Improvement of Data Security Using Mixcolumn

Advanced Encryption Standard is the security based algorithm used to protect the data from the attackers.In this paper, Optimized Inverse MixColumn transformation has been designed with the help of Xtime multiplication process. Xtime multiplication performs the multiplication function for 'm X...

Full description

Saved in:
Bibliographic Details
Main Authors: Ramesh, Singh Poja (Author), Singh, Santhosh Kumar (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2018-02-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01806 am a22003013u 4500
001 ijeecs10276_7976
042 |a dc 
100 1 0 |a Ramesh, Singh Poja  |e author 
100 1 0 |e contributor 
700 1 0 |a Singh, Santhosh Kumar  |e author 
245 0 0 |a Improvement of Data Security Using Mixcolumn 
260 |b Institute of Advanced Engineering and Science,   |c 2018-02-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10276 
520 |a Advanced Encryption Standard is the security based algorithm used to protect the data from the attackers.In this paper, Optimized Inverse MixColumn transformation has been designed with the help of Xtime multiplication process. Xtime multiplication performs the multiplication function for 'm X m' data; results will be m-bit data. Further the complexity of Xtime multiplication process has been identified and re-designed with the help of effective CSE techniques. Developed Reduced Xtime based optimized Inverse MixColumn transformation provide better performances than traditional Xtime based Inverse MixColumn multiplication. 
540 |a Copyright (c) 2017 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690
690 |a AES, Mixcolumn, Xtime 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 9, No 2: February 2018; 361-364 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v9.i2 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10276/7976 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/10276/7976  |z Get fulltext