Custom Replacement and Shifting of Encryption Key for Modified AES Algorithm Radhika Desai CMPN- Thakur college of engineering and technology Kiran Bhandari Associate Professor CMPN- Thakur college of engineering and technology Veena Kulkarni Assistant Professor CMPN- Thakur college of engineering and technology Abstract—Today’s world is moving fast towards virtualization and cloud, hence it becomes very important for the organizations to encrypt the critical data. This application provides this facility by enhancing the AES algorithm by adding custom encryption settings in the algorithm. Any known algorithm has a probability of being cracked. So hence we here proposed a configurable algorithm that allows user to modify the algorithm each time he encrypts text. The algorithm uses AES and adds some custom configurable steps in the system where user may modify the encryption process as needed. In this application more steps of encryption are added in order to make the data impossible to decipher by attackers. Keywords- AES algorithm; Accounting information, Security, Encryption I. INTRODUCTION Web Applications form an integral part of our day to day life. The number of attacks on websites and the compromise of many individuals secure data are increasing at an alarming rate. With the advent of social networking and e-commerce, web security attacks such as phishing and spamming have become quite common. The consequences of these attacks are ruthless. Hence, providing increased amount of security for the users and their data becomes essential. SQL injection can be used for unauthorized access to a database to penetrate the application illegally, modify the database or even remove it. For a hacker to modify a database, details such as field and table names are required.There are some algorithms to prevent the SQL injection attacks. II. LITERATURE REVIEW 1. AES algorithm AES is an encryption algorithm collected by the United States National Institute of Standards and Technology (NIST) in January 1997. The criteria made by NIST are divided into three major items to compare the candidate algorithms: (1) safety, (2) cost, (3) algorithm implementation. The minister of the United States Department Commerce announced that the Rijndael algorithm won on October 2nd, 2000. NIST released AES standard officially in 2001 [1]. Rijndael algorithm is easy to realize with high security and strong flexibility, so it became the best option of AES. 2. The structure of AES algorithm The Advanced Encryption Standard (AES) is a128-bit block cipher with a 128-, 192- or 256-bit secret key, called AES-128, AES-192, AES-256. AES algorithm is composed of three parts, AddRoundKey, encryption and decryption. The relationship of block length (Nb), key length (Nk) and the rounds (Nr) is shown in Table 1. International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 6 Issue 1 September 2015 219 ISSN: 2278-621X