduced in year 2000. It provides higher data rate and broader bandwidth and also providesapplications in wireless voice telephony, mobile, internet access, fixed wireless internet access, video calls and mobile TV. After the release of previous generations of wireless networks 4G network is considered for security enhancement and reliable communication. The 4G wireless networks operates entirely on the TCP/IP, so it becomes completely IP based. It provides facility to transfer large amount of data at higher speed from anywhere and anytime. As large amount of data is transmitted, security of these data is needed over the networks. 1.1 Advanced Encryption Standard AES is also called as Rijndael .It is developed by Joan Daemen and Vincent Rijmen. It is a symmetric-key algorithm. AES is a block cipher with a block length of 128 bits. It allows for three different key lengths: 128, 192, or 256 bits. Encryption consists of 10 rounds of processing for 128-bit keys, 12 rounds for 192- bit keys, and 14 rounds for 256-bit keys except for thelast round in each case, all other rounds are identical. For encryption, each round consists four steps: Substitution bytes, Shift row, Mix column and Add round key. For decryption, each round consists of the four steps: Inverse shift rows, Inverse substitutebytes, Inverse mix columns and Add round key. 1.1 AES S-box The Rijndael S-box (substitution box) is a matrix (square array of numbers) used in the Advanced EncryptionStandard (AES) cryptographicalgorithm.It
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 138 serves as a lookup table. Substitution is a nonlinear transformationwhichperformsconfusionofbits.S-box is represented as a 16x16 array, rows and columns indexed by hexadecimal bits. TheS-boxisgeneratedby determining the multiplicative inverse for a given number in GF (28). 1.2 RC4 RC4 is designed by Rivest for RSA Data Security. It is a variable Key–size stream cipher with byte-oriented operations. The algorithm is used for random permutation. RC4 is used for file encryption and also used for secure communications, as in encryption oftraffictoandfrom secure website using the SSL/TLS protocol. 2. LITERATURE REVIEW The whole literature reviewisfocusedonthefollowing literary works being done by an array of scholars and researchers from the field of network and data security. The following papers are selected for review keeping in mind the traditional and conventional approaches of ciphering algorithms. Q. Cheng, C.Chuanhui andW. Li (2006) discussedsome core technology of 4G mobile system and showed the comparison between 3G and 4G on the basis of network structure, core network mobile terminal and core technology. The paper (2013) explains LTE/SAE security algorithm and procedure and also summarise the LTE/SAE 3GcryptographyalgorithmslikeKASUMI, SNOW-3G, Milenge and ZUC. Razi Hosseinkhani and H. Haj Seyyed Javadi (2012) introduced new algorithm to generate dynamic S-box from original S-box using cipher key. Inyear2012,JuliaJuremi,RamlanMahmod, Salasiah Sulaiman made AES S-box key dependent using S-box rotation property to make AES stronger. Here, only the S-box is made key-dependent without changing the value. Krishnamurthy G N and V Ramaswamy (2008) improved the security of AES by making S-box key dependent without changing its value and without changing the inverse S-box. The algorithm ensures that no trapdoor was present in the cipher and expands the keys space to slow down attacks. S Shivkumar, Dr.G.Umamaheswai (2011) used RC4 stream cipher and key expansion procedure to generate S-boxes and S-box is rotated for each round based on the value calculated from the round key. In the paper (2012), Mona Dara and Kooroush Manochehri generated key dependent flexible S-box. The Dynamic S-box is generated using RC4 and key scheduling algorithm. In the paper (2013) Vikas kaul, Prerna choudhari and S.K Narayankhedkar improved AES by converting static S-box into dynamic using cipher key. AES is used in round Structure to increase complexity ofsystem.Comparisonswasmadebetween AES and enhanced system basis on performance evaluation based on runtime and throughput. 3. PROPOSED SYSTEM To enhance the secure data transmission in next generation network and make system resistant to attacks, AES cipher algorithm is used in proposed system. The work focuses on enhancement of encryption algorithm. Encryption of transmitted data. To improve strength of cryptography system AES is enhanced by making static S-box into dynamic using RC4 and AES key scheduling. Round structure will be used to increase complexity of system. RSA and SHA- 256 is used for key exchange and message authentication respectively. 1. End-to-End security is provided in SSL/TLS using AES for next generation networks. 2. Integrity of data can be provided using SHA-256 algorithm. 3. RSA is to be used for key exchange mechanism. 4. AES is further enhanced using making static S-box dynamic using RC4 and AES key scheduling algorithm to make more secure S-box by preventing repetition of cipher key. 5. System can be made more complex by using AES round structure. 6. Performance evaluation of system is to be done by measuring encryption and decryption time and throughput. Fig -1: Proposed System 4. DESIGN METHODOLOGY 1. Input data and key length for enhanced AES is taken 256 bits.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 139 2. Encryption and decryption of proposed system is same as original AES algorithm. 3. In proposed system S-box is made dynamic by using RC4 and key expansion procedure. Fig -2: AES Dynamic S-box 4. The key Expansion transformation takes key and generates expanded key and output of the key pseudo expansion algorithm i.e. expanded key is used to generate S-box by RC4 key Schedule algorithm to prevent the repetitions. 5. RC4 cipher generate different 256 values each time depending upon input key. 6. Static S-box is converted into dynamic before sub byte transformation stage using RC4 cipher and key expansion .Inverse S-box also modified accordingly. 7. For round structure 256 bits input data is divided into two blocks of 128 bits. 8. First block is given as input to AES section of the system and second block is given as input to AES section of system in the next round as per round structure. 9. Process is continued until all the fixed number of round for AES are completed. 10. 256 bits block of encrypted data is constructed by combining these output all together. Fig -3: AES in Round structure 4. EXPERIMENTAL RESULTS File: “plaintext.txt”, Size: 144 bytes (1552 bits), Key: 12345678901234561234567890123456 Table -1: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorithm Block size No. of Blocks Encryption Time(Sec) Decryption Time(Sec) Pentium i3 Pentium i3 1 AES 128 12 0.067 0.028 0.082 0.033 2 Enhanced AES 128 12 0.0679 0.029 0.083 0.035 3 Round Structure (1R) 256 6 0.037 0.016 0.0455 0.017 4 Round structure with Enhanced AES(1R) 256 6 0.041 0.017 0.0481 0.019 5 Round structure with Enhanced AES(5R) 256 6 0.16142 0.066 0.19174 0.079 6 Round structure with Enhanced AES(5R) 256 6 0.16216 0.075 0.20169 0.087
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 140 7 Round Structure (10R) 256 6 0.314 0.137 0.3916 0.166 8 Round structure with Enhanced AES (10R) 256 6 0.330 0.134 0.3955 0.165 0 0.1 0.2 0.3 0.4 0.5 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Pentium i3 Time Encryption Time Decryption Time Fig -4: Graphical representation of runtime of AES algorithm for text file Table -2: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Fig -5: Graphical representation of throughput of AES algorithm for text file File: “smily.jpg”, Size: 2.35 KB (19328 bits), Key: 12345678901234561234567890123456 Table -3: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorithm Block size No. of Blocks Encryption Time (Sec) Decryption Time (Sec) Pentium i3 Pentium i3 1 AES 128 151 0.66 0.27 0.80 0.32 2 Enhanced AES 128 151 0.66 0.28 0.81 0.34 3 Round Structure (1R) 256 76 0.33 0.13 0.41 0.16 4 Round structure with Enhanced AES (1R) 256 76 0.34 0.14 0.42 0.18 5 Round structure with Enhanced AES (5R) 256 76 1.65 0.67 1.95 0.83 6 Round structure with Enhanced AES (5R) 256 76 1.67 0.70 2.10 0.914 7 Round Structure (10R) 256 76 3.22 1.37 3.96 1.753 8 Round structure with Enhanced AES (10R) 256 76 3.38 1.46 4.08 1.853 Sr. No Algorith m Block size No. of Blocks Throughput (kbps) Encryption Time Throughput (kbps) Decryption Time Pentium i3 Pentium i3 1 AES 128 12 22.94 53.75 18.77 45.78 2 Enhanced AES 128 12 22.82 52.59 18.62 43.84 3 Round Structure (1R) 256 6 41.240 92.93 34.079 114.0 4 Round structure with Enhanced AES (1R) 256 6 37.653 90.10 32.225 115.3 5 Round structure with Enhanced AES (5R) 256 6 9.6146 23.51 8.0942 19.60 6 Round structure with Enhanced AES (5R) 256 6 9.5707 20.59 7.69497 17.66 7 Round Structure (10R) 256 6 4.94 11.27 3.96 9.338 8 Round structure with Enhanced AES (10R) 256 6 4.69 11.57 3.92 9.371
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 141 0 1 2 3 4 5 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Pentium i3 Time Encryption time decryption time Fig -6: Graphical representation of runtime of AES algorithm for image file Table -4: Comparative analysis is done based throughput using text file as input on 1) Microsoft Windows 10, Pentium, 32 bit, 4 GB RAM and 2) Microsoft windows 8 , Intel i3 ,64-bit,6 GB RAM Sr. No Algorith m Block size No. of Blocks Throughput (kbps) Encryption Time Throughput(kbps) Decryption Time Pentium i3 Pentium i3 1 AES 128 151 29.27 69.09 23.91 58.79 2 Enhanced AES 128 151 28.96 67.91 23.82 56.02 3 Round Structure (1R) 256 76 58.51 137 46.10 114.8 4 Round structure with Enhanced AES (1R) 256 76 56.61 132.8 45.96 107 5 Round Structure (5R) 256 76 9.614 23.51 9.87 23.28 6 Round structure with Enhanced AES (5R) 256 76 9.57 20.59 9.18 21.14 5 Round Structure (10R) 256 76 4.94 11.27 6.00 14.05 6 Round structure with Enhanced AES(10R) 256 76 4.69 11.57 5.70 13.16 Fig -7: Graphical representation of throughput of AES algorithm for image file 5. CONCLUSIONS As large amountofdatatransmittedoverthenetworks, end-to-end security of this data is important. Hence SSL/TLS is used to provide secure data using AES algorithm. Proposed work is based on enhancing AES algorithm by converting static S-box into dynamic using RC4 and key schedulingalgorithm.Complexityof system is increased the by using an AES Round structure. It provides better non linearity to the original AES andbecauseofitsroundstructure,thereis better diffusion. Aim behind increasing the complexity is to provide bettersecurityandmakethesystemresist to various kind of attacks. Performance is evaluated based on conversion of Text file and Image file and result calculation is done basis of Encryption time decryption time, throughput. REFERENCES [1] Cheng, C.Chuanhui and W. Li, “A Study of Some Key Technologies of 4G System”, IEEE conference on Industrial Electronics and Applications and Technologies, pp. 2292- 2295, June 2008. [2] A. Bikos, N. Sklavos, “LTE/SAE Security Issues on 4G Wireless Networks”, IEEE Security & Privacy, vol. 11, no.2, pp. 55-62, April 2013. [3] N. Seddigh, B. Nandy, R. Makkar, J.F. Beaumont, “Security Advances and Challenges in 4G Wireless Networks,” International Conference on Privacy, Security and Trust(PST) IEEE, pp.62-71, Aug 2010. [4] The Verizon Wireless 4G LTE Network: Transforming Business with Next-Generation Technology, Verizon Wireless, Http://business.verizonwireless.com.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 142 [5] Razi Hosseinkhani and H. Haj Seyyed Javadi, “Using Cipher Key to Generate Dynamic S-Box in AES Cipher System,” International Journal of Computer Science and Security (IJCSS), vol. 6, no.1, pp.19-21, 2012. [6] J. Juremi, R. Mahmod, S. Sulaiman, “A Proposal for Improving AES S-box with Rotation and Key-dependent,” Cyber Warfare and Digital Forensic (CyberSec)international conference, 2012. [7] Kazys KAZLAUSKAS, Jaunius KAZLAUSKAS, “Key- Dependent S-Box Generation in AES Block Cipher System,” INFORMATICA, vol. 20, no. 1, pp. 23–34, 2009. [8] Krishnamurthy G N, V Ramaswamy,” Making AES Stronger: AES with Key Dependent S-Box,” IJCSNS International Journal of Computer Science and Network Security, vol.8, no.9, pp. 388-398, Sept 2008. [9] I.Abd-ElGhafar, A. Rohiem, A. Diaa, and F.Mohammed, “ Generation of AES dependent S-boxes usingRC4algorithm,” 13th International Conference on Aerospace Sciences & Aviation Technology (ASAT-13), Military Technical College, Cairo, Egypt, May 26-28, 2009. [10] Mahmoud, E.M., El Hafez, A.B., Elgarf, T.A., Zekry, A,” Dynamic AES-128 with key-dependent S-box, International Journal of Engineering Research and Applications, vol. 3, Issue 1, pp.1662-1670, Jan -Feb 2013. [11]S.Shivkumar, and G.Umamaheswari, “Performance comparison of Advanced Ecryption Standard (AES) and AES key dependent S-box simulation usingmatlab,”International Conference on Process Automation, Control and Computing (PACC), 2011, pp. 1–6. [12] M. Dara, K. Manochehri, “Using RC4andAESschedule to generate Dynamic S-box in AES,” Information Security Journal: A Global Perspective, vol. 23, pp.1-9, 2014. [13] V. Kaul, P. Choudhari, S K Narayankhedkar, “Security Enhancement for Data Transmission In 4G Networks,” IEEE The Next Generation Information Technology Summit (Confluence), Sept 2014, pp. 373-378. [14]B.Forouzan,D.Mukhopadhyay ,”Cryptography and Network Security,” 2nd edition, Pearson Education , 2010.