{"id":"https://openalex.org/W4403212919","doi":"https://doi.org/10.1109/icecet61485.2024.10698226","title":"The Advanced Encryption Standard with a Dynamic S-Box Using the RC4 Key Schedule","display_name":"The Advanced Encryption Standard with a Dynamic S-Box Using the RC4 Key Schedule","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4403212919","doi":"https://doi.org/10.1109/icecet61485.2024.10698226"},"language":"en","primary_location":{"id":"doi:10.1109/icecet61485.2024.10698226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet61485.2024.10698226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020352959","display_name":"Abdelrahman Altigani","orcid":"https://orcid.org/0000-0002-0631-5009"},"institutions":[{"id":"https://openalex.org/I119744171","display_name":"Higher Colleges of Technology","ror":"https://ror.org/00qmy9z88","country_code":"AE","type":"education","lineage":["https://openalex.org/I119744171"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Abdelrahman Altigani","raw_affiliation_strings":["Higher Colleges of Technology,Computer Information Science,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"Higher Colleges of Technology,Computer Information Science,Al Ain,UAE","institution_ids":["https://openalex.org/I119744171"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032529993","display_name":"Muhammad Rukunuddin Ghalib","orcid":"https://orcid.org/0000-0002-2786-3370"},"institutions":[{"id":"https://openalex.org/I66943878","display_name":"De Montfort University","ror":"https://ror.org/0312pnr83","country_code":"GB","type":"education","lineage":["https://openalex.org/I66943878"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Rukunuddin Ghalib","raw_affiliation_strings":["School of Engineering &#x0026; Computing, De Monfort University,Dubai,UAE"],"affiliations":[{"raw_affiliation_string":"School of Engineering &#x0026; Computing, De Monfort University,Dubai,UAE","institution_ids":["https://openalex.org/I66943878"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047415815","display_name":"Huwaida T. Elshoush","orcid":"https://orcid.org/0000-0003-0142-393X"},"institutions":[{"id":"https://openalex.org/I150406212","display_name":"University of Khartoum","ror":"https://ror.org/02jbayz55","country_code":"SD","type":"education","lineage":["https://openalex.org/I150406212"]}],"countries":["SD"],"is_corresponding":false,"raw_author_name":"Huwaida T. Elshoush","raw_affiliation_strings":["University of Khartoum,Faculty of Mathematical Sciences and Informatics,Computer Science Department,Khartoum,Sudan"],"affiliations":[{"raw_affiliation_string":"University of Khartoum,Faculty of Mathematical Sciences and Informatics,Computer Science Department,Khartoum,Sudan","institution_ids":["https://openalex.org/I150406212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059245770","display_name":"Muawia A. Elsadig","orcid":"https://orcid.org/0000-0002-2622-6724"},"institutions":[{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muawia A. Elsadig","raw_affiliation_strings":["College of Computer Science and Information Technology, Imam Abdulrahman bin Faisal University,Dammam,KSA"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Information Technology, Imam Abdulrahman bin Faisal University,Dammam,KSA","institution_ids":["https://openalex.org/I76571253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077680343","display_name":"Nashat Alrefai","orcid":"https://orcid.org/0000-0002-7304-1263"},"institutions":[{"id":"https://openalex.org/I4210121168","display_name":"Applied Scientific Research (United States)","ror":"https://ror.org/02qscpy04","country_code":"US","type":"company","lineage":["https://openalex.org/I4210121168"]},{"id":"https://openalex.org/I76571253","display_name":"Imam Abdulrahman Bin Faisal University","ror":"https://ror.org/038cy8j79","country_code":"SA","type":"education","lineage":["https://openalex.org/I76571253"]}],"countries":["SA","US"],"is_corresponding":false,"raw_author_name":"Nashat Alrefai","raw_affiliation_strings":["College of Science, Imam Abdulrahman Bin Faisal University, Basic and Applied Scientific Research Center, Imam Abdulrahman Bin Faisal University,Department of Mathematics,Dammam,KSA"],"affiliations":[{"raw_affiliation_string":"College of Science, Imam Abdulrahman Bin Faisal University, Basic and Applied Scientific Research Center, Imam Abdulrahman Bin Faisal University,Department of Mathematics,Dammam,KSA","institution_ids":["https://openalex.org/I76571253","https://openalex.org/I4210121168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020043684","display_name":"Shiraz Naserelden","orcid":"https://orcid.org/0000-0002-0995-9942"},"institutions":[{"id":"https://openalex.org/I4576418","display_name":"University of Technology Malaysia","ror":"https://ror.org/026w31v75","country_code":"MY","type":"education","lineage":["https://openalex.org/I4576418"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shiraz Naserelden","raw_affiliation_strings":["Faculty of Science, Universiti Teknologi Malaysia,Department of Mathematical Sciences,Johor,Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Universiti Teknologi Malaysia,Department of Mathematical Sciences,Johor,Malaysia","institution_ids":["https://openalex.org/I4576418"]}]}],"institutions":[],"countries_distinct_count":6,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5020352959"],"corresponding_institution_ids":["https://openalex.org/I119744171"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15319721,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9212999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9212999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6975241899490356},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6901935338973999},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.6280363202095032},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.6237242817878723},{"id":"https://openalex.org/keywords/rc4","display_name":"RC4","score":0.6163771748542786},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6091127991676331},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.5986813902854919},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.5286539196968079},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4123297929763794},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2792797088623047},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.1971677541732788},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.18363621830940247}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6975241899490356},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6901935338973999},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.6280363202095032},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.6237242817878723},{"id":"https://openalex.org/C109154458","wikidata":"https://www.wikidata.org/wiki/Q846955","display_name":"RC4","level":4,"score":0.6163771748542786},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6091127991676331},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.5986813902854919},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.5286539196968079},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4123297929763794},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2792797088623047},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.1971677541732788},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.18363621830940247},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icecet61485.2024.10698226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecet61485.2024.10698226","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2481815907","https://openalex.org/W2610378265","https://openalex.org/W2899468783","https://openalex.org/W2944350826","https://openalex.org/W2970205230","https://openalex.org/W3126295544","https://openalex.org/W4251491041","https://openalex.org/W4311478098","https://openalex.org/W4311537352","https://openalex.org/W4317039741","https://openalex.org/W4317039779","https://openalex.org/W4317543814","https://openalex.org/W4318958156","https://openalex.org/W4319080601","https://openalex.org/W4362015169","https://openalex.org/W4362238705","https://openalex.org/W4367673582","https://openalex.org/W4380985789","https://openalex.org/W4385545811","https://openalex.org/W4385666593","https://openalex.org/W4386511271","https://openalex.org/W4387186398","https://openalex.org/W4390119871","https://openalex.org/W4390586680","https://openalex.org/W4391094126","https://openalex.org/W4393110970","https://openalex.org/W4393642136","https://openalex.org/W6786582159","https://openalex.org/W6795867037"],"related_works":["https://openalex.org/W2786303832","https://openalex.org/W2059218952","https://openalex.org/W2890717930","https://openalex.org/W4253256042","https://openalex.org/W2145838615","https://openalex.org/W2363818505","https://openalex.org/W4399487526","https://openalex.org/W335574909","https://openalex.org/W2182062060","https://openalex.org/W2086278558"],"abstract_inverted_index":{"Since":[0],"the":[1,13,18,44,60,76,80,99],"inception":[2],"of":[3,104,124],"secure":[4],"communication,":[5],"safeguarding":[6],"data":[7],"confidentiality":[8,32],"has":[9],"been":[10],"paramount.":[11],"With":[12],"increased":[14],"reliance":[15],"on":[16,36],"technology,":[17],"need":[19],"for":[20,86],"robust":[21],"security":[22,68,92],"mechanisms":[23],"is":[24,49,102],"more":[25],"critical":[26],"than":[27],"ever.":[28],"This":[29],"paper":[30,61],"explores":[31],"in":[33,50],"cybersecurity,":[34],"focusing":[35],"symmetric":[37,41],"encryption":[38,88],"algorithms.":[39],"While":[40],"encryption,":[42],"particularly":[43],"Advanced":[45],"Encryption":[46],"Standard":[47],"(AES),":[48],"wide":[51],"use,":[52],"concerns":[53],"arise":[54],"regarding":[55],"its":[56,114],"static":[57],"nature.":[58],"Therefore,":[59],"introduces":[62],"a":[63,71],"dynamic":[64],"cipher,":[65],"augmenting":[66],"AES":[67,118],"by":[69],"introducing":[70],"key-dependent":[72],"S-Box.":[73],"By":[74],"leveraging":[75],"RC4":[77],"key":[78],"schedule,":[79],"proposed":[81,100],"cipher":[82,101],"generates":[83],"unique":[84],"S-Boxes":[85],"each":[87],"key,":[89],"significantly":[90],"increasing":[91],"against":[93],"non-generic":[94],"attacks.":[95],"Theoretical":[96],"analysis":[97],"demonstrates":[98],"capable":[103],"resisting":[105],"brute":[106],"force,":[107],"linear":[108],"cryptanalysis,":[109],"and":[110,122],"differential":[111],"cryptanalysis.":[112],"Furthermore,":[113],"adaptability":[115],"to":[116],"existing":[117],"implementations":[119],"ensures":[120],"practicality":[121],"ease":[123],"adoption.":[125]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
