Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm
With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and da...
        Saved in:
      
    
          | Published in | International journal of computer network and information security Vol. 7; no. 4; pp. 14 - 20 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Hong Kong
          Modern Education and Computer Science Press
    
        08.03.2015
     | 
| Online Access | Get full text | 
| ISSN | 2074-9090 2074-9104 2074-9104  | 
| DOI | 10.5815/ijcnis.2015.04.02 | 
Cover
| Abstract | With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution. | 
    
|---|---|
| AbstractList | With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution. | 
    
| Author | Mohammad, Omer K. Jasim M. Salem, Abdel-Badeeh M. El-Horbaty, El-Sayed Abbas, Safia  | 
    
| Author_xml | – sequence: 1 givenname: Omer K. Jasim surname: Mohammad fullname: Mohammad, Omer K. Jasim – sequence: 2 givenname: Safia surname: Abbas fullname: Abbas, Safia – sequence: 3 givenname: El-Sayed surname: M. El-Horbaty fullname: M. El-Horbaty, El-Sayed – sequence: 4 givenname: Abdel-Badeeh surname: M. Salem fullname: M. Salem, Abdel-Badeeh  | 
    
| BookMark | eNqFkEtPwzAQhC0EEqX0B3CzxDnFzzg5VlUpFa2QeJwt23EaV6ldnLSo_56UwIUD7GVXq5nR6LsC5z54C8ANRmOeYX7nNsa7ZkwQ5mPExoicgQFBgiU5Ruz850Y5ugSjptmgblKOqaAD8LzwPhxU6w4WrmxbhQKWIcKZr5Q3zq_hoz3CufU2dprgofIFXCmv1nZrfQudh21l4WT2kkzqdYiurbbX4KJUdWNH33sI3u5nr9OHZPk0X0wny8TgFJOEc2qxSUvCkC2U0STXLNNU6VQbkXOtu49iiqO8FEXONMszRUVmaSlMRpmgQ0D63L3fqeOHqmu5i26r4lFiJE9gZA9GnsBIxCQinem2N-1ieN_bppWbsI--6ymxSHORpULQTiV6lYmhaaItpXHtF4A2Klf_mY9_Of_v9Am7_oiW | 
    
| CitedBy_id | crossref_primary_10_37394_23207_2021_18_143 crossref_primary_10_32628_IJSRSET196550 crossref_primary_10_4018_IJOCI_2017100105  | 
    
| ContentType | Journal Article | 
    
| Copyright | Copyright Modern Education and Computer Science Press Mar 2015 | 
    
| Copyright_xml | – notice: Copyright Modern Education and Computer Science Press Mar 2015 | 
    
| CorporateAuthor | Al-Ma’arif University College, Ramadi, +964, Iraq | 
    
| CorporateAuthor_xml | – name: Al-Ma’arif University College, Ramadi, +964, Iraq | 
    
| DBID | AAYXX CITATION 3V. 7XB 8AL 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ BVBZV CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY  | 
    
| DOI | 10.5815/ijcnis.2015.04.02 | 
    
| DatabaseName | CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Advanced Technologies & Aerospace Database ProQuest Central Essentials ProQuest Central Technology Collection East & South Asia Database ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database (Proquest) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall  | 
    
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection East & South Asia Database Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni)  | 
    
| DatabaseTitleList | Publicly Available Content Database | 
    
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering | 
    
| EISSN | 2074-9104 | 
    
| EndPage | 20 | 
    
| ExternalDocumentID | 10.5815/ijcnis.2015.04.02 3968780201 10_5815_ijcnis_2015_04_02  | 
    
| GroupedDBID | .DC 5VS 8FE 8FG AAYXX ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BENPR BGLVJ BPHCQ BVBZV CCPQU CITATION DWQXO GNUQQ HCIFZ K6V K7- KQ8 KWQ OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC PUEGO V3M 3V. 7XB 8AL 8FK JQ2 M0N PKEHL PQEST PQUKI PRINS Q9U ADTOC UNPAY  | 
    
| ID | FETCH-LOGICAL-c1612-553e1c6f240edacb29b48b3ab6bc795bbb29a4a509f7d94b498a378e3f7c83473 | 
    
| IEDL.DBID | BENPR | 
    
| ISSN | 2074-9090 2074-9104  | 
    
| IngestDate | Tue Aug 19 21:57:09 EDT 2025 Mon Jul 14 07:39:12 EDT 2025 Wed Oct 01 03:00:07 EDT 2025 Thu Apr 24 23:01:07 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | true | 
    
| Issue | 4 | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c1612-553e1c6f240edacb29b48b3ab6bc795bbb29a4a509f7d94b498a378e3f7c83473 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| OpenAccessLink | https://www.proquest.com/docview/1769786773?pq-origsite=%requestingapplication%&accountid=15518 | 
    
| PQID | 1769786773 | 
    
| PQPubID | 2026671 | 
    
| PageCount | 7 | 
    
| ParticipantIDs | unpaywall_primary_10_5815_ijcnis_2015_04_02 proquest_journals_1769786773 crossref_citationtrail_10_5815_ijcnis_2015_04_02 crossref_primary_10_5815_ijcnis_2015_04_02  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2015-03-08 | 
    
| PublicationDateYYYYMMDD | 2015-03-08 | 
    
| PublicationDate_xml | – month: 03 year: 2015 text: 2015-03-08 day: 08  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Hong Kong | 
    
| PublicationPlace_xml | – name: Hong Kong | 
    
| PublicationTitle | International journal of computer network and information security | 
    
| PublicationYear | 2015 | 
    
| Publisher | Modern Education and Computer Science Press | 
    
| Publisher_xml | – name: Modern Education and Computer Science Press | 
    
| SSID | ssj0000651373 | 
    
| Score | 1.9055413 | 
    
| Snippet | With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most... | 
    
| SourceID | unpaywall proquest crossref  | 
    
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database  | 
    
| StartPage | 14 | 
    
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1dT9swFLW28rDxsI1tiA42-YGnTWZp7NjOY4WKKBMVgnViT5E_oVAMoi0Ifj3XicuHkDZtT_mQYyk5N_K59vG5CK3LLPcQG4owxylhlnkifSEJz4Rx3HJT6pgo7g749pDtHBaHaRd_UlWeOTMhtQq0XskfnZgwmqQDuRIksO_9nc1B_4D8EmTACGSG1r9EC7wANt5CC8PBXvd3rCkXpYZlVk-zNOeQejQLm4XsFKnHqO4qarfT_OnQ9MA3X83Chbq5VuPxo6Fn6y1S8w08jeLkdGM21Rvm9rmf43-_1Tv0JvFS3G0CaQm9cOE9WnzkVvgB7fdTBdUrh3frwtMYGC_uhePo2RGO8A93gxsb64g2VsHiB3UNHgUMZBN3ewekOz46vxxNj88-ouFW7-fmNkklGYgBaghpa0Fdx3APPMBZZXReaiY1VZprI8pCa7ijmAIW4oUtmWalVFRIR70wkjJBl1ErnAe3gnDHauuA_GW5BRYhmRKGWeOgofeK6qyNsjkalUl-5bFsxriCvCUCWDUfr4oAVhmrsryNvt4_ctGYdfyp8doc4ir9t5OqIzik1VwI2kbf7mH_e2ef_qn1KnodL2opm1xDrenlzH0GbjPVX1L43gG3sff1 priority: 102 providerName: Unpaywall  | 
    
| Title | Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm | 
    
| URI | https://www.proquest.com/docview/1769786773 http://www.mecs-press.org/ijcnis/ijcnis-v7-n4/IJCNIS-V7-N4-2.pdf  | 
    
| UnpaywallVersion | publishedVersion | 
    
| Volume | 7 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2074-9104 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000651373 issn: 2074-9104 databaseCode: KQ8 dateStart: 20090101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVPQU databaseName: East & South Asia Database customDbUrl: eissn: 2074-9104 dateEnd: 20201231 omitProxy: false ssIdentifier: ssj0000651373 issn: 2074-9104 databaseCode: BVBZV dateStart: 20091001 isFulltext: true titleUrlDefault: https://search.proquest.com/eastsouthasia providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2074-9104 dateEnd: 20201231 omitProxy: true ssIdentifier: ssj0000651373 issn: 2074-9104 databaseCode: BENPR dateStart: 20091001 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2074-9104 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000651373 issn: 2074-9104 databaseCode: 8FG dateStart: 20091001 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3PT9swFH6CcmAcpo0foqxDPnBiikhix3YO09RO7dgQFWIUMS6RfwU6daZsZRP__Z7TpGUXdrIUvfjw7Ph9z-_l-wAOZJyWuDdUxBynEbOsjGSZyYjHwjhuucl1SBRPh_x4xL5cZVcrMGz-hQltlc2ZWB3U9s6EO_KjRHBMeLgQ9MP0PgqqUaG62khoqFpawb6vKMZWYS0NzFgtWOv1h2fni1sXDLgJrcrOaWhEzOO8LnVmMsmOxt-NHwcO7ySr-E_Tf4PVEoGuP_ipevyjJpMnwWjwCl7WKJJ058v-Glac34SNJ9yCW3D-udY7_e3IaSUTTRCfkr6_DQwb_oacuEcyJ50Oa0OUt2TZC0PGniA0JN3-16g7uUFHzG5_bMNo0L_4eBzVAgqRQSCHSWZGXWJ4iVHbWWV0mmsmNVWaayPyTGt8ophCzFAKmzPNcqmokI6WwkjKBN2Blr_zbhdIYrV1CNXi1GLMl0wJw6xxaFiWiuq4DXHjqcLU7OJB5GJSYJYRnFvMnVsE5xYxK-K0DYeLV6Zzao3njDuN-4v6K_tVLPdEG94tluT_k-09P9kbeBFsq04z2YHW7OeDe4vQY6b3YVUOPu3XuyqMl73rSxxHw7Put79A2Nwx | 
    
| linkProvider | ProQuest | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NbxMxEB2V9lA4ID7VlAI-wAW06u7au_YeKhQgVUKbCJVW6s34a9ug1A00peqf47cx3niTcimnXlf2HJ5nPW_s8RuANyLNa_QNlTBX0oRZVieiLkRSpty40pam0iFRHI7K_hH7clwcr8Cf9i1MKKts98Rmo7bnJpyRb2e8xISn5Jx-mP5MQteocLvattBQsbWC3WkkxuLDjj13fYUp3MXO4DOu99s83-0dfuonsctAYpDtYCZWUJeZssbQ5qwyOq80E5oqXWrDq0Jr_KKYwsBac1sxzSqhKBeO1twIyjhFu_dgjVFWYfK39rE3-nqwOOXBAJ_R5po7D4WPVVrFq9VCZMX2-Ifx46AZnhWN3mr-b3BcMt71Sz9V11dqMrkR_HYfwcPIWkl37maPYcX5J_DghpbhUzgYxP6qvx0ZNm2pCfJh0vOnQdHDnxCEicxFroMvEOUtWdbekLEnSEVJt_ct6U5OEPjZ6dkzOLoTKJ_Dqj_3bgNIZrV1SA3T3CLHEExxw6xxOLCuFdVpB9IWKWmimnloqjGRmNUEcOUcXBnAlSmTad6Bd4sp07mUx22Dt1r4ZfyrL-TSBzvwfrEk_ze2ebux17DePxzuy_3BaO8F3A_zmio3sQWrs1-X7iXSnpl-FX2LwPe7due_-KoVCw | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1dT9swFLW28rDxsI1tiA42-YGnTWZp7NjOY4WKKBMVgnViT5E_oVAMoi0Ifj3XicuHkDZtT_mQYyk5N_K59vG5CK3LLPcQG4owxylhlnkifSEJz4Rx3HJT6pgo7g749pDtHBaHaRd_UlWeOTMhtQq0XskfnZgwmqQDuRIksO_9nc1B_4D8EmTACGSG1r9EC7wANt5CC8PBXvd3rCkXpYZlVk-zNOeQejQLm4XsFKnHqO4qarfT_OnQ9MA3X83Chbq5VuPxo6Fn6y1S8w08jeLkdGM21Rvm9rmf43-_1Tv0JvFS3G0CaQm9cOE9WnzkVvgB7fdTBdUrh3frwtMYGC_uhePo2RGO8A93gxsb64g2VsHiB3UNHgUMZBN3ewekOz46vxxNj88-ouFW7-fmNkklGYgBaghpa0Fdx3APPMBZZXReaiY1VZprI8pCa7ijmAIW4oUtmWalVFRIR70wkjJBl1ErnAe3gnDHauuA_GW5BRYhmRKGWeOgofeK6qyNsjkalUl-5bFsxriCvCUCWDUfr4oAVhmrsryNvt4_ctGYdfyp8doc4ir9t5OqIzik1VwI2kbf7mH_e2ef_qn1KnodL2opm1xDrenlzH0GbjPVX1L43gG3sff1 | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Innovative+Method+for+Enhancing+Key+Generation+and+Management+in+the+AES-Algorithm&rft.jtitle=International+journal+of+computer+network+and+information+security&rft.au=Jasim+Mohammad%2C+Omer+K&rft.au=Abbas%2C+Safia&rft.au=El-Horbaty%2C+El-Sayed+M&rft.au=Salem%2C+Abdel-Badeeh+M&rft.date=2015-03-08&rft.pub=Modern+Education+and+Computer+Science+Press&rft.issn=2074-9090&rft.eissn=2074-9104&rft.volume=7&rft.issue=4&rft.spage=14&rft_id=info:doi/10.5815%2Fijcnis.2015.04.02&rft.externalDocID=3968780201 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2074-9090&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2074-9090&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2074-9090&client=summon |