Generation Initial Key of the AES Algorithm based on Randomized and Chaotic System

Authors

  • Rusul Mansoor Al-Amri Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq
  • Dalal N. Hamood Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq
  • Alaa Kadhim Farhan Department of Computer Sciences, University of Technology, Baghdad 10011, Iraq

DOI:

https://doi.org/10.55145/ajest.2023.01.01.007

Keywords:

Initial Key, Chaotic System, Randomize, NIST Tests.

Abstract

information security is a critical concern and a top priority for many communications networks. Cryptography is a suitable method of data security that can be used to maintain the secrecy and authenticity of information and can improve the privacy aspect of the data. The AES algorithm is one of the most important encryption algorithms and the best in protecting data. In this paper, a comparison was made between two different methods for the generation initial key of the key expansion of the AES-192 algorithm, in the first method, the initial key generated by the user (chose a random key by the user), and in the second method, the initial key generated by the chaotic system (which used the logistic function to generate the numbers chaotically). After testing the two methods, the second method that used a chaotic system is faster and more secure than the first method. Also, the encryption and decryption operations using the key generated by the chaotic system were faster when applying it to various sizes of text files and the plaintext is difficult to discover from the ciphertext. When comparing the proposed method to earlier experiments, it is both quicker and messier than earlier encryption techniques.

Author Biographies

Rusul Mansoor Al-Amri, Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq

Information security is a critical concern and a top priority for many communications networks. Cryptography is a suitable method of data security that can be used to maintain the secrecy and authenticity of information and can improve the privacy aspect of the data. The AES algorithm is one of the most important encryption algorithms and the best in protecting data. In this paper, a comparison was made between two different methods for the generation initial key of the key expansion of the AES-192 algorithm, in the first method, the initial key generated by the user (chose a random key by the user), and in the second method, the initial key generated by the chaotic system (which used the logistic function to generate the numbers chaotically). After testing the two methods, the second method that used a chaotic system is faster and more secure than the first method. Also, the encryption and decryption operations using the key generated by the chaotic system were faster when applying it to various sizes of text files and the plaintext is difficult to discover from the ciphertext. When comparing the proposed method to earlier experiments, it is both quicker and messier than earlier encryption techniques.

Dalal N. Hamood, Computer Department/College of Science University AL-Nahrain, Baghdad, 10001, Iraq

Information security is a critical concern and a top priority for many communications networks. Cryptography is a suitable method of data security that can be used to maintain the secrecy and authenticity of information and can improve the privacy aspect of the data. The AES algorithm is one of the most important encryption algorithms and the best in protecting data. In this paper, a comparison was made between two different methods for the generation initial key of the key expansion of the AES-192 algorithm, in the first method, the initial key generated by the user (chose a random key by the user), and in the second method, the initial key generated by the chaotic system (which used the logistic function to generate the numbers chaotically). After testing the two methods, the second method that used a chaotic system is faster and more secure than the first method. Also, the encryption and decryption operations using the key generated by the chaotic system were faster when applying it to various sizes of text files and the plaintext is difficult to discover from the ciphertext. When comparing the proposed method to earlier experiments, it is both quicker and messier than earlier encryption techniques.

Alaa Kadhim Farhan, Department of Computer Sciences, University of Technology, Baghdad 10011, Iraq

Information security is a critical concern and a top priority for many communications networks. Cryptography is a suitable method of data security that can be used to maintain the secrecy and authenticity of information and can improve the privacy aspect of the data. The AES algorithm is one of the most important encryption algorithms and the best in protecting data. In this paper, a comparison was made between two different methods for the generation initial key of the key expansion of the AES-192 algorithm, in the first method, the initial key generated by the user (chose a random key by the user), and in the second method, the initial key generated by the chaotic system (which used the logistic function to generate the numbers chaotically). After testing the two methods, the second method that used a chaotic system is faster and more secure than the first method. Also, the encryption and decryption operations using the key generated by the chaotic system were faster when applying it to various sizes of text files and the plaintext is difficult to discover from the ciphertext. When comparing the proposed method to earlier experiments, it is both quicker and messier than earlier encryption techniques.

Downloads

Published

2022-11-28

How to Cite

Mansoor Al-Amri, R., Hamood, D. N. ., & Farhan, A. K. . (2022). Generation Initial Key of the AES Algorithm based on Randomized and Chaotic System. Al-Salam Journal for Engineering and Technology, 2(1), 53–68. https://doi.org/10.55145/ajest.2023.01.01.007

Issue

Section

Articles