An Enhanced and Adaptive Algorithm for Secure Encryption of Data using Advanced Encryption
DOI:
https://doi.org/10.25195/ijci.v51i2.599Keywords:
Rijndael algorithm, Advanced Encryption Standard (AES), Polyalphabetic substitution, Avalanche effect.Abstract
Because of new multimedia types and advances in technology, protecting data has become extremely valuable. Because of the changes happening around us, cryptography continues to protect information that is crucial for security. Security methods and systems are continually being improved, but we should continue to review data protection methods while data travel through different services. One of the reasons data systems are secure today is because of encryption which makes plaintext into ciphertext. It examines the strengths and weaknesses of various cryptographic algorithms using what has been written by other authors. This paper reviews the use of cryptography in several literatures to make data security better nowadays. Data is protected using encryption during online and other transfers, yet the information may be obtained from an unauthorized attacker who is persistent enough. Two or more approaches to security should be combined, according to what is highlighted in the article. AES encryption and decryption can be improved by adding other algorithms such as the replacement algorithm. AES is used in this study to safeguard a message before it is presented. In 1998, Rijmen and Daemen designed the AES algorithm and named it Rijndael. Many people have started using it because its security is strong and it is not easily broken using brute force. The technique is applied on the plaintext of the AES algorithm. Thanks to this approach, breaking the encryption is extremely difficult, as you need the right key, though AES itself remains a simple system. The performances of both Advanced Encryption Standard and its modified option were tested after they were put into practice. There was an avalanche of 54.69% with the new version of Advanced Encryption Standard compared to the 50.78% observed in the standard AES. The strong encryption
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Iraqi Journal for Computers and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
IJCI applies the Creative Commons Attribution (CC BY) license to articles. The author of the submitted paper for publication by IJCI has the CC BY license. Under this Open Access license, the author gives an agreement to any author to reuse the article in whole or part for any purpose, even for commercial purposes. Anyone may copy, distribute, or reuse the content as long as the author and source are properly cited. This facility helps in re-use and ensures that journal content is available for the needs of research.
If the manuscript contains photos, images, figures, tables, audio files, videos, etc., that the author or the co-authors do not own, IJCI will require the author to provide the journal with proof that the owner of that content has given the author written permission to use it, and the owner has approved that the CC BY license being applied to content. IJCI provides a form that the author can use to ask for permission from the owner. If the author does not have owner permission, IJCI will ask the author to remove that content and/or replace it with other content that the author owns or has such permission to use.
Many authors assume that if they previously published a paper through another publisher, they have the right to reuse that content in their PLOS paper, but that is not necessarily the case – it depends on the license that covers the other paper. The author must ascertain the rights he/she has of a specific license (a license that enables the author to use the content). The author must obtain written permission from the publisher to use the content in the IJCI paper. The author should not include any content in her/his IJCI paper without having the right to use it, and always give proper attribution.
The accompanying submitted data should be stated with licensing policies, the policies should not be more restrictive than CC BY.
IJCI has the right to remove photos, captures, images, figures, tables, illustrations, audio, and video files, from a paper before or after publication, if these contents were included in the author's paper without permission from the owner of the content.







