Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
Keywords:Advanced Encryption Standard AES, Data Encryption Standard DES, Decryption, Encryption, Keys Encryption.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms.
Received 10/4/2022, Accepted 11/9/2022, Published Online First 20/1/2023
Tang Y, Elhoseny M. Computer network security evaluation simulation model based on neural network. J Intell Fuzzy Syst 2019; 37(3): 3197–3204.
Zaman S, Alhazmi K, Aseeri MA, Ahmed Muhammad R, Khan R T, Kaiser M, et al. Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey. Ieee Access 2021; 9: 94668–94690.
Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci J. 2022: (19)4: 905-913.
Shukur WA, Badrulddin A, Nsaif MK. A proposed encryption technique of different texts using circular link lists. Period Eng Nat Sci 2021; 9(2): 1115–1123.
Wisam AS, Khalid KJ, Luheb KQ. A Proposed Hybrid Text Cryptographic Method Using Circular Queue. Int J Civ Eng Technol. 2018; 9(7): 1123-32 .
Hossen MS, Tabassum T, Islam MA, Karim R, Kobita AA, Rumi LS. Digital signature authentication using asymmetric key cryptography with different byte number. Evol Comput Mob Sustain Networks Lect Notes Data Eng Commun Technol 2021; 53.
Saepulrohman A, Ismangil A. Data integrity and security of digital signatures on electronic systems using the digital signature algorithm (DSA). Int J Electron Commun Syst 2021; 1(1): 11–15.
Kavin BP, Ganapathy S. A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. Int Arab J Inf Technol 2021; 18(2): 180–190.
Kumar Y, Munjal R, Sharma H. Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. Int J Comput Sci Manag Stud 2011; 11(03): 60–63.
Hidayat T, Mahardiko R. A Systematic literature review method on aes algorithm for data sharing encryption on cloud computing. Int J Artif Intell Res 2020; 4(1): 49–57.
Basu K, Soni D, Nabeel M, Karri R. Nist post-quantum cryptography-a hardware evaluation study. Cryptol ePrint Arch 2019; https://ia.cr/2019/047
Abdul Hussien FT, Rahma AMS, Abdul Wahab HB. A secure environment using a new lightweight AES encryption algorithm for e-commerce websites. Secur Commun Networks 2021; 2021.
Kareem SM, Rahma AMS. New method for improving add round key in the advanced encryption standard algorithm. Inf Secur J A Glob Perspect 2021; 30(6): 371–383.
Palit T, Moon JF, Monrose F, Polychronakis M. Dynpta: Combining static and dynamic analysis for practical selective data protection. IEEE Symp Secur Priv. 2021; p. 1919–1937.
Patil P, Narayankar P, Narayan DG, Meena SM. A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput Sci 2016; 78: 617–624.
Bhat B, Ali AW, Gupta A. DES and AES performance evaluation. In: IEEE Int. Conf. Comput.Comm Aut, 2015; p. 887–890.
Aljuboori AS, Coenen F, Nsaif M, Parsons DJ. Performance of case-based reasoning retrieval using classification based on associations versus Jcolibri and FreeCBR: a further validation study. J Phys Conf Ser. 2018; : 12130.
Aljuboori AS, Abdullatif FA, Mahmmed DY. The Classification of Fetus Gender Based on Fuzzy C-Mean Using a Hybrid Filter. In: Journal of Physics: Conference Series. IOP Publishing, 2021; p. 22084.
Mohammed DY, Al-Karawi K, Aljuboori A. Robust speaker verification by combining MFCC and entrocy in noisy conditions. Bull Electr Eng Inform 2021; 10(4): 2310–2319.
Aljuboori A. Enhancing case-based reasoning retrieval using classification based on associations. 2016 6th Int Conf Inf Commun Manag 2016; 52–56.
Hoomod HK, Naif JR, Ahmed IS. A new intelligent hybrid encryption algorithm for IoT data based on modified PRESENT-Speck and novel 5D chaotic system. Period Eng Nat Sci 2020; 8(4): 2333–2345.
Mahdi Ebadati OE, Eshghi F, Zamani A. A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines. Comput Model Eng Sci 2020; 122(1): 323–349.
AbdElminaam DS. Improving the security of cloud computing by building new hybrid cryptography algorithms. Int J Electron Inf Eng 2018; 8(1): 40–48.
Hao F, Anderson R, Daugman J. Combining cryptography with biometrics effectively. IEEE Trans Comput, 2006; 55(9): 1081-1088.
Ahmad MA. Protection Of The Digital Holy Quran Using IT Techniques. PhD [dissertation].Sydney: University of Malaysia; 2014. https://studentrepo.iium.edu.my/bitstream/123456789/5515/2/t00011304352AbdulateffAhmad_SEC_24.pdf
Kumar P, Parihar SS. Working Analysis of Multistage Cloud Security Algorithms. Int J Res Appl Sci Eng Technol. 2022; 10 (Issue I Jan): 1327-1338
Almuhammadi S, Al-Shaaby A. A survey on recent approaches combining cryptography and steganography. Comput Sci Inf Technol (CS IT) 2017; 7(2): 63-74.
Beenu VP. Mathematical formulation of des algorithm [J]. Int J Pure Appl Math 2018; 118(10): 363–376.
Curzon P, McOwan PW. Computational Thinking: Die Welt des algorithmischen Denkens–in Spielen, Zaubertricks und Rätseln 2018; 2th ed. St. Springer: Verlag; 229 p. https://www.amazon.com/Computational-Thinking-algorithmischen-Denkens-Zaubertricks/dp/3662567733
Khlif N, Ghorbel A, Aydi W, Masmoudi N. Generation of Chaotic Signal for Scrambling Matrix Content [J]. Int Arab J Inf Technol 2020; 17(4): 548–553.
Yang L, Yang B, Xiang C. Quantum public-key encryption schemes based on conjugate coding. arXiv Prepr arXiv11120421. 2011;
Albahar MA, Olawumi O, Haataja K, Toivanen P. Novel hybrid encryption algorithm based on AES, RSA, and TwoFish for bluetooth encryption. J inf secur 2018; 9 (2): 168-176.
Abhilasha CP, Nataraj KR. Software Implementation of AES Encryption Algorithm. Int J 2016; 6(5): 159-171.
Priya S, Karthigaikumar P, Teja NR. FPGA implementation of AES algorithm for high speed applications. Analog Integr Circuits Signal Process 2021;1–11.
Nabil M, Khalaf AA, Hassan SM. Design and implementation of pipelined and parallel AES encryption systems using FPGA. Indones J Electr Eng Comput Sci 2020; 20: 287–299.
Rajashree S, Sukumar R. CBC (Cipher Block Chaining)-Based Authenticated Encryption for Securing Sensor Data in Smart Home. In: Smart IoT for Research and Industry. Springer, 2022; p. 189–204. https://link.springer.com/chapter/10.1007/978-3-030-71485-7_12
Lu Z, Mohamed H. A Complex Encryption System Design Implemented by AES. J Inf Secur 2021; 12(2): 177–187.
Shaji N, Bonifus PL. Design of AES architecture with area and speed tradeoff. Procedia Technol 2016; 24: 1135–1140.
Kumar P, Rana SB. Development of modified AES algorithm for data security. Optik (Stuttg) 2016; 127(4): 2341–2345.
Forhad MSA, Riaz S, Hossain MS, Das M. An improvement of advanced encryption standard. Int J Comput Sci Netw Secur 2018; 18(11): 159–166.
Copyright (c) 2023 Baghdad Science Journal
This work is licensed under a Creative Commons Attribution 4.0 International License.