Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack

Main Article Content

Sajaa G. Mohammed
Nuhad Salim Al-Mothafar

Abstract

The use of information transfer is a major reason for the spread of information piracy, especially digital information that includes audio or other information, to preserve data. Encrypting voice messages is considered one of the most secure ways to protect information due to the difficulty of disclosing it. Our algorithm is robust, effective, efficient, and has security capabilities due to the different key lengths and block sizes (128 bits, 192 bits, or 256 bits). The Rijndael algorithm is an effective tool for encoding audio files and has won many awards. The Rijndael algorithm is compatible with many different audio formats. We will use it to encrypt WAVE files. The first step is to generate keys using the proposed method consisting of key lengths and block sizes (128 bits, 192 bits, or 256 bits). We convert the audio data into a 256 sample. After that, the cipher text will be generated for us. Once we encrypt the audio file, we will have several audio files. We will then use a proactive approach to evaluate the success of this initiative through a brute force attack to break the code. The Rijndael algorithm plays a role in this study by demonstrating the effectiveness of encryption, Reijndeal encryption, is designed to withstand brute force attacks, employs a strong key, proper encryption algorithm, secure hardware, and software to prevent side-channel attacks, and thwart cryptanalysis attempts. It also offers a cutting-edge perspective. Its primary goal is to protect data across the digital landscape during transmission, storage, and protection processes.

Article Details

How to Cite
“Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack” (2024) Journal of Engineering, 30(11), pp. 128–141. doi:10.31026/j.eng.2024.11.08.
Section
Articles

How to Cite

“Evaluation of Rijndael Algorithm for Audio Encryption by Brute Force Attack” (2024) Journal of Engineering, 30(11), pp. 128–141. doi:10.31026/j.eng.2024.11.08.

Publication Dates

Received

2024-03-11

Revised

2024-05-15

Accepted

2024-05-27

Published Online First

2024-11-01

References

Abdul-Jabbar, S.S., Abed, A.E., Mohammed, S.G. and Mohammed, F.G., 2023. Fast 128-bit multi-pass stream ciphering method. Iraqi Journal of Science, 64(5), pp. 2589-2600. https://doi.org/10.24996/ijs.2023.64.5.40

Alabaichi, A. and Altameemi, A.A., 2022. Steganography encryption secret message in video raster using DNA and chaotic map. Iraqi Journal of Science, 63(12), pp. 5534-5548. https://doi.org/10.24996/ijs.2022.63.12.38

Albahrani, E.A., Alshekly, T.K. and Lafta, S.H., 2022. A review on audio encryption algorithms using chaos maps-based techniques. Journal of Cyber Security and Mobility, 11(1), pp.53-82. https://doi.org/10.13052/jcsm2245-1439.1113

Ali N.H.M., Rahma A.M.S ,2015. An Improved AES encryption of audio wave files, THESIS P.H.D, Department of Computer Science, University of Technology, pp.22-24.

Al-Yasiri, H.A., 2004. A new protocol to design cellular systems with variable spreading factors. Journal of Engineering, 10(1), pp.1-12. https://doi.org/10.31026/j.eng.2004.01.01

Aslam, M. and Alkhaldi, A.H., 2015. A novel method of audio steganography using advanced encryption standard. Nonlinear Engineering, 4(3), pp. 155-159. https://doi.org/10.1515/nleng-2015-0018

Cheroiu, D.G., Răducanu, M. and Nitu, C.M., 2022, June. Fast image encryption algorithm based on multiple chaotic maps. In 2022 14th International Conference on Communications (COMM) (pp. 1-4). IEEE. https://doi.org/10.1109/COMM54429.2022.9817317

Daemen, J., Rijmen, V., 1998. The block cipher Rijndael, In International Conference on Smart Card Research and Advanced Applications pp. 277–284.

Easttom, W., 2021. Cryptographic hashes. Modern Cryptography: Applied Mathematics for Encryption and Information Security, pp.205-224. https://doi.org/10.1007/978-3-030-63115-4

El Hanouti, I. and El Fadili, H., 2021. Security analysis of an audio data encryption scheme based on key chaining and DNA encoding. Multimedia Tools and Applications, 80(8), pp.12077-12099. https://doi.org/10.1007/s11042-020-10153-8

ElShafee, A., 2013. A 64-bit rotor-enhanced block cipher (REBC3). International Journal of Network Security & Its Applications, 5(2), p.77. https://doi.org/10.5121/ijnsa.2013.5206

Esttaifan, B.A., 2023. A modified Vigenère Cipher based on time and Biometrics features. Journal of Engineering, 29(6), pp. 128-139. https://doi.org/10.31026/j.eng.2023.06.10

Harba, E.S.I., 2018. Advanced password authentication protection by hybrid cryptography & audio steganography. Iraqi Journal of Science, 59(1C), pp.600-606. https://doi.org/10.24996/ijs.2018.59.1C.17

Hassan, N.A., Al-Mukhtar, F.S. and Ali, E.H., 2020, November. Encrypt audio file using speech audio file as a key. In IOP Conference Series: Materials Science and Engineering. 928(3), p. 032066. IOP Publishing. https://doi.org/10.1088/1757-899X/928/3/032066

Joan, D. and Vincent, R., 2002. The design of Rijndael: AES advanced encryption standard. Information Security and Cryptography, 196.

Kakde, Y., Gonnade, P. and Dahiwale, P., 2015, March. Audio-video steganography. In 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2(6) , pp. 1-6. IEEE. https://doi.org/10.1109/ICIIECS.2015.7192885

Kedem, G. and Ishihara, Y., 1999. Brute force attack on UNIX passwords with SIMD computer. In 8th USENIX Security Symposium USENIX Security 99. 8(1), pp. 8–18.

Kordov, K., 2019. A novel audio encryption algorithm with permutation-substitution architecture. Electronics, 8(5), p. 530. https://doi.org/10.3390/electronics8050530

Li, K., Li, H. and Mund, G., 2023. A reconfigurable and compact subpipelined architecture for AES encryption and decryption. EURASIP Journal on Advances in Signal Processing, 2023(1), p.5. https://doi.org/10.1186/s13634-022-00963-3

Mahmood, N.Q., Tahir, Y.F., Hikmat, M., Abdulsatar, M.S. and Baumli, P., 2024. Experimental investigation of the surface roughness for Aluminum Alloy AA6061 in milling operation by taguchi method with the ANOVA technique. Journal of

Engineering, 30(03), pp.1-14. https://doi.org/10.31026/j.eng.2024.03.01

Majeed, A.H. and Mohammed, S.G., 2017, Using Crypto analysis policies and techniques to create strong password. Science International (Lahore), 29(6), pp. 1297-1308.

Masure, L. and Strullu, R., 2023. Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning. Journal of Cryptographic Engineering, 13(2), pp.129-147. https://doi.org/10.1007/s13389-023-00311-7

Mohammed, F.G., Athab, S.D. and Mohammed, S.G., 2021, December. Disc damage likelihood scale recognition for Glaucoma detection. In Journal of Physics: Conference Series, 2114(1), p. 012005. IOP Publishing. https://doi.org/10.1088/1742-6596/2114/1/012005

Mohammed, S.G. and Majeed, A.H., 2017. Efficient plain password cryptanalysis techniques. Iraqi Journal of Science, 58(A4), pp. 1946-1954. https://doi.org/10.24996/ijs.2017.58.4A.16

Mohammed, S.G., Abdul-Jabbar, S.S. and Mohammed, F.G., 2021, December. Art image compression based on lossless LZW hashing ciphering algorithm. In Journal of Physics: Conference Series , 2114(1), p. 012080. IOP Publishing. https://doi.org/10.1088/1742-6596/2114/1/012080

Mustafa, M., Mahmoud, M., Tagelsir, H. and Elshoush, I., 2018, September. A novel enhanced LSB algorithm for high secure audio steganography. In 2018 10th Computer Science and Electronic Engineering (CEEC) (pp. 125-130). IEEE. https://doi.org/10.1109/CEEC.2018.8674230.

Nițu, C.M., Răducanu, M. and Cheroiu, D.G., 2023. Fast speech encryption algorithm based on Arnold 3D chaotic system. In Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI, 12493, pp. 592-599. SPIE. https://doi.org/10.1117/12.2643008

Răducanu, M., Cheroiu, D.G. and Nițu, C.M., 2023, July. A Novel comparison between different composite chaotic maps applied on sound encryption. In 2023 46th International Conference on Telecommunications and Signal Processing (TSP) pp. 225-229. IEEE. https://doi.org/10.1109/TSP59544.2023.10197783

Ramalingam, M., Isa, N.A.M. and Puviarasi, R., 2020. A secured data hiding using affine transformation in video steganography. Procedia Computer Science, 171, pp. 1147-1156. https://doi.org/10.1016/j.procs.2020.04.123

Rathod, C. and Gonsai, A., 2021. Performance analysis of AES, Blowfish and Rijndael: cryptographic algorithms for audio. In Rising Threats in Expert Applications and Solutions: Proceedings of FICR-TEAS 2020, pp. 203-209. https://doi.org/10.1007/978-981-15-6014-9_24

Sethi, P. and Kapoor, V., 2016. A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Procedia Computer Science, 87, pp.61-66. https://doi.org/10.1016/j.procs.2016.05.127

Shakya, S. and Lamichhane, S., 2016. Secured crypto stegano data hiding using least significant bit substitution and encryption. Journal of Advanced College of Engineering and Management, 2, pp.105-112. https://doi.org/10.3126/jacem.v2i0.16103

Stinson, D.R., 2021. Techniques for designing and analyzing algorithms. Chapman and Hall/CRC. https://doi.org/10.1201/9780429277412

Wang, X. and Su, Y., 2019. An audio encryption algorithm based on DNA coding and chaotic system. IEEE Access, 8, pp.9260-9270. https://doi.org/10.1109/ACCESS.2019.2963329.2020.

Yaro, A.S., 2004. Surface treatment effects on the corrosion of reinforced steel in concrete exposed to dry condition. Journal of Engineering, 10(1), pp. 25-35. https://doi.org/10.31026/j.eng.2004.01.03

Similar Articles

You may also start an advanced similarity search for this article.