Augmenting AES to quantum safe level with no-sum sequence

Bharat S. Rawal, Raman Singh, Songjie Liang, Alex Peter, Anjan Biswas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

29 Downloads (Pure)

Abstract

Quantum computing is a potential method for addressing complicated issues, such as encryption. Quantum computers' speed poses a challenge to traditional cryptography. The No-Sum sequence-based cryptosystem is a novel quantum-resistant private-key cryptosystem that is suggested. This approach raises the computing resources required to defend against quantum computer-assisted brute-force attacks. The Advanced Encryption Standard (AES) algorithm is used widely in symmetric cryptography. In this article, we discuss various flavors of No-Sum (NS) sequences, these sequences increase the computational resource requirement against the quantum computer-assisted brute-force attack. The proposed process is divided into two phases: the first phase involves the traditional confidential 256-bit key, which we will refer to as the principal key. This primary key will be used for generating three diverse types of NS sequences to serve as a secondary key. By combining these primary and secondary keys, a composite new secret key will be formed and utilized in the first round AES protocol. In phase two regular AES procedures are performed with a composite key. The proposed modified AES cryptosystem illustrates the ability of the NS sequence in the field of a quantum-resistant cryptosystem.
Original languageEnglish
Title of host publication2024 Second International Conference on Microwave, Antenna and Communication (MAC)
PublisherIEEE
ISBN (Electronic)9798350350104
ISBN (Print)9798350350111
DOIs
Publication statusPublished - 16 Jan 2025

Keywords

  • communication
  • 5G and 6G
  • AES
  • cryptography
  • no-sum sequence
  • special sequences
  • post quantum cryptography

Fingerprint

Dive into the research topics of 'Augmenting AES to quantum safe level with no-sum sequence'. Together they form a unique fingerprint.

Cite this