Share This Article:

Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm

Abstract Full-Text HTML XML Download Download as PDF (Size:2882KB) PP. 82-91
DOI: 10.4236/jis.2015.62009    3,891 Downloads   4,556 Views   Citations


With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a new emerging trend of modern symmetric encryption algorithm by development of the advanced encryption standard (AES) algorithm. The new development focuses on the integration between Quantum Key Distribution (QKD) and an enhanced version of AES. A new quantum symmetric encryption algorithm, which is abbreviated as Quantum-AES (QAES), is the output of such integration. QAES depends on generation of dynamic quantum S-Boxes (DQS-Boxes) based quantum cipher key, instead of the ordinary used static S-Boxes. Furthermore, QAES exploits the specific selected secret key generated from the QKD cipher using two different modes (online and off-line).

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Jasim, O. , Abbas, S. , Horbaty, E. and Salem, A. (2015) Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. Journal of Information Security, 6, 82-91. doi: 10.4236/jis.2015.62009.


[1] Rose, H. and Hag, J. (2012) Using a Cipher Key to Generate Dynamic S-Box in AES Cipher System. International Journal of Computer Science and Security, 6, 19-28.
[2] Sekar, A., Radhika, S. and Anand, K. (2012) Secure Communication Using 512 Bit Key. European Journal of Scientific Research, 52, 61-65.
[3] Kinga, R., Aline, A. and Christian, E. (2012) Generation and Testing of Random Numbers for Cryptographic Application. Proceeding of Romanian Academy, 13, 368-377.
[4] Daemen, J. and Rijmen, V. (2002) The Design of Rijndael: AES—The Advanced Encryption Standard of Information Security and Cryptography. Vol. 22, Springer Verlag, Berlin, 231-240.
[5] Warren, D. and Smith, W. (2014) AES Seems Weak, Linear Time Secure Cryptography. International Association for Cryptologic Research, 1-24.
[6] Stallings, W. (2012) Cryptography and Network Security Principles and Practice. 5th Edition, Prentice Hall, Upper Saddle River, 330-337.
[7] Alex, B. and Johann, G. (2012) Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware, Journal Fundamental Informatics—Cryptology in Progress. 10th Central European Conference on Cryptology, 10-12 June 2010, Vol. 114, 221-237.
[8] Matthew, G. (2013) Statistical Tests of Randomness on QKD through a Free-Space Channel Coupled to Daylight Noise. Journal of Light Wave Technology, 3, 34-35.
[9] Hadi, S., Alireza, S., Behnam, B. and Mohammadraze, A. (2013) Cryptanalysis of 7-Round AES-128. International Journal of Computer Application, 10, 21-29.
[10] Biryukov, A. and Nikolic, I. (2010) Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES. In: Gilbert, H., Ed., Advances in Cryptology EUROCRYPT 2010, Lecture Notes in Computer Science, Vol. 6610, Springer, Berlin, 322-344.
[11] Geiselmann, W., Januszewski, F., Kopfer, H., Pelzl, J. and Steinhardt, R. (2007) A Simpler Sieving Device: Combining ECM and TWIRL. In: Rhee, M.S. and Lee, B., Eds., Information Security and Cryptology—ICISC 2006, Lecture Notes in Computer Science, Springer, Berlin, 118-135.
[12] Sumalatha, M. and Malal, M. (2013) Design of High Speed 128 Bits AES Algorithm for Data Encryption. International Journal of Current Engineering and Technology (IJCET), 20, 338-343.
[13] Kazys, A. and Janus, K. (2012) Key-Dependent S-Box Generation in AES Block Cipher System. Informatica, 20, 23-34.
[14] Shaaban, S., Wisam, E. and Shadi, A. (2013) Enhancement the Security of AES against Modern Attacks by Using Variable Key Block Cipher. International Arab Journal of E-Technology, 3, 17-26.
[15] Bernstein, D., Chen, H., Chen, M., Cheng, C., Hsiao, C. and Lange, T. (2009) The Billion-Mulmod-Per-Second PC. In SHARCS ’09: Special-Purpose Hardware for Attacking Cryptographic Systems, Lausanne, 131-144.
[16] Neetu, S. (2010) Cryptanalysis of Modern Cryptographic Algorithms. International Journal of Computer Science and Telecommunications, 1, 166-169.
[17] Julia, J., Ramlan, M., Salasiah, S. and Jazrin, R. (2012) Enhancing AES S-Box Generation Based on a Round Key. International Journal of Cyber-Security and Digital Forensics, 1, 65-72.
[18] Amit, C. and Damodar, T. (2012) Analysis of AES Algorithm Using Symmetric Cryptography. International Journal of Computing, Communications and Networking, 1, 57-62.
[19] Cukier, M., Berthier, R., Panjabi, S. and Tan, S. (2006) A Statistical Analysis of Attack Data to Separate Attacks. Proceedings of the International Conference on Dependable Systems and Networks (DSN 2006), Philadelphia, 25-28 June 2006, 123-142.
[20] Payal, P. and Soni, D. (2013) An Invention of Quantum Cryptography over the Classical Cryptography for Enhancing Security. International Journal of Applied or Innovation in Engineering and Management, 2, 243-246.
[21] Omer, J., Safia, A., El-Sayed, M. and Abdel-Badeeh, S. (2014) Statistical Analysis for Random Bits Generation on Quantum Key Distribution. Proceedings of the 3rd IEEE International Conference on Cyber Security, Cyber Warfare, and Digital Forensic, Beirut, 29 April-1 May 2014, 45-51.
[22] Christain, K. and Mario, P. (2010) Applied Quantum Cryptography (Lecture Notes in Physics, Book 797). Springer, Berlin.
[23] Solange, G. and Mohammed, A. (2014) Applying QKD to Reach Unconditional Security in Communications. European Research Project SECOQC.
[24] Ammar, O., Khaled, E., Muneer, A. and Eman, A. (2013) Quantum Key Distribution by Using RSA. Proceeding of the 3rd International Conference on Innovative Computing Technology (INTECH), London, 29-31 August 2013, 35-44.

comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.