Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key...
Saved in:
| Published in | Majallat Baghdād lil-ʻulūm Vol. 20; no. 4 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
University of Baghdad, College of Science for Women
01.01.2023
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2078-8665 2411-7986 2411-7986 |
| DOI | 10.21123/bsj.2023.7315 |
Cover
| Abstract | This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms. |
|---|---|
| AbstractList | This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with Arabic and English texts with the same efficiency. The result showed that the proposed method performs faster and more securely when compared to standard DES and AES algorithms. |
| Author | Shukur, Wisam Abed Aljuboori, Ahmed Qurban, Luheb Kareem |
| Author_xml | – sequence: 1 givenname: Wisam Abed orcidid: 0000-0001-5000-5537 surname: Shukur fullname: Shukur, Wisam Abed – sequence: 2 givenname: Luheb Kareem surname: Qurban fullname: Qurban, Luheb Kareem – sequence: 3 givenname: Ahmed orcidid: 0000-0002-8224-357X surname: Aljuboori fullname: Aljuboori, Ahmed |
| BookMark | eNqFkEFLxDAQhYMouK5ePecPdM0kbZMeV3fVBUVFxWNIk3SNdJuSVGT_vakrHgTx9GaGee_Bd4T2O99ZhE6BzCgAZWd1fJtRQtmMMyj20ITmABmvRLmfZsJFJsqyOEQnMbqaQA4VUFpO0MPCrd2gWrxQg8LLTodtPzjf4efoujVW-D743kdr8Et2a4dXb_C5Gtf0Ml8-YtUZvEg6b9c-uOF1E4_RQaPaaE--dYqeL5dPF9fZzd3V6mJ-k2mWF0NmmM25gZyKJJzZyuoKDCiqCWE1WK5qquu8rFlpqGnqQhBgBW80E8IaY9gUrXa5xqs32Qe3UWErvXLy6-DDWqowON1aWaVYqKkgNhVayoU2ujQVKQpOoUx9U3S2y3rverX9UG37EwhEfgGWCbAcAcsRcHLkO4cOPsZgG6kTxpHcEJRr_7bNftn-6fkEzL-Ocw |
| CitedBy_id | crossref_primary_10_32628_IJSRSET25121171 crossref_primary_10_30526_36_4_3303 crossref_primary_10_33889_IJMEMS_2024_9_6_078 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.21123/bsj.2023.7315 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ: Directory of Open Access Journal (DOAJ) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 2411-7986 |
| ExternalDocumentID | oai_doaj_org_article_91a21b280ed14e278cdc6d9055721600 10.21123/bsj.2023.7315 10_21123_bsj_2023_7315 |
| GroupedDBID | .4S AAYXX ADBBV AFWDF ALMA_UNASSIGNED_HOLDINGS ARCSS BCNDV CITATION H13 ADTOC IPNFZ RIG UNPAY GROUPED_DOAJ |
| ID | FETCH-LOGICAL-c345t-d3e47d142847d73e9ec91d1a2c003b1e7ab2cb46b36d2dfb5801357fc388eddd3 |
| IEDL.DBID | DOA |
| ISSN | 2078-8665 2411-7986 |
| IngestDate | Fri Oct 03 12:50:29 EDT 2025 Wed Aug 20 00:22:02 EDT 2025 Thu Apr 24 22:58:15 EDT 2025 Wed Oct 01 06:38:39 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | http://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c345t-d3e47d142847d73e9ec91d1a2c003b1e7ab2cb46b36d2dfb5801357fc388eddd3 |
| ORCID | 0000-0001-5000-5537 0000-0002-8224-357X |
| OpenAccessLink | https://doaj.org/article/91a21b280ed14e278cdc6d9055721600 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_91a21b280ed14e278cdc6d9055721600 unpaywall_primary_10_21123_bsj_2023_7315 crossref_citationtrail_10_21123_bsj_2023_7315 crossref_primary_10_21123_bsj_2023_7315 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2023-01-01 |
| PublicationDateYYYYMMDD | 2023-01-01 |
| PublicationDate_xml | – month: 01 year: 2023 text: 2023-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Majallat Baghdād lil-ʻulūm |
| PublicationYear | 2023 |
| Publisher | University of Baghdad, College of Science for Women |
| Publisher_xml | – name: University of Baghdad, College of Science for Women |
| SSID | ssib014191226 ssj0002013441 ssib044752010 ssib012089588 ssib060617717 |
| Score | 2.2295685 |
| Snippet | This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the... |
| SourceID | doaj unpaywall crossref |
| SourceType | Open Website Open Access Repository Enrichment Source Index Database |
| SubjectTerms | Advanced Encryption Standard AES, Data Encryption Standard DES, Decryption, Encryption, Keys Encryption |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELem7gF44EOA6PiQH5Dgxc38kcR5bGmnadKmoVExniJ_pSt06WhToe2v352TVYCEQOLJTnSK7bPju7POvx8hb7nlBv6jlCm8nqvcvmO64JpZVVTCaQcmAY8Gjk-yw6k6Ok_Pd8jk7i6MXX8dbGAlzy68aa-bz78nETgQ0SKS0dlR0qk08YgmvzQ-ySVPE3ALIHLfzVJwyXtkd3pyOvyCxHJgAhliumFdcc7yQmcteCOEPkLGBpFCfIBf-cU4RQz_B-Tepr4y1z_MYvGT4Tl41CaIrCNeIeabfBtsGjtwN7-hOf73mB6Th51rSoet0BOyE-qn5ON4PkNeETo2jaGT2q2u4yZDY64BNfQUaRbWwdPP7DiyUdORwUcQGU7OqKk9HUM5XMyWq3lzcbl-RqYHk08fDllHw8CcVGnDvAwq94jMBkUuQxFcwT03wsGOYHnIjRXOqszKzAtf2RSMnkzzykmtg_dePie9elmHF4RymWXWO28hBlZV5oyouNRKVdIKzZ3uE3an_9J1GOVIlbEoIVaJ81WCMkucrxI11CfvtvJXLTrHHyVHOJ1bKUTVji-Wq1nZab8sYFAcerIfYLhB5Np5l_kCYcoEB8-wT95vF8Nf2tv7d9GX5D7W23OdV6TXrDbhNXg6jX3TreNb32r4oA priority: 102 providerName: Unpaywall |
| Title | Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms |
| URI | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/download/7315/4230 https://doaj.org/article/91a21b280ed14e278cdc6d9055721600 |
| UnpaywallVersion | publishedVersion |
| Volume | 20 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ: Directory of Open Access Journal (DOAJ) customDbUrl: eissn: 2411-7986 dateEnd: 20241231 omitProxy: true ssIdentifier: ssib060617717 issn: 2078-8665 databaseCode: DOA dateStart: 20040101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center) customDbUrl: eissn: 2411-7986 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044752010 issn: 2078-8665 databaseCode: M~E dateStart: 20090101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PT9swFLYQHIADYtomOqDyAWlcDPWPJM6xXYsQUhFoq8ZOkX-FgUpAbdDEZX877zltl8vEhUssW1asfH7287Od7yPkiFtuYBwlTOHvucr1HNM518yqvBROO3AJuDUwvkzPJ-riJrlpSX3hnbCGHrgB7jTnRnArdC94roLItPMu9TlSRwkO3hpn357OW8EUWBLHouQfERdXEJa0FhrIcofHwMt8io58Gdjcx-M5LlWUvRTgQxmSwjWMjxAvCXlq5_cnqDt-kknU0215tEj8v002n6sn8_LHTKctb3W2S3YWy0zabz7vA1kL1UdyPby7RY0QOjS1oaPKzV7ihEHjvQFq6BVKJsyDpz_ZOCpL04HBLFTpj75TU3k6hLQ_vX2c3dW_H-afyORs9OPbOVtIKjAnVVIzL4PKPLKsQZLJkAeXcw8QOxjdlofMWOGsSq1MvfClTcCBySQrndQ6eO_lZ7JePVZhj1Au09R65y3Es6pMnREll1qpUkJvcac7hC1hKdyCbxxlL6YFxB0RxgJgLBDGAmHskK-r-k8N08Z_aw4Q5VUtZMiOBWA3xcJuirfspkOOV330Rntf3qO9fbKFL2x2bw7Iej17DoewnqltN5ouPMd_R12yMbm86v96BT1455M |
| linkProvider | Directory of Open Access Journals |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3db9MwELem7gF44EOA6PiQH5Dgxc38kcR5bGmnadKmoVExniJ_pSt06WhToe2v352TVYCEQOLJTnSK7bPju7POvx8hb7nlBv6jlCm8nqvcvmO64JpZVVTCaQcmAY8Gjk-yw6k6Ok_Pd8jk7i6MXX8dbGAlzy68aa-bz78nETgQ0SKS0dlR0qk08YgmvzQ-ySVPE3ALIHLfzVJwyXtkd3pyOvyCxHJgAhliumFdcc7yQmcteCOEPkLGBpFCfIBf-cU4RQz_B-Tepr4y1z_MYvGT4Tl41CaIrCNeIeabfBtsGjtwN7-hOf73mB6Th51rSoet0BOyE-qn5ON4PkNeETo2jaGT2q2u4yZDY64BNfQUaRbWwdPP7DiyUdORwUcQGU7OqKk9HUM5XMyWq3lzcbl-RqYHk08fDllHw8CcVGnDvAwq94jMBkUuQxFcwT03wsGOYHnIjRXOqszKzAtf2RSMnkzzykmtg_dePie9elmHF4RymWXWO28hBlZV5oyouNRKVdIKzZ3uE3an_9J1GOVIlbEoIVaJ81WCMkucrxI11CfvtvJXLTrHHyVHOJ1bKUTVji-Wq1nZab8sYFAcerIfYLhB5Np5l_kCYcoEB8-wT95vF8Nf2tv7d9GX5D7W23OdV6TXrDbhNXg6jX3TreNb32r4oA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Digital+Data+Encryption+Using+a+Proposed+W-Method+Based+on+AES+and+DES+Algorithms&rft.jtitle=Majallat+Baghd%C4%81d+lil-%CA%BBul%C5%ABm&rft.au=Shukur%2C+Wisam+Abed&rft.au=Qurban%2C+Luheb+Kareem&rft.au=Aljuboori%2C+Ahmed&rft.date=2023-01-01&rft.issn=2078-8665&rft.eissn=2411-7986&rft_id=info:doi/10.21123%2Fbsj.2023.7315&rft.externalDBID=n%2Fa&rft.externalDocID=10_21123_bsj_2023_7315 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2078-8665&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2078-8665&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2078-8665&client=summon |