At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called optimized advanced encryption standard (OAES). The OAES algorithm utilizes sine map and random number to generate a new key to enhance the complexity of the generated key. Thereafter, multiplication operation was performed on the original text, thereby creating a random matrix (4×4) before the five stages of the coding cycles. A random substitution-box (S-Box) was utilized instead of a fixed S-Box. Finally, we utilized the eXclusive OR (XOR) operation with digit 255, also with the key that was generated last. This research compared the features of the AES and OAES algorithms, particularly the extent of complexity, key size, and number of rounds. The OAES algorithm can enhance complexity of encryption and decryption by using random values, random S-Box, and chaotic maps, thereby resulting in difficulty guessing the original text.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
User Selective Encryption Method for Securing MANETs IJECEIAES
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As t he MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES ), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigat e the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
User Selective Encryption Method for Securing MANETs IJECEIAES
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As t he MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES ), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigat e the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...IJCNCJournal
In this paper a detailed analysis of Data Encryption Standard (DES), Triple DES (3DES) and Advanced
Encryption Standard (AES) symmetric encryption algorithms in MANET was done using the Network
Simulator 2 (NS-2) in terms of energy consumption, data transfer time, End-to-End delay time and
throughput with varying data sizes. Two simulation models were adopted: the first simulates the network
performance assuming the availability of the common key, and the second simulates the network
performance including the use of the Diffie-Hellman Key Exchange (DHKE) protocol in the key
management phase. The obtained simulation results showed the superiority of AES over DES by 65%, 70%
and 83% in term of the energy consumption, data transfer time, and network throughput respectively. On
the other hand, the results showed that AES is better than 3DES by approximately 90% for all of the
performance metrics. Based on these results the AES was the recommended encryption scheme.
Extended of TEA: A 256 bits block cipher algorithm for image encryption IJECEIAES
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are
considering the important performance of these algorithms like CPU time consumption, memory usage and
battery usage. This research tries to demonstrate a fair comparison between the most common algorithms
and with a novel method called Secured Watermark System (SWS) in data encryption field according to
CPU time, packet size and power consumption. It provides a comparison the most known algorithms used
in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of
encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been
conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the
compared encryption algorithms with different parameters.
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
Ciphering algorithms play a main role in information security systems. Therefore in this paper we are considering the important performance of these algorithms like CPU time consumption, memory usage and battery usage. This research tries to demonstrate a fair comparison between the most common algorithms and with a novel method called Secured Watermark System (SWS) in data encryption field according to CPU time, packet size and power consumption. It provides a comparison the most known algorithms used in encryption: AES (Rijndael), DES, Blowfish, and Secured Watermark System (SWS).
For comparing these algorithms with each other variations of data block sizes, and a variation of encryption-decryption speeds where used in this research.
In addition a comparison with different platforms such as Windows 8, Windows XP and Linux has been conducted. Finally the results of the experimentation demonstrate the performance and efficiency of the compared encryption algorithms with different parameters.
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...IRJET Journal
This document discusses image encryption and decryption using AES (Advanced Encryption Standard) for robust data security and defense against intrusion attacks. It begins with an abstract that outlines the need for strong image encryption techniques to keep up with increasing information theft. The introduction provides background on cryptography, encryption, and decryption. It then discusses issues with existing encryption systems and proposes an AES-based encryption/decryption system for images that ensures confidentiality, integrity, and authentication to evade intrusion attacks. The document reviews related work on image encryption techniques and the AES algorithm. It describes the proposed AES encryption and decryption process in detail using techniques like substitution bytes, shift rows, mix columns, and add round key. The goal is to
Convolutional neural network based key generation for security of data throug...IJECEIAES
Machine learning techniques, especially deep learning, are playing an increasingly important role in our lives. Deep learning uses different models to extract information from the data. They have already had a huge impact in areas such as health (i.e., cancer diagnosis), self-driving cars, speech recognition, and data encryption. Recently, deep learning models, including convolutional neural networks (CNN), have been proven to be more effective in the security field. Moreover, the National Institute of Standards and Technology (NIST) recommends the advanced encryption standard (AES) algorithm as the most often utilized encryption method in several security applications. In this paper, a crypt-intelligent system (CIS) capable of securing data is proposed. It is based on the combination of the performance of CNN with the AES, by substituting the key expansion unit of AES with a CNN architecture that performs the key generation. Our CIS is described using very high-speed integrated circuit (VHSIC) hardware description language (VHDL), simulated by ModelSim, synthesized, and implemented with Xilinx ISE 14.7. Finally, the Airtex-7 series XC7A100T device has achieved an encryption throughput of 965.88 Mbps. In addition, the CIS offers a high degree of flexibility and is supported by reconfigurability, based on the experimental results, if sufficient resources are available, the architecture can provide performance that can satisfy cryptographic applications.
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
1) The document discusses the implementation of the Advanced Encryption Standard (AES) algorithm for encryption on an Arduino Mega2560 board. AES was chosen to securely transmit sensor data collected by microcontrollers.
2) AES provides stronger encryption than older standards like DES and 3DES through its larger key sizes of 128, 192, and 256 bits and more rounds of encryption. The document implements a simple version of AES on the Arduino board.
3) Testing showed the AES code used 8824 bytes of program storage on the Arduino and encryption took 3016 microseconds while decryption took 3792 microseconds, demonstrating AES can provide security for resource-constrained devices.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Today, the growth of digitalization has made the ease for livelihood for all the organizations. Cloud computing the storage provider for all the computer resources has made it easy for accessing the data from anywhere anytime. But at the same time the security for cloud data storage is the major drawback which is provided by various cryptographic algorithms. These algorithms convert the data into unreadable format, known as cipher text, Rivest, Shamir and Adleman (RSA) one of the most popularly used asymmetric algorithm. This paper gives detailed review about such different cryptographic algorithms used for the cloud data security. The comparison study is also made for the size of data and to analyze the encryption time and decryption time, which concludes that to enhance the cloud data security some addon techniques are to be used along with these cryptographic algorithms. To increase the security level and to increase the transmission speed of plaintext, integrated method will be proposed by encoding the plaintext to intermediate plaintext and then intermediate plaintext will be compressed using any one of the compression techniques to increase the compression ratio, lastly the compressed file is encrypted to further enhance the security level.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
This document proposes a hybrid information security system that combines compression, cryptography, and image steganography to improve data security and capacity when transmitting data over the internet. The system uses discrete wavelet transform for image compression, advanced encryption standard for encryption, and least significant bit steganography for data hiding. Experimental results showed that the proposed combination of techniques maintains stego-image quality, improves system performance, and increases the size of secret data that can be transmitted compared to using each technique individually.
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...CSCJournals
In this paper we propose a novel Crypto-System with Embedded Error Control (CSEEC). The system supports data security and reliability using forward error correction codes (FEC). Security is provided through the use of a new symmetric encryption algorithm, while reliability is provided through the support of FEC codes. The system also supports joint security and reliability in which encryption and encoding are performed in a single step. The system aims at speeding up the encryption and encoding operations and reduces the hardware dedicated to each of these operations.In addition, the proposed system allows users to achieve secure and reliable communication in which they can alternate between a priority onsecurity and reliabilityand scale their choice to the desired level in order to attain communication quality and fulfill application needs. The system targets resource constrained nodes such as remote sensor nodes operating in noisy environments.
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfchWaqasZahid
This paper compares the AES and RSA encryption algorithms for data security in cloud computing. AES is a symmetric algorithm that uses a single key for encryption and decryption, while RSA is an asymmetric algorithm that uses public and private key pairs. The paper analyzes the time complexity, key generation processes, advantages/disadvantages of each algorithm. Experimental results show that AES encryption and decryption is faster than RSA, especially for larger amounts of data, making AES better suited for data security applications in cloud computing.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
Implementation of Cryptography Architecture with High Secure CoreIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
This document proposes a double key encryption method using artificial neural networks for securely storing and retrieving data in cloud computing. The method uses a backpropagation neural network for key generation and to transform plaintext into an encrypted form for storage. Encryption occurs in two stages - first using a transformation key to produce encrypted input, then a second encryption key to generate ciphertext. For retrieval, the process is reversed - decrypting with keys then transforming back to plaintext. The goal is to enhance cloud data security even if an intruder obtains the ciphertext, as they could not decrypt without both keys.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
This document summarizes a research paper that designed and implemented a Quality of Security Service (QoSS)-compliant Advanced Encryption Standard (AES) processor for use in multimedia applications. The processor uses a reconfigurable architecture that can provide up to 12 different AES cipher schemes with reasonable hardware costs. It allows users to specify security requirements through a security vector. Evaluation showed the QoSS-AES processor can provide high security for multimedia communications like MPEG video with low latency. Implementation on FPGAs demonstrated competitive speed, area and power performance compared to other FPGA-based AES designs.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a study that analyzed the performance of the AES-128 encryption algorithm using CBC mode on wireless sensor network motes. The study implemented AES-128 encryption and decryption with a 128-bit key on TinyOS motes. It found that AES-128 CBC provided reliable encryption for sensor networks and its performance was analyzed by measuring encryption time and energy consumption for different plaintext sizes and network scales. The encryption and decryption processes used the same 128-bit key and performed 10 rounds of AES transformations as specified for a 128-bit key.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Advanced approach for encryption using advanced encryption standard with chaotic map
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
AES is considered a good encryption algorithm in terms of providing security to a network in passing information (data) in form of audio, string, and video and in any other form. However it yields a low throughput resulting in slowness and increasing energy dispensation of server or an application. The Enhanced AES algorithm is proposed in this paper which works by using sequence counters and provides improved throughput as compare to conventional AES algorithm. The J-Bit Encoding is being a compression algorithm in lossless category which doesn't decrease the quality but reduce the size of data to some extent. It has been observed that the proposed encryption algorithm integrated to J-Bit Encoding algorithm will provide the effective security measures as well as increased throughput as a parameter and less bandwidth usage as the actual size of data shall not be sent along the network.
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...IRJET Journal
This document discusses image encryption and decryption using AES (Advanced Encryption Standard) for robust data security and defense against intrusion attacks. It begins with an abstract that outlines the need for strong image encryption techniques to keep up with increasing information theft. The introduction provides background on cryptography, encryption, and decryption. It then discusses issues with existing encryption systems and proposes an AES-based encryption/decryption system for images that ensures confidentiality, integrity, and authentication to evade intrusion attacks. The document reviews related work on image encryption techniques and the AES algorithm. It describes the proposed AES encryption and decryption process in detail using techniques like substitution bytes, shift rows, mix columns, and add round key. The goal is to
Convolutional neural network based key generation for security of data throug...IJECEIAES
Machine learning techniques, especially deep learning, are playing an increasingly important role in our lives. Deep learning uses different models to extract information from the data. They have already had a huge impact in areas such as health (i.e., cancer diagnosis), self-driving cars, speech recognition, and data encryption. Recently, deep learning models, including convolutional neural networks (CNN), have been proven to be more effective in the security field. Moreover, the National Institute of Standards and Technology (NIST) recommends the advanced encryption standard (AES) algorithm as the most often utilized encryption method in several security applications. In this paper, a crypt-intelligent system (CIS) capable of securing data is proposed. It is based on the combination of the performance of CNN with the AES, by substituting the key expansion unit of AES with a CNN architecture that performs the key generation. Our CIS is described using very high-speed integrated circuit (VHSIC) hardware description language (VHDL), simulated by ModelSim, synthesized, and implemented with Xilinx ISE 14.7. Finally, the Airtex-7 series XC7A100T device has achieved an encryption throughput of 965.88 Mbps. In addition, the CIS offers a high degree of flexibility and is supported by reconfigurability, based on the experimental results, if sufficient resources are available, the architecture can provide performance that can satisfy cryptographic applications.
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
1) The document discusses the implementation of the Advanced Encryption Standard (AES) algorithm for encryption on an Arduino Mega2560 board. AES was chosen to securely transmit sensor data collected by microcontrollers.
2) AES provides stronger encryption than older standards like DES and 3DES through its larger key sizes of 128, 192, and 256 bits and more rounds of encryption. The document implements a simple version of AES on the Arduino board.
3) Testing showed the AES code used 8824 bytes of program storage on the Arduino and encryption took 3016 microseconds while decryption took 3792 microseconds, demonstrating AES can provide security for resource-constrained devices.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Today, the growth of digitalization has made the ease for livelihood for all the organizations. Cloud computing the storage provider for all the computer resources has made it easy for accessing the data from anywhere anytime. But at the same time the security for cloud data storage is the major drawback which is provided by various cryptographic algorithms. These algorithms convert the data into unreadable format, known as cipher text, Rivest, Shamir and Adleman (RSA) one of the most popularly used asymmetric algorithm. This paper gives detailed review about such different cryptographic algorithms used for the cloud data security. The comparison study is also made for the size of data and to analyze the encryption time and decryption time, which concludes that to enhance the cloud data security some addon techniques are to be used along with these cryptographic algorithms. To increase the security level and to increase the transmission speed of plaintext, integrated method will be proposed by encoding the plaintext to intermediate plaintext and then intermediate plaintext will be compressed using any one of the compression techniques to increase the compression ratio, lastly the compressed file is encrypted to further enhance the security level.
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
This document summarizes a research paper that proposes a new encryption algorithm to improve performance parameters. The algorithm is divided into two phases. Phase 1 involves reversing, swapping, circularly shifting bits of the plaintext and XORing with the key. Phase 2 divides the output into blocks, then recombines the left bits of each block. The paper analyzes avalanche effect and execution time of the proposed algorithm compared to existing algorithms to evaluate its performance. The results show better performance than existing algorithms.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
This document proposes a hybrid information security system that combines compression, cryptography, and image steganography to improve data security and capacity when transmitting data over the internet. The system uses discrete wavelet transform for image compression, advanced encryption standard for encryption, and least significant bit steganography for data hiding. Experimental results showed that the proposed combination of techniques maintains stego-image quality, improves system performance, and increases the size of secret data that can be transmitted compared to using each technique individually.
A Crypto-System with Embedded Error Control for Secure and Reliable Communica...CSCJournals
In this paper we propose a novel Crypto-System with Embedded Error Control (CSEEC). The system supports data security and reliability using forward error correction codes (FEC). Security is provided through the use of a new symmetric encryption algorithm, while reliability is provided through the support of FEC codes. The system also supports joint security and reliability in which encryption and encoding are performed in a single step. The system aims at speeding up the encryption and encoding operations and reduces the hardware dedicated to each of these operations.In addition, the proposed system allows users to achieve secure and reliable communication in which they can alternate between a priority onsecurity and reliabilityand scale their choice to the desired level in order to attain communication quality and fulfill application needs. The system targets resource constrained nodes such as remote sensor nodes operating in noisy environments.
Comparative Analysis of Aes and Rsa Algorithms for Data.pdfchWaqasZahid
This paper compares the AES and RSA encryption algorithms for data security in cloud computing. AES is a symmetric algorithm that uses a single key for encryption and decryption, while RSA is an asymmetric algorithm that uses public and private key pairs. The paper analyzes the time complexity, key generation processes, advantages/disadvantages of each algorithm. Experimental results show that AES encryption and decryption is faster than RSA, especially for larger amounts of data, making AES better suited for data security applications in cloud computing.
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
This document summarizes a study that evaluates the performance of four symmetric key cryptography algorithms: DES, 3DES, Blowfish, and AES. The study considers criteria like file size, file type, encryption and decryption time, and block size. It finds that Blowfish has the best performance, encrypting and decrypting data faster than the other algorithms. AES also performs well, while 3DES has the lowest performance due to its longer key length. The document reviews related literature comparing the performance of symmetric key cryptography algorithms and techniques that combine cryptography with steganography for enhanced security.
Implementation of Cryptography Architecture with High Secure CoreIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Computer data communication is the order of the day with Information Communication Technology (ICT) playing major role in everyone’s life, communicating with smart phones, tabs, laptops and desktops using internet. Security of the data transferred over the computer networks is most important as for as an organization is concerned. Hackers attempt hard to crack the software key and indulge in cyber crimes. In this paper, the main concern is not only to provide security to the data transferred at the software level but it provides the security at hardware level by the modified Blowfish Encryption and Decryption Algorithms. It results minimum delay, high speed, high throughput] and effective memory utilization compared to Blowfish (BF) and Triple Data Encryption Standard (TDES) algorithms. The implementation of Blowfish with modulo adder and Wave Dynamic Differential Logic (WDDL) is to provide security against Differential power analysis (DPA). In the proposed four implementations, BF with constant delay n-bit adder (BFCDNBA) yielded minimum delay, maximum frequency, high memory utilization and high throughput compared to BF with modulo adder and WDDL logic (BFMAWDDL), BF with modulo adder (BFMA) and TDES algorithms. The VLSI implementation of Blowfish and TDES algorithms is done using Verilog HDL.
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
This document proposes a double key encryption method using artificial neural networks for securely storing and retrieving data in cloud computing. The method uses a backpropagation neural network for key generation and to transform plaintext into an encrypted form for storage. Encryption occurs in two stages - first using a transformation key to produce encrypted input, then a second encryption key to generate ciphertext. For retrieval, the process is reversed - decrypting with keys then transforming back to plaintext. The goal is to enhance cloud data security even if an intruder obtains the ciphertext, as they could not decrypt without both keys.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
This document summarizes a research paper that designed and implemented a Quality of Security Service (QoSS)-compliant Advanced Encryption Standard (AES) processor for use in multimedia applications. The processor uses a reconfigurable architecture that can provide up to 12 different AES cipher schemes with reasonable hardware costs. It allows users to specify security requirements through a security vector. Evaluation showed the QoSS-AES processor can provide high security for multimedia communications like MPEG video with low latency. Implementation on FPGAs demonstrated competitive speed, area and power performance compared to other FPGA-based AES designs.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a study that analyzed the performance of the AES-128 encryption algorithm using CBC mode on wireless sensor network motes. The study implemented AES-128 encryption and decryption with a 128-bit key on TinyOS motes. It found that AES-128 CBC provided reliable encryption for sensor networks and its performance was analyzed by measuring encryption time and energy consumption for different plaintext sizes and network scales. The encryption and decryption processes used the same 128-bit key and performed 10 rounds of AES transformations as specified for a 128-bit key.
Similar to Advanced approach for encryption using advanced encryption standard with chaotic map (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Advanced approach for encryption using advanced encryption standard with chaotic map
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 2, April 2023, pp. 1708~1723
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i2.pp1708-1723 1708
Journal homepage: http://ijece.iaescore.com
Advanced approach for encryption using advanced encryption
standard with chaotic map
Yahia Alemami1
, Mohamad Afendee Mohamed1
, Saleh Atiewi2
1
Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Besut, Malaysia
2
Department of Computer Science, College of Information Technology, Al Hussein Bin Talal University, Maan, Jordan
Article Info ABSTRACT
Article history:
Received Feb 16, 2022
Revised Sep 15, 2022
Accepted Oct 13, 2022
At present, security is significant for individuals and organizations. All
information need security to prevent theft, leakage, alteration. Security must
be guaranteed by applying some or combining cryptography algorithms to
the information. Encipherment is the method that changes plaintext to a
secure form called cipherment. Encipherment includes diverse types, such as
symmetric and asymmetric encipherment. This study proposes an improved
version of the advanced encryption standard (AES) algorithm called
optimized advanced encryption standard (OAES). The OAES algorithm
utilizes sine map and random number to generate a new key to enhance the
complexity of the generated key. Thereafter, multiplication operation was
performed on the original text, thereby creating a random matrix (4×4)
before the five stages of the coding cycles. A random substitution-box
(S-Box) was utilized instead of a fixed S-Box. Finally, we utilized the
eXclusive OR (XOR) operation with digit 255, also with the key that was
generated last. This research compared the features of the AES and OAES
algorithms, particularly the extent of complexity, key size, and number of
rounds. The OAES algorithm can enhance complexity of encryption and
decryption by using random values, random S-Box, and chaotic maps,
thereby resulting in difficulty guessing the original text.
Keywords:
Advanced encryption standard
Avalanche effect
Sine map
Throughput
This is an open access article under the CC BY-SA license.
Corresponding Author:
Mohamad Afendee Mohamed
Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin
Besut Campus, 22200, Terengganu, Malaysia
Email: mafendee@unisza.edu.my
1. INTRODUCTION
Information is confronted with various challenges primarily owing to the Internet, which has
transformed the world into a small village, where numerous illegal methods are used to obtain information.
Accordingly, the subject of security has become extremely critical for information protection, in which many
security algorithms are used to achieve safety goals, and that the various aims of secure systems include
authentication, confidentiality, and data integration [1]. In this current research a new method has been
developed to improve advanced encryption standard (AES) algorithm. The reminder of this paper is
organized as follows: section 2 explains the used chaotic map in the proposed algorithm, section 3 presents
an overview of AES, section 4 provides a detailed steps for the proposed algorithm, sections 5 and 6
represent the analysis and conclusion respectively.
Encryption is required to safeguard sensitive information from unauthorized access. Moreover,
chaos has been introduced to cryptography, which is similar to confusion and diffusion in cryptography,
because of its ergodicity, pseudo-randomness, and sensitivity to initial conditions and control parameters.
Accordingly, chaotic systems could be used to build cryptosystems owing to these characteristics [2].
2. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1709
Cryptographic algorithms that are considered security algorithms involve two technicalities: symmetric and
asymmetric cryptography [1]. Encipherment is a process that converts original text to unclear text, whereas
decryption is the reverse of this process [3]. Figures 1 and 2 show the symmetric and asymmetric
cryptography, respectively, [3].
Figure 1. Symmetric cryptosystem
Figure 2. Asymmetric cryptosystem
The following parameters are utilized to determine the strength of encryption algorithms.
− Avalanche effect: avalanche effect is significant to cryptography. To date, numerous algorithms have
been presented for the substitution-box (S-Box) generation to improve the avalanche effect [4]. The
avalanche effect is calculated using (1) [3], [5]:
𝐴𝑣𝑎𝑙𝑎𝑛𝑐ℎ𝑒 𝐸𝑓𝑓𝑒𝑐𝑡 =
𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑓𝑙𝑖𝑝𝑝𝑒𝑑 𝑏𝑖𝑡𝑠 𝑖𝑛𝑠𝑖𝑑𝑒 𝑡ℎ𝑒 𝑐𝑖𝑝ℎ𝑒𝑟 𝑡𝑒𝑥𝑡
𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑖𝑡𝑠 𝑖𝑛 𝑡ℎ𝑖𝑠 𝑐𝑖𝑝ℎ𝑒𝑟 𝑡𝑒𝑥𝑡
∗ 100% (1)
An adjustment in one bit of the plaintext or one bit of the key should create a change in numerous bits of
the cipher texts. This property is known as the avalanche effect [5].
− Encryption time: for encryption time, the unit of measure is millisecond (ms) and depends on the length
of text and key size. The higher the encryption speed, the better the algorithm will perform.
− Decryption time: decryption time is the time span to recapture the first text from the encrypted text and is
likewise estimated in ms. The higher the encryption speed, the better the algorithm will perform.
− Throughput: is the total size of the encrypted text file in bytes divided by the total time of encipherment.
The performance is better, when the higher is the throughput [3].
− Central processing unit (CPU) utilization: refers to the amount of time the CPU spends processing data. It
is the amount of time that the CPU is dedicated to the calculation of the process. It shows how much the
CPU is being used. The load on the CPU increases as the encryption time increases [6].
The study [7] assessed the presentation of two encipherment techniques: AES and data encryption
standard (DES). The outcomes in Table 1 are based on processing time, CPU usage, and transfer rate of the
cipher in two operating systems (i.e., Windows and Mac platform) for various text sizes. Meanwhile,
Tables 2 and 3 show the time comparison based on entropy for two different tests.
Table 1. Encryption time, throughput, and CPU utilization for diverse data size in Windows/Mac OS
Algorithm
types
Average encryption time
in sec for diverse data
size (MAC OS)
Average encryption time
in sec for diverse data size
(Windows OS)
Throughput
for
windows
Throughput
for MAC
CPU
utilization
in windows
CPU
utilization
in MAC
AES 7.11 8.105 27.76 31.65 4.2% 2%
DES 21.83 22.195 10.13 10.31 2% 1.9%
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1710
The research [8] compared AES and DES and determined that AES is safer than DES.
Tables 2 and 3 show the execution times of AES and DES, respectively, by using entropy. The result showed
that both algorithms consumed diverse times in diverse computers. Diverse computers take diverse times for
the same algorithm over the same data packet, which shows that all algorithms have diverse speeds. The
research [9] compared Rivest-Shamir-Adleman (RSA) and AES in terms of coding time and memory usage.
The comparison was made on different types of data with such extensions as .jpeg, .txt, .doc, and .pdf.
Table 4 presents the outcomes for text file.
Table 2. Test 1-comparison depending on entropy Table 3. Test 2-comparison depending on entropy
File sizes AES times (s) DES times (s)
512 Kb 49.03 66.09
1 Mb 44.84 67.94
2.0 Mb 51.14 66.29
2.5 Mb 51.28 59.42
File sizes AES times (s) DES times (s)
512 Kb 36.81 35.28
1 Mb 32.81 45.45
2.0 Mb 31.15 37.7
2.5 Mb 45.53 37.89
Table 4. Comparison analysis between RSA and AES for text file
Data sizes (bytes) Algorithms Encryption times (ms)
408 RSA 6
408 AES 26
42317 RSA 11
42317 AES 62
42317 AES 44
The research [10] utilized a new methodology on AES to produce dynamic encipherment by giving
a character (salt) to the original text. Salt was shaped from the after effect of a linear congruential generator
(LCG) calculation. At this point, a blend of salt and plain content will merge with the algorithm of the
onetime pad (OTP). Testing the dynamic original text demonstrated an effective test, thereby demonstrating
the integrity of the consequences of the encipherment process.
In [11] an improvements were made to the AES algorithm. First, a skew tent map was utilized to
create the key sequences. Second, the eXclusive OR (XOR) operation was performed between matrix D and
the sequence key. The plaintext matrix was encoded from left to right, while the ciphertext matrix was
decoded from top to bottom and from right to left. After the XOR process, the key and plaintext were joined.
Third, the mix columns array tasks were modified, and addition and subtraction were adopted to strengthen
the relationship between pixels. Tests showed that the improved algorithm is suitable for encipherment in a
cloud computing environment. A hybrid system was proposed, in which AES-ECC is used, which combines
the advantages of the AES algorithm in accelerating data encipherment with ECC to secure symmetric key
session exchange. Accordingly, strength in information security was proven [12].
Some random sequences were used in the process of modifying the AES algorithm. In particular, the
pseudorandom number was utilized to avoid the derivation of the sequences, thereby preventing hackers from
knowing the secret key. The outcomes indicated that the proposed algorithm is superior to the standard
algorithm in terms of low and secure key generation [13]. The study [14] amended S-Box in the AES
algorithm by utilizing the Fibonacci series and prime factor. The results showed that the proposed S-Box has
good encipherment properties compared with the original S-Box. The results are shown in Table 5.
Table 5. Comparison between the original and improved S-Box
Parameters [14] Standard AES S-Box
Size 8 MB 8 MB
Absolute indicator 32 32
Sum of the square indicator 133120 133120
Algebraic immunity 4 4
Algebraic degree 7 8
Transparency order 7.860 7.859
Signal to noise ratio (SNR) 9.600 9.887
The number of rounds was increased to 16 rounds for the AES algorithm to increase security.
Experiments showed that it provides high speed, and the encryption key was created by utilizing the Polybius
square [15]. The study [16] proposes a secured modified advanced encryption standard algorithm that
reduces the number of rounds in the AES to 14 in order to reduce encryption and decryption process time
4. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1711
while boosting data security. The findings show that the proposed technique has a higher efficiency in terms
of encryption and decryption process time, while increasing security as evidenced by the avalanche effect
test. Table 6 shows execution time for various files during encryption and decryption.
Table 6. Execution time of encryption for various files
Input file size (KB) Execution time for encryption in seconds Execution time for decryption in seconds
AES [16] AES [16]
2 24 15 24 15
3 72 40 72 40
4 143 125 143 125
5 291 240 291 240
6 481 425 471 425
7 692 598 692 598
According to [16] the average amount of avalanche effect of all rounds utilizing the suggested
technique is more than 50%, proving that the proposed system is secure, according to the results of the
avalanche effect test, where the highest result reached to 58.59%. The research [17] suggested a new
technique to improve AES with shift row and S-Box alteration for the mix column transformation, in which
Sub byte (S-Box) is moved to join the mix column. The outcomes showed that the enhancement rates of
encipherment and decipherment reached 86.143% and 13.085%, respectively.
The research [18] modified the S-Box through two S-Boxes, the first of which is the same as the
Rijndael S-Box and the second was built through XOR and affine transformation, and will replace the
MixColumns operation within the internal rounds in the coding process. The results of the AES algorithm
after modification were 108.369% more efficient than the original AES. Various polynomials were used to
generate novel S-Boxes. In the alteration, x8+x6+x5+x+1 was utilized instead of x8+x4+x3+x+1, which was
used in the original AES. Results indicated that the modified AES is superior to the standard AES in terms
hamming distance, balanced output, and avalanche effect [19].
The study [20] suggests a change to the AES algorithm. The bit permutation transformation was
utilized instead of the mix columns transformation since the utilization of bit change in an encryption
calculation accomplishes productivity by giving least encryption time and reduce memory utilization. The
improved AES algorithm performed 18.47% quicker encryption and 18.77% faster decryption for text files,
according to the study’s findings. In comparison to the standard AES method, the modified AES algorithm
produced a 16.53 percent larger avalanche effect compared to standard AES, thus lead to improving security.
The encryption method that combines the AES and RSA algorithms in this research takes full
advantage of both symmetric key and asymmetric key. The file’s session key is encrypted with RSA, while
the data file’s encryption is done with AES. The encryption processing efficiency of the system is great.
128-bit encryption key was created, which is then encrypted using the RSA asymmetric technique [21]. The
results were as follows, as shown in Table 7.
Table 7. Simulation test
Algorithm Data size (MB) Encryption time (s) Decryption time (s) Memory used (KB)
AES 1 0.153 0.305 14.7
10 3.813 15.253
20 19.067 305.064
[21] 1 0.183 0.405 17.756
10 4.213 16.153
20 19.867 315.064
A symmetric encryption technique was proposed in [22]. The modification is based on AES and
adds a second or additional key. Another change is made at the SubBytes stage, where the transportation
operation is added to the original SubBytes operation. Table 8 shows the results of the tests. The study [23]
utilized a one-dimensional S-Box, In any event, expelling a complete byte necessitates replacing the S-Boxes
twice. Four bits of state byte were replaced, while another four bits were superseded by the original S-Box. A
reducible polynomial (i.e., x8+x4+x3+1) was used. Furthermore, a particular byte was selected for the static
fragment outline 0×63. The results showed that productivity reached 18.35%.
The work in [24] proposes a new approach for generating dynamic S-Box from cipher key to
improve the encryption process of the advanced encryption standard algorithm. This approach will construct
more secure block ciphers, solve the problem of fixed structure S-Boxes, and improve the AES block cipher
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1712
system’s security level. The main advantage of this technique is that it can generate many S-Boxes simply by
altering the cipher key. Table 9 shows the avalanche effect results of both original AES and proposed AES.
The inclusion of the Dynamicity properties in the AES S-Box for greater resilience against brute
force attack and biclique attack is the goal of this study in reference [25]. Hashing techniques are paired with
the AES algorithm to produce variance in security using MD4, SHA3, or SHA5. To improve the avalanche
effect of the AES algorithm, a novel key dispersion mechanism is presented. Table 10 shows the avalanche
effect.
In the study [26], AES was fortified by consolidating symmetric and asymmetric types.
Diffie-Hellman was utilized for the AES key creation, while private number creation was used to generate
dynamic S-Boxes. The proposed approach is ideal for rapid calculation and can resist cryptographic assaults,
such as linear and differential cryptanalysis assaults.
A chaotic dynamic S-Boxes was constructed utilizing the Chebyshev polynomial theory of the first
type. This approach was used to create 80 random 8×8 S-Boxes, and has acceptable safety and low
computational cost compared with 21 modern approaches [27]. In the study [28], it is shown that changing
the polynomial does not result in a major change in the avalanche.
Table 8. Execution time in milliseconds for different files (encryption/decryption)
File size Encryption time in ms Decryption time in ms
AES [22] AES [22]
1 KB 1.371 0.970 1.917 1.744
2 KB 2.321 1.811 3.281 3.164
5 KB 5.418 4.151 9.024 8.178
10 KB 9.377 7.526 15.915 15.421
50 KB 44.568 32.273 77.595 77.240
100 KB 103.011 65.927 186.433 126.285
1 MB 867.852 717.192 1540.999 1540.755
Table 9. The avalanche test findings Table 10. Avalanche effect comparison
Algorithm Plaintext Avalanche effect
AES 11111111111111111111111111111111 50.78%
[24] 11111111111111111111111111111111 54.68%
Algorithm Avalanche effect
Original AES 46
[25] 67.18
2. CHAOTIC MAP
An encipherment system based on chaotic maps is a highly effective system in the coding process.
The reason is that chaotic theories are characterized by their sensitivity to input factors and initial conditions.
This section presents the types of chaotic maps used in the proposed system. Sine map: Sine map is
considered one of the discrete chaotic techniques and expressed in (2) [29].
𝑌(𝑚 + 1) = 𝑎. 𝑠𝑖𝑛(𝑝𝑖. 𝑌(𝑚)) (2)
where 𝑎 is the control parameter, 𝑎 ϵ [0-1], pi=3.14, and 𝑚 index of encryption key. As shown in Figure 3
the sine map diagram represent.
Figure 3. Sine map where α=0.9 [7]
6. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1713
3. ADVANCED ENCRYPTION STANDARD
AES is a block cipher with block size of 128 bits. The key can be 128, 192, or 256 bits. The number
of inner rounds of the cipher is shown in Table 1. The algorithm is called AES-128, AES-192 or AES-256,
depending on the key size [3], [7]. Figure 4 shows the steps for every round. Table 11 shows the key length
and number of rounds of the AES algorithm [30].
Figure 4. AES structure [3], [31]
Table 11. Key lengths and number of rounds of the AES algorithm
Key lengths Number of rounds
128 bits 10
192 bits 12
256 bits 14
4. PROPOSED ALGORITHM
Figure 5 illustrates the structure of the optimized advanced encryption standard (OAES) encryption,
in which new steps were added to the original AES, including the derivation of a new key from the original
key (128) bits by using sine map, thereby leading to camouflage and complexity in obtaining the original text
due to changing the entered key, then using a random matrix (4×4) to perform multiplication with the entered
text, also random S-Box generation, and the last step is performing an XOR operation with the last key that
was generated (the new key).
OAES contains the following new steps.
1) User enters the key (128) bit to encrypt the text.
2) A change is made to the key so that the range becomes [0 to 8], with a size of (128 bit).
3) Using the sine map algorithm, a new key is derived from the original key. This step leads to increased
complexity for hackers in finding the new key, in which the sine map is considered one of the chaotic map
algorithms.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1714
Figure 5. OAES algorithm
4) A random number (128 bit) is generated. XOR is implemented between the key generated by the sine map
and the random number. The first party enters a key (e.g., “1234567891234567”) after performing
steps 2, 3, and 4, the entered key will be converted to a new one. Figure 6 shows the entered user’s key and
the new key after the conversion process using the MATLAB programming language. When using the same
key in another encryption process (e.g., “1234567891234567”), this key will be converted to another key
8. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1715
(e.g., 50DF421B01F3D533). Hence, every encryption step will arbitrarily generate a new key. Figure 7
shows the prior same key entered by the user and the new key.
Figure 6. User’s key and new key Figure 7. Prior same key and new key
5) Plaintext will be multiplied by the random matrix (4×4) that contains odd numbers. Each encipherment stage
will generate an odd random matrix, thereby further complicating the coding process. Figure 8 shows two
matrices generated in two various encipherment stages.
Figure 8. Two arrays generated in two various encryption processes
The initial encoded text will be obtained after multiplying the plaintext by the random array and divided
the remainder by 256.
6) The succeeding steps will be processed using standard four steps in AES:
a. Substitute Bytes: The initial stage, sub bytes are a non-linear byte substitution. All bytes of the initial
ciphertext (state) are replacement from the 16-bit S-Box that works autonomously. This study modified the
S-Box, in which the standard S-Box uses constant vector, but the present research uses random vector.
Standard steps in S-BOX, this affine transformation can be determined by the following steps: i) store
the multiplicative inverse of the input number in two 8-bit unsigned variables: s and x; ii) shift the value of s in
the 1-bit to the left; iii) implement the XOR operation (the value of x with the value of s), placing the result in x;
iv) for three additional cycles, stages 2 and 3 are rehashed and aggregated four times; and v) after obtaining the
value of “'x,” XOR will be implemented with a constant value equal to 99 in hex 0x63. Figure 9 shows the
affine transformation using the AES algorithm.
Figure 9. Affine transformation
In this study, the fixed value was randomly changed (proposed S-BOX) between [20 and 255]. This
camouflage leads to increased complexity in the decipherment process by a third party, in which a new
S-Box is created in every new crypto operation owing to the random value. The reason is that the static box is
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1716
a weakness as reported in previous studies. Figure 10 shows the new affine transformation by XOR operation
with random numbers.
In particular, [x0, x1, …., x7] is a random number between [20 and 255]. After executing the
program, a random number equal to 136 (binary: 10001000) was generated, as shown in Figure 11. The
resulting S-Box and inverse S-Box are shown in Figures 12 and 13, respectively. Figures 14 and 15 show
another new S-Box, inverse S-Box after creating a new random number, in which the random
number=194(11000010).
Figure 10. Affine transformation by XOR random number Figure 11. New affine transformation
Figure 12. New S-Box Figure 13. New inverse S-Box
Figure 14. S-Box, where r=194 Figure 15. New inverse S-Box
10. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1717
b. Shift rows: This is called shift rows operation, which is a nonlinear operation. The value of the rotations
relies on the column number (0, 1, 2 or 3) of the state array. Line 0 bytes are not rotated and lines 1, 2, and 3
are rotated left at 1, 2, and 3 bytes, respectively. Figure 16 shows the shift rows process.
Figure 16. Shift rows
c. Mix column: In this step, each stage transformation works at the column level. It changes every column of
the state to another column, in which the state columns are multiplied by a fix square array.
d. Add round key: In this step, XOR is performed for the combined column output and key, in which the total
rounds are 5.
7) After these steps, XOR operation with key that eventually generated, also with the number 255 will be used
to obtain the final ciphertext, thereby obtaining a high degree of complexity. As shown in Figure 17, the
S-box values are produced via an affine transform on the multiplicative inverse of the Galois finite field
GF (28
).
Figure 17. Multiplicative inverse table in GF (28
) used within the AES S-Box
The decryption process will use the following steps (inverse of the encryption process): i) enter the
new password created by the sine map XOR random key; ii) read the encrypted file; iii) perform XOR operation
with key that generated by sine map and 255; iv) add the round key; v) decryption round one includes inverse
shift row, inverse SubByte (inverse of the new S-Box), inverse mix column, and add round key; vi) repeat steps
4 for 4 times but without inverse mix column in the final stage; and vii) cipher text is multiplied by the inverted
array (4×4) (modular multiplicative inverses, such that (a*a-1
) mod 256=1). Figure 18 shows the random and
inverted arrays.
Algorithm 1. Optimized AES
Input: Key by user
1 Key1=mod(key,9) % convert the key between the range (0-8), (128 bit)
2 a=0.9
pi=3.14
for i=1:15
key1(i+1)=a*sin(pi*key1(i));
end
3 key2=round (key1. *100);
key2=mod(abs(key2),256);
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1718
4 random_key=randi (6, 1, 16) %128 bit random key; values of random numbers in the
interval [1:6]
5 Key3=XOR (Random_key, key2)
6 Input: Plaintext
7 State=mod (plaintext. *Sbox_new,256) % Perform multiplication with a new random odd
matrix (4*4).
8 conducts first round (Add round key)
9 for k=2:3%conducts follow-on round
10 state=SubBytes %random S-BOX
11 state=ShiftRows
12 state=MixColumns
13 state=AddRoundKey
14 end
15 state=SubBytes(state);
% Last round
16 state=ShiftRows(state);
17 state=AddRoundKey
18 For k=1:length (state)
State=XOR (state,255)
State=XOR (state, key3) % Cipher text is done
end
Figure 18. Random and inverted arrays
5. RESULTS AND EVALUATION
The following results were obtained using MATLAB on a computer with the following
specifications: Intel (R) Core (TM) i7-8550U CPU @ 1.80 GHz, 2.00 GHz, and 8.00 GB RAM. The
plaintext size is 16 characters (128 bit). Tables 12, 13, and 14 represents the results. All tests in Table 12 used
the plain text “yehea@unisza.edu” and password “1234567891234567”.
Table 12. Test show new password that derived from user’s password and ciphertext
Test # New password derived from the original password Cipher texts in hexadecimal
1 591E5469CAB60275C8BD8BF8851D0983 D2647694A7C9EB2AD4D1AF891DCFF82
2 B0A40D1A5F32C95D20640BB1E04EFF95 A369E1244D1C89EF09413C112645A
3 6A28C7881CC91748D5464C5161A822A8 DC90789FB348A27693ADCA7696A049
4 681AF2782A27A48410E4E39A76C68228 58132573447268353DE62A61B045D7
The avalanche effect fluctuates continuously when the algorithm is executed continuously, as shown
in Tables 14-16. Test result obtained after flipping single byte in the plain text (yehea@unisza.edu »
yehea@Unisza.edu), as shown in Table 14. While the encrypted results for the modified AES are shown in
Table 15. Each number is represented: i) encryption time (sec), ii) decryption time (sec), iii) CPU time, and
iv) Avalanche.
The experiment was conducted several times and the results were recorded. Of all the results, the
value (73.438) was the best for the avalanche. The text used was “11111111111111111111111111111111”
in hexadecimal, which is equal in decimal to “1717171717171717171717 17 17 17 17 1717”, where the
plaintext bit was changed to “01” instead of “11” as shown in Table 16. The results were compared with the
original AES and other previous research papers as shown in Table 17.
12. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1719
Throughput for OAES has been shown in Table 18. The comparisons of results are shown in
Figure 19. Figure 20 shows encrypted and plaintext after execute MATLAB programming, while Figure 21
shows the experiment result obtained with an avalanche effect ratio of 72.656. Table 19 shows a comparison
of files of different sizes in terms of encryption and decryption execution time. Figures 22 and 23 represents
graphs for encryption and decryption time, respectively.
Table 13. Histogram analysis
Test
#
Histogram analysis Test
#
Histogram analysis
1 2
3 4
Table 14. Test of various encryption parameters
Test # 1 2 3 4
T1 0.47 0.967204 1.0835 49.219
T2 0.47 0.963212 1.0858 50.781
T3 0.567 1.07465 1.0989 53.906
T4 0.565 0.919029 1.0211 56.250
T5 0.431 0.948088 1.0742 65.625
Table 15. Modified AES ciphertext results
Test # Encrypted Plaintexts Encrypted Plaintexts with One Bit Flipped
T1 49 C4 86 79 F1 61 7A 1D 56 CD AE 66 13 5A 37 5B 3C D1 3A 2B A1 79 C1 F0 75 7C 9F A4 AF 8C D0 72
T2 57 6A 5A 42 C0 F1 9E F9 B0 A4 83 44 CB 46 11 05 40 1B BE 77 B0 DE 2C 9C 41 6F 7C B3 BE 5B D8 63
T3 97 16 20 06 61 8D ED BD 60 BD E4 8C B4 BF AB 8F 18 B3 E5 F9 CD 91 BE 2B 6C FC 6B 00 3B E3 73 3A
histogram diagram of ciphertext histogram diagram of ciphertext
histogram diagram of ciphertext
histogram diagram of ciphertext
Ciphertext (characters)
Ciphertext (characters) Ciphertext (characters)
Ciphertext (characters)
1
2
3
4
5
0
0
50 100 150 200 250 250
250
250
200
200
200
150
150
150
100
100
100
50
50
50
0
0
0
0
0
0
1
2
3
4
2.5
1.5
2
1
0.5
3 3
2.5
2
1.5
1
0.5
Frequency
Frequency
Frequency
Frequency
13. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1720
Table 16. Avalanche test results after changing one bit in the plain text (from (11) to (01)
Test # Input data Number of flipped bits Avalanche effect %
1 11,11,11,11,11,11,11,11, 11,11,11,11,11,11,11,11
01,11,11,11,11,11,11,11, 11,11,11,11,11,11,11,11
62 48.438
2 66 51.562
3 73 57.031
4 58 45.312
5 77 60.156
6 92 71.875
Table 17. The avalanche test comparison
Algorithm Avalanche effect %
OPTIMIZED AES 72.656
ORIGINAL AES 50.78
[24] 54.68
[16] 57.03
Table 18. Throughput value during ciphering for files of different sizes
Text file size (KB) Encryption time (second)
AES [16] PROPOSED
2 24 14.9863
3 72 25.4973
4 143 32.1341
5 291 42.7479
6 481 48.8171
7 692 58.0047
AVERAGE TIME 283.8 222.1874
Figure 19. Results comparisons
Figure 20. Plaintext and cipher text by optimized AES
14. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1721
Figure 21. Avalanche effect result
Table 19. Execution time for encryption and decryption for various files
File size (KB) Encryption execution time (s) Decryption execution time (s)
AES [16] Optimized AES AES [16] Optimized AES
2 24 15 14.9863 24 15 37.933
3 72 40 25.4973 72 40 56.498
4 143 125 32.1341 143 125 79.0607
5 291 240 42.7479 291 240 95.3293
6 481 425 48.8171 471 425 115.209
7 692 598 58.0047 692 598 133.92
Figure 22. Graph of encryption time
Figure 23. Graph of decryption time
6. CONCLUSION
This research introduced an execution of the optimized AES algorithm for encrypting and
decrypting text. A series of tests were performed, and the results indicated that despite using the same
password and the same text, different encoded texts were produced each time. This outcome indicates that the
encoded text of the original text is constantly changing (in every new encryption process), which is a strong
indication that the proposed algorithm is highly resistant to attacks. Statistical and differential experiments
indicated that the avalanche effect reached 72.656, it means satisfies the strict avalanche criterion (SAC). The
15. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1708-1723
1722
effect of the avalanche depends on both the encryption key and the input text, random numbers, random
array, and dynamic S-BOX. Moreover, the encoding and decoding time was shown to be reduced as a result
of the reduction of the algorithm cycles.
REFERENCES
[1] C. R. Gopal and P. RajKumar, “Optimized approach for secure communication using DES algorithm,” in International Journal of
Pure and Applied Mathematics, 2017, vol. 116, no. 21, pp. 125–130, doi: 10.17758/eirai.f0817106.
[2] H. K. Hoomod and M. H. Zewayr, “AES modification using slantlet transform and lorenz chaotic system,” International Journal
of Recent Trends in Engineering, vol. 02, no. 06, pp. 561–578, 2016.
[3] Y. Alemami, M. A. Mohamed, and S. Atiewi, “Research on various cryptography techniques,” International Journal of Recent
Technology and Engineering, vol. 8, pp. 395–405, 2019, doi: 10.35940/ijrte.B1069.0782S319.
[4] B. Maram and J. M. Gnanasekar, “A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-Box
and genetic operations,” International Journal of Pure and Applied Mathematics, vol. 119, no. 10, pp. 399–418, 2018.
[5] C. P. Dewangan, S. Agrawal, A. K. Mandal, and A. Tiwari, “Study of avalanche effect in AES using binary codes,” in 2012 IEEE
International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2012, no. 978,
pp. 183–187.
[6] A. M. Babu, K. J. Singh, “Performance evaluation of chaotic encryption technique,” American Journal of Applied Sciences,
vol. 10, no. 1, pp. 35–41, Jan. 2013, doi: 10.3844/ajassp.2013.35.41.
[7] S. D. Rihan, A. Khalid, and S. E. F. Osman, “A performance comparison of encryption algorithms AES and DES,” International
Journal of Engineering Research and Technology, vol. 4, no. 12, pp. 151–154, 2015.
[8] A. Singh, “Comparatively analysis of AES, DES and SDES algorithms,” International Journal of Computer Science And
Technology, vol. 8491, no. 3, pp. 200–202, 2014.
[9] K. P. Karule and N. V. Nagrale, “Comparative analysis of encryption algorithms for various types of data files for data security,”
International Journal of Scientific Engineering and Applied Science (IJSEAS), vol. 2, no. 2, pp. 495–498, 2016.
[10] M. M. Bachtiar, T. H. Ditanaya, S. Wasista, and R. R. K. Perdana, “Security enhancement of AES based encryption using
dynamic salt algorithm,” in Proceedings of the 2018 International Conference on Applied Engineering, ICAE 2018, 2018,
pp. 1–6, doi: 10.1109/INCAE.2018.8579381.
[11] M. I. Reddy, “A modified advanced encryption standard algorithm,” Journal of Mechanics of Continua and Mathematical
Sciences, no. 1, pp. 112–117, 2020, doi: 10.26782/jmcms.spl.5/2020.01.00027.
[12] A. Hafsa, A. Sghaier, M. Zeghid, J. Malek, and M. Machhout, “An improved co-designed AES-ECC cryptosystem for secure data
transmission,” in International Journal of Information and Computer Security, 2020, vol. 13, no. 1, pp. 118–140, doi:
10.1504/IJICS.2020.108145.
[13] J. H. Anajemba, C. Iwendi, M. Mittal, and T. Yue, “Improved advance encryption standard with a privacy database structure for
IoT nodes,” in Proceedings-2020 IEEE 9th International Conference on Communication Systems and Network Technologies,
CSNT 2020, 2020, pp. 201–206, doi: 10.1109/CSNT48778.2020.9115741.
[14] K. Mohamed, F. H. H. M. Ali, S. Ariffin, N. H. Zakaria, and M. N. M. Pauzi, “An Improved AES S-box based on Fibonacci
numbers and prime factor,” International Journal of Network Security, vol. 20, no. 6, pp. 1206–1214, 2018.
[15] B. N. Rao, D. Tejaswi, K. A. Varshini, K. P. Shankar, and B. Prasanth, “Design of modified AES algorithm for data security,”
International Journal for Technological Research in Engineering, vol. 4, no. 8, pp. 1289–1292, 2017.
[16] N. A. A. Mohd and A. Y. A. Ashawesh, “Enhanced AES algorithm based on 14 rounds in securing data and minimizing
processing time,” Journal of Physics: Conference Series, vol. 1793, no. 1, Feb. 2021, doi: 10.1088/1742-6596/1793/1/012066.
[17] R. Riyaldhi and A. Kurniawan, “Improvement of advanced encryption standard algorithm with shift row and S-Box modification
mapping in mix column,” Procedia Computer Science, vol. 116, pp. 401–407, 2017, doi: 10.1016/j.procs.2017.10.079.
[18] F. V. Wenceslao, “Enhancing the performance of the advanced encryption standard (AES) algorithm using multiple substitution
boxes,” International Journal of Communication Networks and Information Security, vol. 10, no. 3, pp. 496–501, 2018, doi:
10.17762/ijcnis.v10i3.3589.
[19] V. L. Hallappanavar, B. P. Halagali, and V. V Desai, “Efficient implementation of AES by modifying S-Box,” IOSR Journal of
Computer Science (IOSR-JCE), pp. 35–39, 2014.
[20] H. V. Gamido, “Implementation of a bit permutation-based advanced encryption standard for securing text and image files,”
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 3, pp. 1596–1601, Sep. 2020, doi:
10.11591/ijeecs.v19.i3.pp1596-1601.
[21] Z. Lu and H. Mohamed, “A complex encryption system design implemented by AES,” Journal of Information Security, vol. 12,
no. 2, pp. 177–187, 2021, doi: 10.4236/jis.2021.122009.
[22] A. A. Thinn and M. M. S. Thwin, “Modification of AES algorithm by using second key and modified subbytes operation for text
encryption,” in Lecture Notes in Electrical Engineering, 2019, vol. 481, pp. 435–444, doi: 10.1007/978-981-13-2622-6_42.
[23] N. Siddaiah, A. Moduli, K. Bhargavram, P. M. Krishna, B. Rakesh, and G. V Ganesh, “A novel approch to modified advanced
encryption standard algorithm,” Journal of Critical Reviews, vol. 7, no. 2. pp. 629–633, 2020, doi: 10.31838/jcr.07.02.115.
[24] H. M. Azzawi, “Enhancing the encryption process of advanced encryption standard (AES) by using proposed algorithm to
generate S-Box,” Journal of Engineering and Development, vol. 18, no. 2, pp. 89–105, 2014.
[25] G. Nissar, D. K. Garg, and B. U. I. Khan, “Implementation of security enhancement in AES by inducting dynamicity in AES
S-Box,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 11, pp. 2364–2373, Sep. 2019,
doi: 10.35940/ijitee.J9311.0981119.
[26] Y. Bhavani, S. S. Puppala, B. J. Krishna, and S. Madarapu, “Modified AES using dynamic S-Box and DNA cryptography,” in
Proceedings of the 3rd International Conference on I-SMAC IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2019, 2019,
pp. 164–168, doi: 10.1109/I-SMAC47947.2019.9032516.
[27] A. Shakiba, “Generating dynamical S-boxes using 1D Chebyshev chaotic maps,” Journal of Computing and Security, vol. 7,
no. 1, pp. 1–17, 2020, doi: 10.22108/jcs.2020.116547.1023.
[28] M. Education, “Avalanche analysis of variant polynomials for AES,” Turkish Journal of Computer and Mathematics Education,
vol. 12, no. 14, pp. 2696–2703, 2021.
[29] Y. Alemami, M. A. Mohamed, S. Atiewi, and M. Mamat, “Speech encryption by multiple chaotic map with fast Fourier
transform,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6, pp. 5658–5664, Dec. 2020,
doi: 10.11591/ijece.v10i6.pp5658-5664.
16. Int J Elec & Comp Eng ISSN: 2088-8708
Advanced approach for encryption using advanced encryption standard with chaotic map (Yahia Alemami)
1723
[30] A. Kumar, “Effective implementation and avalanche effect of AES,” International Journal of Security, Privacy and Trust
Management, vol. 1, no. 3, pp. 31–35, Aug. 2012, doi: 10.5121/ijsptm.2012.1303.
[31] M. Faheem, S. Jamel, A. Hassan, Z. A. Pindar, N. Shafinaz, and M. Mat, “A survey on the cryptographic encryption algorithms,”
International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, pp. 333–344, 2017, doi:
10.14569/ijacsa.2017.081141.
BIOGRAPHIES OF AUTHORS
Yahia Alemami received the B.Sc. degree in Computer Science from AL
Hussein Bin Talal University, Maan, Jordan, in 2004, and the master’s degree in computer
engineering from Anadolu University, Turkey, in 2012. He worked at Al-Hussein Bin Talal
University in Jordan as a lecturer since 2013 until now. He can be contacted at email:
Yehea_m@ahu.edu.jo.
Mohamad Afendee Mohamed received the Ph.D. degree in mathematical
cryptography from Universiti Sultan Zainal Abidin, in 2012. He currently serves as an
Associate Professor for Universiti Sultan Zainal Abidin. His research interests include both
theoretical and application issues in the domain of data security, and mobile and wireless
networking. He can be contacted at email: mafendee@unisza.edu.my.
Saleh Atiewi received the B.Sc. degree in Computer Science from Al-Isra
University, Amman, Jordan, in 1999, the Master degree in Internet Technology from the
Wollongong University, Wollongong Australia, 2004, and the Ph.D. degree in Computer
Science from Tenaga Nasional University, Putrajaya, Malaysia, in 2017 Since 2004, he has
been with Al Hussein Bin Talal University, Maan, Jordan, where he is currently an Assistant
Professor with the department of Computer Science, He is currently head of Computer
Science department, His research interests are in the areas of Network Security, Cloud
computing and Internet of things. He can be contacted at email: saleh@ahu.edu.jo.