Author:
Alsuwaiedi Hasan kadhim Ali
Abstract
This study offers a new adjustment to the Advanced Encryption Standard (AES) in order to assure a high degree of security. This is achieved by replacing the binary (XOR) operation with a new (Xo) operation in each add-round-key stage. The Xo operation generated an extra six randomly selected control keys determined by six state tables (2, 4, 6, 8, 10, and 12) produced from the addition operation in the Galois Field GF (2^2 ,2^4 ,2^6 , 2^8, 2^10 and 2^12 ) in order to boost the algorithm's unpredictability. In the suggested method, an adversary requires at least probabilities of keys to break the message; hence, it improves the difficulty of the original AES against brute force attacks. also enhances the performance of additional security metrics, such as NIST tests, compared to the original AES. Consequently, this replacement, including the use of six keys in both the encryption and decryption processes, offers a new level of security and a higher degree of resistance to data breaches. The novelty of the proposed (Xo) technique lies in the construction of GF tables ( 2^6 , 2^10 and 2^12) to be used in the encryption and decryption process for the first time, as well as the approach utilized to create the code for it.
Subject
Industrial and Manufacturing Engineering,Materials Science (miscellaneous),Business and International Management
Reference25 articles.
1. O. M. A.-H. and A. A. Abu-Ein, "Chaotic based multimedia encryption: a survey for network and internet security," Bulletin of Electrical Engineering and Informatics, vol. 11, no. 4, pp. 2151-2159, 2022.
2. S. P. J. Meghana N, "Multimedia Encryption For Enhancing Data Security Using AES and Logistic Mapping," International Journal Of Creative Research Thoughts, vol. 10, no. 2, pp. 2320-2882, February 2022.
3. M. D. A.-H. and Qusay Zuhair Abdulla, "Robust Password Encryption Technique with an Extra Security Layer," Iraqi Journal of Science, vol. 64, no. 3, pp. 1477-1486, 2023.
4. L. M. Marcin Lawnik, "Chaos-Based Cryptography: Text Encryption Using Image Algorithms," electronics, 2022, https://doi.org/10.3390/electronics11193156.
5. M. E. Smid, "Development of the Advanced Encryption Standard," Journal of Research of the National Institute of Standards and Technology, vol. 126, no. 126024, 2021, https://doi.org/10.6028/jres.126.024.