An Extended AES Scheme for Increasing Randomness in Ciphertext

Main Article Content

Ushawu Ibrahim
Edem Kwedzo Bankas
Callistus Ireneous Nakpih

Abstract

Technological advancements, such as high-speed internet, have transformed the world into a global village, raising concerns about privacy and secrecy amid cyberattacks and the disclosure of sensitive data. Cryptography and steganography are two well-known methods of secret communication. The former distorts the message, whilst the latter hides the very existence of the information within seemingly innocent carriers. Steganography faces challenges of steganalysis, whilst cryptography faces challenges of cryptanalysis. The extensive approval of Advanced Encryption Standard (AES) as an efficient symmetric cryptographic technique and other state- of-the-art data protection techniques has exposed them to increased attacks, prompting researchers to enhance AES’s strength. To contribute to the line of research, a novel matrix-based diffusion layer for the AES (MDLAES) scheme is proposed. The proposed scheme combines matrix data manipulation with the AES algorithm, adding an extra layer of security. This extended scheme produces a data scrambling algorithm that reconstructs plain text and secret keys before performing AES encryption on the result. The approach, first and foremost, ensures that knowledge of the initial key is insufficient to break the system; it also introduces a higher degree of randomness than the traditional AES cryptosystem. The study examined the performance of encryption and decryption operations using key sizes from 128 to 256 bits. As key size increases, CPU time and memory usage increase. It is also observed that AES encryption with matrix operations requires more CPU time and memory than the traditional AES algorithm. The research improves the diffusion rate by 3.04 when a single simulation is matched with the orthodox AES algorithm, and by 1.62 on average when 10 simulations are run with different keys. It is worth noting that a high diffusion rate and a double key make it more difficult for a plain-text attack.

Downloads

Download data is not yet available.

Article Details

Section

Articles

How to Cite

[1]
Ushawu Ibrahim, Edem Kwedzo Bankas, and Callistus Ireneous Nakpih , Trans., “An Extended AES Scheme for Increasing Randomness in Ciphertext”, IJIES, vol. 13, no. 1, pp. 22–29, Jan. 2026, doi: 10.35940/ijies.B4731.13010126.
Share |

References

M. A. Usman and M. R. Usman, “Using image steganography for providing enhanced medical data security,” in 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, Jan. 2018, pp. 1–4.

DOI: http://doi.org/10.1109/CCNC.2018.8319263.

E. Balsa, H. Nissenbaum, and S. Park, “Cryptography, Trust and Privacy: It’s Complicated,” in Proceedings of the 2022 Symposium on Computer Science and Law, New York, NY, USA: ACM, Nov. 2022, pp. 167–179. DOI: https://doi.org/10.1145/3511265.3550443

S. Rathore, P. K. Sharma, V. Loia, Y.-S. Jeong, and J. H. Park, “Social network security: Issues, challenges, threats, and solutions,” Inf Sci (N Y), vol. 421, pp. 43–69, Dec. 2017, DOI: https://doi.org/10.1016/j.ins.2017.08.063

N. Mouha, “Review of the Advanced Encryption Standard,” Jul. 2021. DOI: https://doi.org/10.6028/NIST.IR.8319

O. C. Abikoye, A. D. Haruna, A. Abubakar, N. O. Akande, and E. O. Asani, “Modified advanced encryption standard algorithm for information security,” Symmetry (Basel), vol. 11, no. 12, Dec. 2019, DOI:https://doi.org/10.3390/SYM11121484

D. Gérault, P. Lafourcade, M. Minier, and C. Solnon, “Revisiting. This write-up hasn’t received any funding by way of support. To the best of our knowledge, there are no conflicts of interest. No, participation in the article with evidence does not require ethical approval or consent. AES related-key differential attacks with constraint programming,” Inf Process Lett, vol. 139, pp. 24–29, Nov. 2018, DOI: https://doi.org/10.1016/j.ipl.2018.07.001

H. Zodpe and A. Sapkal, “An efficient AES implementation using FPGA with enhanced security features,” Journal of King Saud University - Engineering Sciences, vol. 32, no. 2, pp. 115– 122, Feb. 2020, DOI: https://doi.org/10.1016/j.jksues.2018.07.002

N. Kolokotronis and S. Cyber-Security Threats, and Dynamic Mitigation. Press, 2021. Accessed: 06, 2025. [Online]. Available: https://www.routledge.com/Cyber-Security-Threats-Actors-and-Dynamic-Mitigation/Kolokotronis-Shiaeles/p/book/9780367745875

D. Mercadier et P. É. Dagand, “USUBA: High-throughput and constant-time cyphers, by construction,” in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Association for Computing Machinery, Jun. 2019, pp. 157–173. DOI: https://doi.org/10.1145/3314221.3314636

Abdalbasit Mohammed Qadir and Nurhayat Varol, “A Review Paper on Cryptography,” IEEE Xplore, 2019,

DOI: https://doi.org/10.1109/ISDFS.2019.8757514

E. A. Abanga, “Symmetric, Asymmetric and Hash Functions,” Advances in Multidisciplinary and Scientific Research Journal Publication, vol. 10, no. 4, pp. 55–60, Nov. 2022, DOI: https://doi.org/10.22624/AIMS/DIGITAL/V10N4P7

A. Vishwanath, R. Peruri, and J. (Selena) He, “Security in Fog Computing through Encryption,” International Journal of Information Technology and Computer Science, vol. 8, no. 5, pp. 28–36, May 2016, DOI: https://doi.org/10.5815/ijitcs.2016.05.03

A. B. L Nikhitha V S Arjun Naveen Chandra Gowda, “Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards,” International Journal of Computational Learning and Intelligence, vol. 2, no. 2, 2023,DOI: https://doi.org/10.5281/ZENODO.7921019

D. Gerault, M. Minier, and C. Solnon, “Using Constraint Programming to solve a Cryptanalytic Problem Using Constraint Programming to solve a Cryptanalytic Problem *,” 2017. [Online]. Available: https://hal.science/hal01528272

H. Talirongan, A. M. Sison, and R. P. Medina, “Modified advanced encryption standard using butterfly effect,” in 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management, HNICEM 2018, Institute of Electrical and Electronics Engineers Inc., Jul. 2018. DOI: https://doi.org/10.1109/HNICEM.2018.8666368

E. M. De Los Reyes, A. M. Sison, and R. P. Medina, “Modified AES Cypher Round and Key Schedule,” Indonesian Journal of Electrical Engineering and Informatics, vol. 7, no. 1, pp. 28–35, Dec. 2019,

DOI: https://doi.org/10.1109/iciibms.2018.8549995

R. Riyaldhi, Rojali, and A. Kurniawan, “Improvement of Advanced Encryption Standard Algorithm with Shift Row and S.Box Modification Mapping in Mix Column,” in Procedia Computer Science, Elsevier B.V., 2017, pp. 401–407.

DOI: https://doi.org/10.1016/j.procs.2017.10.079

K. S. Seethalakshmi, Usha B A, and Sangeetha K N, “Security enhancement in image steganography using neural networks and visual cryptography,” in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), IEEE, Oct. 2016, pp. 396–403. DOI: https://doi.org/10.1109/CSITSS.2016.7779393

A. Al-Mamun, S. S. M. Rahman, T. A. Shaon, and M. A. Hossain, “Security analysis of AES and enhancing its security by modifying s-box with an additional byte,” International Journal of Computer Networks and Communications, vol. 9, no. 2, pp. 69–88, Mar. 2017, DOI: https://doi.org/10.5121/ijcnc.2017.9206

R. M. Marzan, A. M. Sison, and R. P. Medina, “Randomness analysis on enhanced key security of Playfair cypher algorithm,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 4, pp. 1248–1253, Jul. 2019, DOI: https://doi.org/10.30534/ijatcse/2019/34842019

I. A. Awan, M. Shiraz, M. U. Hashmi, Q. Shaheen, R. Akhtar, and A. Ditta, “Secure Framework Enhancing AES Algorithm in Cloud Computing,” Security and Communication Networks, vol. 2020, 2020, DOI: https://doi.org/10.1155/2020/8863345

M. Dan and R. Joseph, Interactive Linear Algebra. Georgia Institute of Technology, 2019. Accessed: Dec. 06, 2025. [Online]. Available: https://textbooks.math.gatech.edu/ila/ila.pdf

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>