Image Encryption based on a New Generation of Key from Rubik's Cube Principle of AES Algorithm

Authors

  • Raghda Sattar Jabar Mustansiriyah University, Bagdad-Iraq
  • Iman Hussein AL-Qinani Mustansiriyah University, Bagdad-Iraq
  • Zainab Khyioon Abdalrdha Mustansiriyah University, Bagdad-Iraq

DOI:

https://doi.org/10.31695/IJERAT.2021.3684

Keywords:

Encryption, Advanced Encryption Standard, Image Encryption, Rubik’s Cube& key generation

Abstract

Encryption is the most secure way to save data, whether text, images, video, or any other type of multimedia, as in recent years, a lot of encryption algorithms have been suggested to protect this digital data from all kinds of attacks, and the protection process was carried out through encryption and the use of many algorithms. Through the proposed method, this research was focused on an important aspect, which is protecting the key by creating a new method for the algorithm key, as the more difficult it is to know the key, the more difficult it is to break the algorithm, as Rubik's Cube method was used to create the key of the AES algorithm, where it performs just throw the cube to generate the key, then the improved algorithm was used to encrypt the images and then restore the original image without problems and the process was of a high quality as the key configuration time was reduced and a good level of security was provided. The proposed method has been programmed in Visual Basic.Net 2015 language.

References

Alrababah, A. A., & Alrasheedi, M. (2017). Digital image encryption implementations based on AES algorithm. VFAST Transactions on Computer Sciences, 5(1), 09-17. https://vfast.org/journals/index.php/VTCS/index

Chowdhury, R., & Ghosh, S. (2011). Normalizer based Encryption technique (NBET) using the proposed concept of Rubicryption. International Journal of Information Technology and Knowledge Management. 4(1), 77-80. https://www.csjournals.com/?p=39

Seth, R. M., & Mishra, R. (2011). Comparative analysis of encryption algorithms for data communication. International Journal of Computer Science and Technology, 2(2), 292-294. http://www.ijcst.com/

Simarmata, J., Limbong, T., Ginting, M. BR., Damanik, R., Nasution, M. I. P., Hasugian, A. H., … Mesran, M. (2018). Implementation of AES algorithm for Information Security of Web-based application. International Journal of Engineering & Technology, 7 (3.4) 318-320. https://www.sciencepubco.com/index.php/ijet/index

Singh, G., & Supriya (2013). A Study of Encryption algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications. 67(19), 33-38. https://www.ijcaonline.org/archives/volume67/number19

Zeng, DX., Li, M., Wang, J., Hou, Y., Lu, W., & Huang, Z. (2018). Overview of Rubik’s Cube and reflections on its application in mechanism. Chinese Journal of Mechanical Engineering. 31(77),1-12. https://doi.org/10.1186/s10033-018-0269-7

Priya, S. S. S., Karthigaikumar, P., & SivaMangai, N.M. (2015). Generation of 128-Bit Blended Key for AES algorithm. In: Satapathy S., Govardhan A., Raju K., Mandal J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_47

Reddy, M. S., & Babu, Y. A. (2013). Evaluation of Microblaze and implementation of AES algorithm using Spartan-3e. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.2(7), 3341-3347. http://www.ijareeie.com/volume-2-issue-7

Acla, H. B., & Gerardo, B. (2019). Performance evaluation of lightweight advanced encryption standard hardware implementation. International Journal of Recent Technology and Engineering. 8(2),1810-1815. http://www.ijrte.org/download/volume-8-issue-2/

Mulani, A. O., & Mane, P. B. (2015). High-Speed area-efficient implementation of AES algorithm on reconfigurable platform. Sen, J. and Mehtab, S. (eds) Computer and Network Security, London, United Kingdom. 119-140. DOI: 10.5772/intechopen.82434

Downloads

Published

2021-01-20

How to Cite

Image Encryption based on a New Generation of Key from Rubik’s Cube Principle of AES Algorithm . (2021). International Journal of Engineering Research and Advanced Technology (ijerat) (E-ISSN 2454-6135) , 7(1), 8-16. https://doi.org/10.31695/IJERAT.2021.3684