M. Indrasena Reddy,A.P Siva Kumar,




Modified Advanced Encryption Standard Algorithm,Flower Pollination Algorithm,Security,Encryption,Decryption,Key,


In the internet along with other network applications, the requirement for security is increasing each day due to its wide usage. There are loads of algorithms which were established for the safe transmission of data. This paper offers a fresh approach for the generation of the key using the ‘Advanced Encryption Standard' (AES) algorithm along with the Flower Pollination Algorithm (FPA). This combination is termed as Modified AES (MAES). Initially, a plain text of 128 bits is the input to this algorithm. This text is transmuted to a cipher text. The key generation is important for the generation of the ‘S-Box’ (substitution box). The key generation on the proposed work is done utilizing the FPA. This step is done to make the keys in such a manner that the complexities of the S-Box enhance. This ameliorates the security of the proposed work for data transmission on a network. Then encryption is done. This is followed by decryption. Finally, the 128bit plain text is retrieved at the receiver's side. The MAES algorithm was compared with other traditional cryptographic algorithms. The proposed MAES algorithm yielded exceptional results.


I. A.A.Yavuz, F.Alagöz, E.Anarim. “A new multi-tier adaptive military
MANET security protocol using hybrid cryptography and
signcryption.” Turkish Journal of Electrical Engineering & Computer
Sciences, Vol.:18, Issue: 1, pp. 1-22, 2010.
II. A.Kushwaha, H.R.Sharma, A.Ambhaikar. “Selective Encryption Using
Natural Language Processing for Text Data in Mobile Ad Hoc Network.”
In Modeling, Simulation, and Optimization, pp. 15-26, 2018
III. B.Bala, L.Kamboj, P.Luthra. “Secure File Storage in Cloud Computing using
Hybrid Cryptography, International Journal of Advanced Research in
Computer Science, Vol.:9, Issue: 2, pp. 773-776, 2018.
IV. B.Pradhan, S.Sengupta. “Chaotic-cipher based memory efficient symmetric
key cryptosystem.” In 2018 Emerging Trends in Electronic Devices and
Computational Techniques, 2018.
V. Ç.Ünal, S.Kaçar, A.Zengin, I.Pehlivan. “A novel hybrid encryption algorithm
based on chaos and S-AES algorithm.” Nonlinear Dynamics, Vol.:92, Issue:
4, pp. 1745-1759, 2018.

VI. D.Parashar, S.Roy, N.Dey, V.Jain, U.S.Rawat. “Symmetric Key Encryption
Technique: A Cellular Automata Based Approach.” In Proceedings of
CSI Cyber Security, pp. 59-67, 2018.
VII. E.B.Kavun, H.Mihajloska, T.Yalçin. “A Survey on Authenticated
Encryption–ASIC Designer’s Perspective.” ACM Computing Surveys ,
Vol.:50, Issue: 6, pp. 1-21, 2017.
VIII. G.J.Krishna, R.Vadlamani, S.N.Bhattu, “Key Generation for Plain Text in
Stream Cipher via Bi-Objective Evolutionary Computing.” Applied Soft
Computing, 2018.
IX. G.Kalpana, P.V.Kumar, S.Aljawarneh, R.V.Krishnaiah. “Shifted Adaption
Homomorphism Encryption for Mobile and Cloud Learning.” Computers &
Electrical Engineering , Vol.: 65, pp.178-195, 2018.
X. J.Liu, C.Fan, X.Tian, Q.Ding. “Optimization of AES and RSA Algorithm
and Its Mixed Encryption System.” In International Conference on Intelligent
Information Hiding and Multimedia Signal Processing, pp. 393-403, 2017.
XI. K.V.N.Rao, Padmanabhuni, K.Budda, K.Sruthi. “Authentication and
Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm
Optimization and Cuckoo Search Algorithm.” Journal of The Institution of
Engineers (India): Series B, pp.1-9, 2018.
XII. M.E.Hameed, M.M.Ibrahim, N.AbdManap. “Review on Improvement of
Advanced Encryption Standard (AES) Algorithm based on Time Execution,
Differential Cryptanalysis and Level of Security.” Journal of
Telecommunication, Electronic and Computer Engineering , Vol.: 10, Issue:
1, pp.139-145, 2018.
XIII. M.Elhoseny, G.R.González, O.M.A.Elnasr, S.A.Shawkat, N.Arunkumar,
A.Farouk. “Secure medical data transmission model for IoT-based healthcare
systems.” IEEE Access , Vol.: 6, pp. 20596-20608, 2018.
XIV. M.Sookhak, A.Gani, M.K.Khan, R.Buyya. “Dynamic remote data auditing
for securing big data storage in cloud computing.” Information Sciences ,
Vol.:380 , pp.101-116, 2017.
XV. M.U.Bokhari, Q.M.Shallal, Y.K.Tamandani. “Reducing the Required Time
and Power for Data Encryption and Decryption Using K-NN Machine
Learning.” IETE Journal of Research , pp.1-9, 2018.
XVI. P.Dixit, A.K.Gupta, M.C.Trivedi, V.K.Yadav, “Traditional and Hybrid
Encryption Techniques: A Survey.” In Networking Communication and Data
Knowledge Engineering, pp. 239-248, 2018.
XVII. P.Li, K.T.Lo. “A Content-Adaptive Joint Image Compression and Encryption
Scheme.” IEEE Transactions on Multimedia , Vol.:20, Issue: 8, pp. 1960-
1972, 2018.

XVIII. R.D.Gill, N.Kapur, H.S.Gill. “Increase Security of Data With Respect to Both
Confidentiality and Integrity over Cloud.” International Journal of Applied
Engineering Research, Vol.:13, Issue: 10, pp. 7388-7391, 2018.
XIX. T.Hanqi, Q.T.Sun, X.Yang, K.Long. “A Network Coding and DES Based
Dynamic Encryption Scheme for Moving Target Defense.” IEEE Access ,
Vol.:6, pp.26059-26068, 2018.
XX. Ü.Çavuşoğlu, A.Zengin, I.Pehlivan, S.Kaçar. “A novel approach for strong SBox
generation algorithm design based on chaotic scaled Zhongtang
system.” Nonlinear Dynamics , Vol.:87, Issue: 2, pp.1081-1094, 2017.
XXI. V.Lozupone. “Analyze encryption and public key infrastructure
(PKI).” International Journal of Information Management , Vol.:38, Issue: 1,
pp.42-44, 2018.
XXII. Y.Ye, N.Wu, X.Zhang, L.Dong, F.Zhou. “An Optimized Design for Compact
Masked AES S-Box Based on Composite Field and Common Subexpression
Elimination Algorithm.” Journal of Circuits, Systems and Computers ,
Vol.:27, Issue: 11, pp.1-11, 2018.

View | Download