Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack
Main Article Content
Abstract
The use of information transfer is a major reason for the spread of information piracy, especially digital information that includes audio or other information, to preserve data. Encrypting voice messages is considered one of the most secure ways to protect information due to the difficulty of disclosing it. Our algorithm is robust, effective, efficient, and has security capabilities due to the different key lengths and block sizes (128 bits, 192 bits, or 256 bits). The Rijndael algorithm is an effective tool for encoding audio files and has won many awards. The Rijndael algorithm is compatible with many different audio formats. We will use it to encrypt WAVE files. The first step is to generate keys using the proposed method consisting of key lengths and block sizes (128 bits, 192 bits, or 256 bits). We convert the audio data into a 256 sample. After that, the cipher text will be generated for us. Once we encrypt the audio file, we will have several audio files. We will then use a proactive approach to evaluate the success of this initiative through a brute force attack to break the code. The Rijndael algorithm plays a role in this study by demonstrating the effectiveness of encryption, Reijndeal encryption, is designed to withstand brute force attacks, employs a strong key, proper encryption algorithm, secure hardware, and software to prevent side-channel attacks, and thwart cryptanalysis attempts. It also offers a cutting-edge perspective. Its primary goal is to protect data across the digital landscape during transmission, storage, and protection processes.
Article Details
Section
How to Cite
References
Abdul-Jabbar, S.S., Abed, A.E., Mohammed, S.G. and Mohammed, F.G., 2023. Fast 128-bit multi-pass stream ciphering method. Iraqi Journal of Science, 64(5), pp. 2589-2600. https://doi.org/10.24996/ijs.2023.64.5.40
Alabaichi, A. and Altameemi, A.A., 2022. Steganography encryption secret message in video raster using DNA and chaotic map. Iraqi Journal of Science, 63(12), pp. 5534-5548. https://doi.org/10.24996/ijs.2022.63.12.38
Albahrani, E.A., Alshekly, T.K. and Lafta, S.H., 2022. A review on audio encryption algorithms using chaos maps-based techniques. Journal of Cyber Security and Mobility, 11(1), pp.53-82. https://doi.org/10.13052/jcsm2245-1439.1113
Ali N.H.M., Rahma A.M.S ,2015. An Improved AES encryption of audio wave files, THESIS P.H.D, Department of Computer Science, University of Technology, pp.22-24.
Al-Yasiri, H.A., 2004. A new protocol to design cellular systems with variable spreading factors. Journal of Engineering, 10(1), pp.1-12. https://doi.org/10.31026/j.eng.2004.01.01
Aslam, M. and Alkhaldi, A.H., 2015. A novel method of audio steganography using advanced encryption standard. Nonlinear Engineering, 4(3), pp. 155-159. https://doi.org/10.1515/nleng-2015-0018
Cheroiu, D.G., Răducanu, M. and Nitu, C.M., 2022, June. Fast image encryption algorithm based on multiple chaotic maps. In 2022 14th International Conference on Communications (COMM) (pp. 1-4). IEEE. https://doi.org/10.1109/COMM54429.2022.9817317
Daemen, J., Rijmen, V., 1998. The block cipher Rijndael, In International Conference on Smart Card Research and Advanced Applications pp. 277–284.
Easttom, W., 2021. Cryptographic hashes. Modern Cryptography: Applied Mathematics for Encryption and Information Security, pp.205-224. https://doi.org/10.1007/978-3-030-63115-4
El Hanouti, I. and El Fadili, H., 2021. Security analysis of an audio data encryption scheme based on key chaining and DNA encoding. Multimedia Tools and Applications, 80(8), pp.12077-12099. https://doi.org/10.1007/s11042-020-10153-8
ElShafee, A., 2013. A 64-bit rotor-enhanced block cipher (REBC3). International Journal of Network Security & Its Applications, 5(2), p.77. https://doi.org/10.5121/ijnsa.2013.5206
Esttaifan, B.A., 2023. A modified Vigenère Cipher based on time and Biometrics features. Journal of Engineering, 29(6), pp. 128-139. https://doi.org/10.31026/j.eng.2023.06.10
Harba, E.S.I., 2018. Advanced password authentication protection by hybrid cryptography & audio steganography. Iraqi Journal of Science, 59(1C), pp.600-606. https://doi.org/10.24996/ijs.2018.59.1C.17
Hassan, N.A., Al-Mukhtar, F.S. and Ali, E.H., 2020, November. Encrypt audio file using speech audio file as a key. In IOP Conference Series: Materials Science and Engineering. 928(3), p. 032066. IOP Publishing. https://doi.org/10.1088/1757-899X/928/3/032066
Joan, D. and Vincent, R., 2002. The design of Rijndael: AES advanced encryption standard. Information Security and Cryptography, 196.
Kakde, Y., Gonnade, P. and Dahiwale, P., 2015, March. Audio-video steganography. In 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2(6) , pp. 1-6. IEEE. https://doi.org/10.1109/ICIIECS.2015.7192885
Kedem, G. and Ishihara, Y., 1999. Brute force attack on UNIX passwords with SIMD computer. In 8th USENIX Security Symposium USENIX Security 99. 8(1), pp. 8–18.
Kordov, K., 2019. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 8(5), p. 530. https://doi.org/10.3390/electronics8050530
Li, K., Li, H. and Mund, G., 2023. A reconfigurable and compact subpipelined architecture for AES encryption and decryption. EURASIP Journal on Advances in Signal Processing, 2023(1), p.5. https://doi.org/10.1186/s13634-022-00963-3
Mahmood, N.Q., Tahir, Y.F., Hikmat, M., Abdulsatar, M.S. and Baumli, P., 2024. Experimental investigation of the surface roughness for Aluminum Alloy AA6061 in milling operation by taguchi method with the ANOVA technique. Journal of
Engineering, 30(03), pp.1-14. https://doi.org/10.31026/j.eng.2024.03.01
Majeed, A.H. and Mohammed, S.G., 2017, Using Crypto analysis policies and techniques to create strong password. Science International (Lahore), 29(6), pp. 1297-1308.
Masure, L. and Strullu, R., 2023. Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning. Journal of Cryptographic Engineering, 13(2), pp.129-147. https://doi.org/10.1007/s13389-023-00311-7
Mohammed, F.G., Athab, S.D. and Mohammed, S.G., 2021, December. Disc damage likelihood scale recognition for Glaucoma detection. In Journal of Physics: Conference Series, 2114(1), p. 012005. IOP Publishing. https://doi.org/10.1088/1742-6596/2114/1/012005
Mohammed, S.G. and Majeed, A.H., 2017. Efficient plain password cryptanalysis techniques. Iraqi Journal of Science, 58(A4), pp. 1946-1954. https://doi.org/10.24996/ijs.2017.58.4A.16
Mohammed, S.G., Abdul-Jabbar, S.S. and Mohammed, F.G., 2021, December. Art image compression based on lossless LZW hashing ciphering algorithm. In Journal of Physics: Conference Series , 2114(1), p. 012080. IOP Publishing. https://doi.org/10.1088/1742-6596/2114/1/012080
Mustafa, M., Mahmoud, M., Tagelsir, H. and Elshoush, I., 2018, September. A novel enhanced LSB algorithm for high secure audio steganography. In 2018 10th Computer Science and Electronic Engineering (CEEC) (pp. 125-130). IEEE. https://doi.org/10.1109/CEEC.2018.8674230.
Nițu, C.M., Răducanu, M. and Cheroiu, D.G., 2023. Fast speech encryption algorithm based on Arnold 3D chaotic system. In Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI, 12493, pp. 592-599. SPIE. https://doi.org/10.1117/12.2643008
Răducanu, M., Cheroiu, D.G. and Nițu, C.M., 2023, July. A Novel comparison between different composite chaotic maps applied on sound encryption. In 2023 46th International Conference on Telecommunications and Signal Processing (TSP) pp. 225-229. IEEE. https://doi.org/10.1109/TSP59544.2023.10197783
Ramalingam, M., Isa, N.A.M. and Puviarasi, R., 2020. A secured data hiding using affine transformation in video steganography. Procedia Computer Science, 171, pp. 1147-1156. https://doi.org/10.1016/j.procs.2020.04.123
Rathod, C. and Gonsai, A., 2021. Performance analysis of AES, Blowfish and Rijndael: cryptographic algorithms for audio. In Rising Threats in Expert Applications and Solutions: Proceedings of FICR-TEAS 2020, pp. 203-209. https://doi.org/10.1007/978-981-15-6014-9_24
Sethi, P. and Kapoor, V., 2016. A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Procedia Computer Science, 87, pp.61-66. https://doi.org/10.1016/j.procs.2016.05.127
Shakya, S. and Lamichhane, S., 2016. Secured crypto stegano data hiding using least significant bit substitution and encryption. Journal of Advanced College of Engineering and Management, 2, pp.105-112. https://doi.org/10.3126/jacem.v2i0.16103
Stinson, D.R., 2021. Techniques for designing and analyzing algorithms. Chapman and Hall/CRC. https://doi.org/10.1201/9780429277412
Wang, X. and Su, Y., 2019. An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access, 8, pp.9260-9270. https://doi.org/10.1109/ACCESS.2019.2963329.2020.
Yaro, A.S., 2004. Surface treatment effects on the corrosion of reinforced steel in concrete exposed to dry condition. Journal of Engineering, 10(1), pp. 25-35. https://doi.org/10.31026/j.eng.2004.01.03