Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32146
Study of Effect of Removal of Shiftrows and Mixcolumns Stages of AES and AES-KDS on their Encryption Quality and Hence Security

Authors: Krishnamurthy G N, V Ramaswamy


This paper demonstrates the results when either Shiftrows stage or Mixcolumns stage and when both the stages are omitted in the well known block cipher Advanced Encryption Standard(AES) and its modified version AES with Key Dependent S-box(AES-KDS), using avalanche criterion and other tests namely encryption quality, correlation coefficient, histogram analysis and key sensitivity tests.

Keywords: Encryption, Decryption, Avalanche, keysensitivity.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2302


[1] J. Daemen and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard", Springer-Verlag, 2002.
[2] B. Schneier, "Applied Cryptography - Protocols, algorithms, and source code in C", John Wiley & Sons, Inc., New York, second edition, 1996.
[3] William Stallings, "Cryptography and Network Security", Third Edition, Pearson Education, 2003
[4] Krishnamurthy G N, Dr. V Ramaswamy "Making AES Stronger: AES with Key Dependent S-Box", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 2008, pp 388-398.
[5] Harley R. Myler and Arthur R. Weeks, "The Pocket Handbook of Image Processing Algorithms in C", Prentice-Hall, New Jersey, 1993
[6] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, "Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images", Journal of Optical Engineering, vol. 45, 2006
[7] Krishnamurthy G N, Dr. V Ramaswamy "Encryption quality analysis and Security Evaluation of Blow-CAST-Fish using digital images", Communicated to International Journal of Computational Science 2008.
[8] Krishnamurthy G N, Dr. V Ramaswamy, "Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its modified version using digital images", communicated to IAENG International Journal of Computer Science, 2008.
[9] Krishnamurthy G N, Dr. V Ramaswamy "Performance Analysis of Blowfish and its modified version using Encryption quality, Key sensitivity, Histogram and Correlation coefficient analysis", communicated to International Journal Conference in Recent Trends in Computer Science, India 2009.
[10] Hossam El-din H. Ahmed, Hamdy M. Kalash. And Osama S. Farang Allah, "Encryption Effeciency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images", International Journal of Computer, Information, and System Science, and Engineering volume 1 number 1 2007 ISSN 1307-2331. pp 33-38.