Published January 30, 2026 | Version CC-BY-NC-ND 4.0
Journal article Open

An Extended AES Scheme for Increasing Randomness in Ciphertext

  • 1. University for Development Studies, Tamale, Ghana.
  • 1. University for Development Studies, Tamale, Ghana.
  • 2. Associate Professor, Department of Business Computing, C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana; School of Computing and Information Sciences.
  • 3. Department of Business Computing, C. K. Tedam University of Technology and Applied Sciences, Navrongo, Ghana; School of Computing and Information Sciences.

Description

Abstract: Technological advancements, such as high-speed internet, have transformed the world into a global village, raising concerns about privacy and secrecy amid cyberattacks and the disclosure of sensitive data. Cryptography and steganography are two well-known methods of secret communication. The former distorts the message, whilst the latter hides the very existence of the information within seemingly innocent carriers. Steganography faces challenges of steganalysis, whilst cryptography faces challenges of cryptanalysis. The extensive approval of Advanced Encryption Standard (AES) as an efficient symmetric cryptographic technique and other state- of-the-art data protection techniques has exposed them to increased attacks, prompting researchers to enhance AES’s strength. To contribute to the line of research, a novel matrix-based diffusion layer for the AES (MDLAES) scheme is proposed. The proposed scheme combines matrix data manipulation with the AES algorithm, adding an extra layer of security. This extended scheme produces a data scrambling algorithm that reconstructs plain text and secret keys before performing AES encryption on the result. The approach, first and foremost, ensures that knowledge of the initial key is insufficient to break the system; it also introduces a higher degree of randomness than the traditional AES cryptosystem. The study examined the performance of encryption and decryption operations using key sizes from 128 to 256 bits. As key size increases, CPU time and memory usage increase. It is also observed that AES encryption with matrix operations requires more CPU time and memory than the traditional AES algorithm. The research improves the diffusion rate by 3.04 when a single simulation is matched with the orthodox AES algorithm, and by 1.62 on average when 10 simulations are run with different keys. It is worth noting that a high diffusion rate and a double key make it more difficult for a plain-text attack.

Files

B473115021225.pdf

Files (687.8 kB)

Name Size Download all
md5:54116308ce3f84c74267ecbb36a2e7ef
687.8 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2026-01-15
Manuscript received on 03 December 2025 | Revised Manuscript received on 19 December 2025 | Manuscript Accepted on 15 January 2026 | Manuscript published on 30 January 2026

References

  • M. A. Usman and M. R. Usman, "Using image steganography for providing enhanced medical data security," in 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, Jan. 2018, pp. 1–4. DOI: http://doi.org/10.1109/CCNC.2018.8319263.
  • E. Balsa, H. Nissenbaum, and S. Park, "Cryptography, Trust and Privacy: It's Complicated," in Proceedings of the 2022 Symposium on Computer Science and Law, New York, NY, USA: ACM, Nov. 2022, pp. 167–179. DOI: https://doi.org/10.1145/3511265.3550443
  • S. Rathore, P. K. Sharma, V. Loia, Y.-S. Jeong, and J. H. Park, "Social network security: Issues, challenges, threats, and solutions," Inf Sci (N Y), vol. 421, pp. 43–69, Dec. 2017, DOI: https://doi.org/10.1016/j.ins.2017.08.063
  • N. Mouha, "Review of the Advanced Encryption Standard," Jul. 2021. DOI: https://doi.org/10.6028/NIST.IR.8319
  • O. C. Abikoye, A. D. Haruna, A. Abubakar, N. O. Akande, and E. O. Asani, "Modified advanced encryption standard algorithm for information security," Symmetry (Basel), vol. 11, no. 12, Dec. 2019, DOI: https://doi.org/10.3390/SYM11121484
  • D. Gérault, P. Lafourcade, M. Minier, and C. Solnon, "Revisiting. This write-up hasn't received any funding by way of support. To the best of our knowledge, there are no conflicts of interest. No, participation in the article with evidence does not require ethical approval or consent. AES related-key differential attacks with constraint programming," Inf Process Lett, vol. 139, pp. 24–29, Nov. 2018, DOI: https://doi.org/10.1016/j.ipl.2018.07.001
  • H. Zodpe and A. Sapkal, "An efficient AES implementation using FPGA with enhanced security features," Journal of King Saud University - Engineering Sciences, vol. 32, no. 2, pp. 115– 122, Feb. 2020, DOI: https://doi.org/10.1016/j.jksues.2018.07.002
  • N. Kolokotronis and S. Cyber-Security Threats, and Dynamic Mitigation. Press, 2021. Accessed: 06, 2025. [Online]. Available: https://www.routledge.com/Cyber-Security-Threats-Actors-andDynamic-Mitigation/Kolokotronis-Shiaeles/p/book/9780367745875
  • D. Mercadier et P. É. Dagand, "USUBA: High-throughput and constant-time cyphers, by construction," in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Association for Computing Machinery, Jun. 2019, pp. 157–173. DOI: https://doi.org/10.1145/3314221.3314636
  • Abdalbasit Mohammed Qadir and Nurhayat Varol, "A Review Paper on Cryptography," IEEE Xplore, 2019, DOI: https://doi.org/10.1109/ISDFS.2019.8757514
  • E. A. Abanga, "Symmetric, Asymmetric and Hash Functions," Advances in Multidisciplinary and Scientific Research Journal Publication, vol. 10, no. 4, pp. 55–60, Nov. 2022, DOI: https://doi.org/10.22624/AIMS/DIGITAL/V10N4P7
  • A. Vishwanath, R. Peruri, and J. (Selena) He, "Security in Fog Computing through Encryption," International Journal of Information Technology and Computer Science, vol. 8, no. 5, pp. 28–36, May 2016, DOI: https://doi.org/10.5815/ijitcs.2016.05.03
  • A. B. L Nikhitha V S Arjun Naveen Chandra Gowda, "Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards," International Journal of Computational Learning and Intelligence, vol. 2, no. 2, 2023, DOI: https://doi.org/10.5281/ZENODO.7921019
  • D. Gerault, M. Minier, and C. Solnon, "Using Constraint Programming to solve a Cryptanalytic Problem Using Constraint Programming to solve a Cryptanalytic Problem *," 2017. [Online]. Available: https://hal.science/hal-01528272
  • H. Talirongan, A. M. Sison, and R. P. Medina, "Modified advanced encryption standard using butterfly effect," in 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management, HNICEM 2018, Institute of Electrical and Electronics Engineers Inc., Jul. 2018. DOI: https://doi.org/10.1109/HNICEM.2018.8666368
  • E. M. De Los Reyes, A. M. Sison, and R. P. Medina, "Modified AES Cypher Round and Key Schedule," Indonesian Journal of Electrical Engineering and Informatics, vol. 7, no. 1, pp. 28–35, Dec. 2019, DOI: https://doi.org/10.1109/iciibms.2018.8549995
  • R. Riyaldhi, Rojali, and A. Kurniawan, "Improvement of Advanced Encryption Standard Algorithm with Shift Row and S.Box Modification Mapping in Mix Column," in Procedia Computer Science, Elsevier B.V., 2017, pp. 401–407. DOI: https://doi.org/10.1016/j.procs.2017.10.079
  • K. S. Seethalakshmi, Usha B A, and Sangeetha K N, "Security enhancement in image steganography using neural networks and visual cryptography," in 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), IEEE, Oct. 2016, pp. 396–403. DOI: https://doi.org/10.1109/CSITSS.2016.7779393
  • A. Al-Mamun, S. S. M. Rahman, T. A. Shaon, and M. A. Hossain, "Security analysis of AES and enhancing its security by modifying s box with an additional byte," International Journal of Computer Networks and Communications, vol. 9, no. 2, pp. 69–88, Mar. 2017, DOI: https://doi.org/10.5121/ijcnc.2017.9206
  • R. M. Marzan, A. M. Sison, and R. P. Medina, "Randomness analysis on enhanced key security of Playfair cypher algorithm," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 4, pp. 1248–1253, Jul. 2019, DOI: https://doi.org/10.30534/ijatcse/2019/34842019
  • I. A. Awan, M. Shiraz, M. U. Hashmi, Q. Shaheen, R. Akhtar, and A. Ditta, "Secure Framework Enhancing AES Algorithm in Cloud Computing," Security and Communication Networks, vol. 2020, 2020, DOI: https://doi.org/10.1155/2020/8863345
  • M. Dan and R. Joseph, Interactive Linear Algebra. Georgia Institute of Technology, 2019. Accessed: Dec. 06, 2025. [Online]. Available: https://textbooks.math.gatech.edu/ila/ila.pdf