Image Encryption based on a New Generation of Key from Rubik's Cube Principle of AES Algorithm


  • Raghda Sattar Jabar Mustansiriyah University, Bagdad-Iraq
  • Iman Hussein AL-Qinani Mustansiriyah University, Bagdad-Iraq
  • Zainab Khyioon Abdalrdha Mustansiriyah University, Bagdad-Iraq



Encryption, Advanced Encryption Standard, Image Encryption, Rubik’s Cube& key generation


Encryption is the most secure way to save data, whether text, images, video, or any other type of multimedia, as in recent years, a lot of encryption algorithms have been suggested to protect this digital data from all kinds of attacks, and the protection process was carried out through encryption and the use of many algorithms. Through the proposed method, this research was focused on an important aspect, which is protecting the key by creating a new method for the algorithm key, as the more difficult it is to know the key, the more difficult it is to break the algorithm, as Rubik's Cube method was used to create the key of the AES algorithm, where it performs just throw the cube to generate the key, then the improved algorithm was used to encrypt the images and then restore the original image without problems and the process was of a high quality as the key configuration time was reduced and a good level of security was provided. The proposed method has been programmed in Visual Basic.Net 2015 language.


Alrababah, A. A., & Alrasheedi, M. (2017). Digital image encryption implementations based on AES algorithm. VFAST Transactions on Computer Sciences, 5(1), 09-17.

Chowdhury, R., & Ghosh, S. (2011). Normalizer based Encryption technique (NBET) using the proposed concept of Rubicryption. International Journal of Information Technology and Knowledge Management. 4(1), 77-80.

Seth, R. M., & Mishra, R. (2011). Comparative analysis of encryption algorithms for data communication. International Journal of Computer Science and Technology, 2(2), 292-294.

Simarmata, J., Limbong, T., Ginting, M. BR., Damanik, R., Nasution, M. I. P., Hasugian, A. H., … Mesran, M. (2018). Implementation of AES algorithm for Information Security of Web-based application. International Journal of Engineering & Technology, 7 (3.4) 318-320.

Singh, G., & Supriya (2013). A Study of Encryption algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67(19), 33-38.

Zeng, DX., Li, M., Wang, J., Hou, Y., Lu, W., & Huang, Z. (2018). Overview of Rubik’s Cube and reflections on its application in mechanism. Chinese Journal of Mechanical Engineering. 31(77),1-12.

Priya, S. S. S., Karthigaikumar, P., & SivaMangai, N.M. (2015). Generation of 128-Bit Blended Key for AES algorithm. In: Satapathy S., Govardhan A., Raju K., Mandal J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham.

Reddy, M. S., & Babu, Y. A. (2013). Evaluation of Microblaze and implementation of AES algorithm using Spartan-3e. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.2(7), 3341-3347.

Acla, H. B., & Gerardo, B. (2019). Performance evaluation of lightweight advanced encryption standard hardware implementation. International Journal of Recent Technology and Engineering. 8(2),1810-1815.

Mulani, A. O., & Mane, P. B. (2015). High-Speed area-efficient implementation of AES algorithm on reconfigurable platform. Sen, J. and Mehtab, S. (eds) Computer and Network Security, London, United Kingdom. 119-140. DOI: 10.5772/intechopen.82434



How to Cite

Raghda Sattar Jabar, Iman Hussein AL-Qinani, & Zainab Khyioon Abdalrdha. (2021). Image Encryption based on a New Generation of Key from Rubik’s Cube Principle of AES Algorithm . International Journal of Engineering Research and Advanced Technology - IJERAT (ISSN: 2454-6135), 7(1), 8-16.