Image Encryption based on a New Generation of Key from Rubik's Cube Principle of AES Algorithm
Keywords:Encryption, Advanced Encryption Standard, Image Encryption, Rubik’s Cube& key generation
Encryption is the most secure way to save data, whether text, images, video, or any other type of multimedia, as in recent years, a lot of encryption algorithms have been suggested to protect this digital data from all kinds of attacks, and the protection process was carried out through encryption and the use of many algorithms. Through the proposed method, this research was focused on an important aspect, which is protecting the key by creating a new method for the algorithm key, as the more difficult it is to know the key, the more difficult it is to break the algorithm, as Rubik's Cube method was used to create the key of the AES algorithm, where it performs just throw the cube to generate the key, then the improved algorithm was used to encrypt the images and then restore the original image without problems and the process was of a high quality as the key configuration time was reduced and a good level of security was provided. The proposed method has been programmed in Visual Basic.Net 2015 language.
Alrababah, A. A., & Alrasheedi, M. (2017). Digital image encryption implementations based on AES algorithm. VFAST Transactions on Computer Sciences, 5(1), 09-17. https://vfast.org/journals/index.php/VTCS/index
Chowdhury, R., & Ghosh, S. (2011). Normalizer based Encryption technique (NBET) using the proposed concept of Rubicryption. International Journal of Information Technology and Knowledge Management. 4(1), 77-80. https://www.csjournals.com/?p=39
Seth, R. M., & Mishra, R. (2011). Comparative analysis of encryption algorithms for data communication. International Journal of Computer Science and Technology, 2(2), 292-294. http://www.ijcst.com/
Simarmata, J., Limbong, T., Ginting, M. BR., Damanik, R., Nasution, M. I. P., Hasugian, A. H., … Mesran, M. (2018). Implementation of AES algorithm for Information Security of Web-based application. International Journal of Engineering & Technology, 7 (3.4) 318-320. https://www.sciencepubco.com/index.php/ijet/index
Singh, G., & Supriya (2013). A Study of Encryption algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67(19), 33-38. https://www.ijcaonline.org/archives/volume67/number19
Zeng, DX., Li, M., Wang, J., Hou, Y., Lu, W., & Huang, Z. (2018). Overview of Rubik’s Cube and reflections on its application in mechanism. Chinese Journal of Mechanical Engineering. 31(77),1-12. https://doi.org/10.1186/s10033-018-0269-7
Priya, S. S. S., Karthigaikumar, P., & SivaMangai, N.M. (2015). Generation of 128-Bit Blended Key for AES algorithm. In: Satapathy S., Govardhan A., Raju K., Mandal J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_47
Reddy, M. S., & Babu, Y. A. (2013). Evaluation of Microblaze and implementation of AES algorithm using Spartan-3e. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.2(7), 3341-3347. http://www.ijareeie.com/volume-2-issue-7
Acla, H. B., & Gerardo, B. (2019). Performance evaluation of lightweight advanced encryption standard hardware implementation. International Journal of Recent Technology and Engineering. 8(2),1810-1815. http://www.ijrte.org/download/volume-8-issue-2/
Mulani, A. O., & Mane, P. B. (2015). High-Speed area-efficient implementation of AES algorithm on reconfigurable platform. Sen, J. and Mehtab, S. (eds) Computer and Network Security, London, United Kingdom. 119-140. DOI: 10.5772/intechopen.82434
How to Cite
Copyright (c) 2021 Raghda Sattar Jabar, Iman Hussein AL-Qinani , Zainab Khyioon Abdalrdha
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.