Have a personal or library account? Click to login
A Novel AES-Based Encryption Model with Multi-Feature Security Enhancements Cover

A Novel AES-Based Encryption Model with Multi-Feature Security Enhancements

Open Access
|Nov 2025

References

  1. Alslman, Y.S., Ahmad, A. and AbuHour, Y. (2023) Enhanced and authenticated cipher block chaining mode. Bulletin of Electrical Engineering and Informatics, 12(4), 2357–2362. DOI:10.11591/eei.v12i4.5113.
  2. Anyanwu, A., Olorunsogo, T., Abrahams, T., Akindote, O., Reis, O. (2024) Data confidentiality and integrity: a review of accounting and cybersecurity controls in superannuation organizations. Computer Science & IT Research Journal, 5(1), 237–253. DOI:10.51594/csitrj.v5i1.735.
  3. Arman, M.S., Mamun, S.A. and Jannat, N. (2024) A modified AES based approach for data integrity and data origin authentication. In: Proceedings of 2024 3rd International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE), Gazipur, April 2024. IEEE, 106. DOI:10.1109/ICAEEE62219.2024.10561750.
  4. Awan, I. A., Shiraz, M., Hashmi, M.U., Shaheen, Q., Akhtar, R., Ditta, A. (2020) Secure framework enhancing AES algorithm in cloud computing. Security and Communication Networks, 1-6, 8863345. DOI: 10.1155/2020/8863345.
  5. Cryptography.io. (2024) Cryptography Hazmat Primitives: Symmetric Encryption. Available at: https://cryptography.io/en/latest/hazmat/primitives/symmetric-encryption/#cryptography.hazmat.primitives.ciphers.Cipher (Accessed: 18 November 2024).
  6. D’souza, F.J. and Panchal, D. (2017) Advanced encryption standard (AES) security enhancement using hybrid approach. In: Proceedings of International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, May 2017. IEEE, 647-652. DOI:10.1109/CCAA.2017.8229881.
  7. Fatima, K., Nawaz, S. and Mehrban, S. (2019) Biometric authentication in health care sector: A survey. In: Proceedings of International Conference on Innovative Computing (ICIC), Lahore, Pakistan. IEEE, 1-10, DOI: 10.1109/ICIC48496.2019.8966699.
  8. Kaggle. (2020) Moby Dick. Available at: https://www.kaggle.com/datasets/razetime/moby-dicktext.
  9. Lee, S.W. and Sim, K.B. (2021) Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security. Electronics, 10(9), 1127. DOI: 10.3390/electronics10091127.
  10. Mohammad, H.M. and Abdullah, A.A. (2022) Enhancement process of AES: a lightweight cryptography algorithm-AES for constrained devices. TELKOMNIKA (Telecommunication Computing Electronics and Control), 20(3), 551–560. DOI:10.12928/telkomnika.v20i3.23297.
  11. Mohammed, Z.A., Gheni, H.,l., Hussein, Z., Al-Qurabat, A. (2024) Advancing cloud image security via AES algorithm enhancement techniques. Engineering, Technology & Applied Science Research, 14(1), 12694–12701. DOI:10.48084/etasr.6601.
  12. Mossa, E. (2017) Security enhancement for AES encrypted speech in communications. International Journal of Speech Technology, 20(1), 163–169. DOI:10.1007/s10772-017-9395-3.
  13. Mukhopadhyay, D., Sonawane, G., Gupta, P., Bhavsar, S., Mittal, V. (2013) Enhanced security for cloud storage using file encryption. DOI:10.48550/arXiv.1303.7075.
  14. Zodpe, H. and Sapkal, A. (2020) An efficient AES implementation using FPGA with enhanced security features. Journal of King Saud University – Engineering Sciences, 32(2), 115–122. DOI:10.1016/j.jksues.2018.07.002.
DOI: https://doi.org/10.2478/ttj-2025-0028 | Journal eISSN: 1407-6179 | Journal ISSN: 1407-6160
Language: English
Page range: 362 - 372
Published on: Nov 21, 2025
Published by: Transport and Telecommunication Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2025 Mohammad Awis Al Lababede, Ashraf M A Ahmad, published by Transport and Telecommunication Institute
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.