{"id":"https://openalex.org/W2899732343","doi":"https://doi.org/10.1155/2018/9802475","title":"RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys","display_name":"RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys","publication_year":2018,"publication_date":"2018-11-06","ids":{"openalex":"https://openalex.org/W2899732343","doi":"https://doi.org/10.1155/2018/9802475","mag":"2899732343"},"language":"en","primary_location":{"id":"doi:10.1155/2018/9802475","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9802475","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/9802475.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2018/9802475.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059124651","display_name":"Rahul Saha","orcid":"https://orcid.org/0000-0003-3921-9512"},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rahul Saha","raw_affiliation_strings":["Lovely Professional University, Jalandhar-Delhi, G.T. Road, Phagwara, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Lovely Professional University, Jalandhar-Delhi, G.T. Road, Phagwara, Punjab, India","institution_ids":["https://openalex.org/I110360157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073515833","display_name":"G. Geetha","orcid":"https://orcid.org/0000-0001-7338-973X"},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"G. Geetha","raw_affiliation_strings":["Lovely Professional University, Jalandhar-Delhi, G.T. Road, Phagwara, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Lovely Professional University, Jalandhar-Delhi, G.T. Road, Phagwara, Punjab, India","institution_ids":["https://openalex.org/I110360157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075848381","display_name":"Gulshan Kumar","orcid":"https://orcid.org/0000-0003-0026-149X"},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gulshan Kumar","raw_affiliation_strings":["Lovely Professional University, Jalandhar-Delhi, G.T. Road, Phagwara, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Lovely Professional University, Jalandhar-Delhi, G.T. Road, Phagwara, Punjab, India","institution_ids":["https://openalex.org/I110360157"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007596905","display_name":"Tai-hoon Kim","orcid":"https://orcid.org/0000-0003-0117-8102"},"institutions":[{"id":"https://openalex.org/I165677929","display_name":"Sungshin Women's University","ror":"https://ror.org/0500xzf72","country_code":"KR","type":"education","lineage":["https://openalex.org/I165677929"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Tai-hoon Kim","raw_affiliation_strings":["Department of Convergence Security, Sungshin Women\u2019s University, Seongbuk-gu 02844, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Convergence Security, Sungshin Women\u2019s University, Seongbuk-gu 02844, Republic of Korea","institution_ids":["https://openalex.org/I165677929"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073515833"],"corresponding_institution_ids":["https://openalex.org/I110360157"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.2154,"has_fulltext":true,"cited_by_count":48,"citation_normalized_percentile":{"value":0.93651937,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7843294143676758},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7048835754394531},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6855098009109497},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.6074132919311523},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5107460021972656},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.4859069883823395},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44587424397468567},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42863813042640686},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39049220085144043},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3597464859485626},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34826189279556274},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12492474913597107}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7843294143676758},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7048835754394531},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6855098009109497},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.6074132919311523},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5107460021972656},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.4859069883823395},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44587424397468567},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42863813042640686},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39049220085144043},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3597464859485626},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34826189279556274},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12492474913597107},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/9802475","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9802475","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/9802475.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:99a1395731ae4094b726fdf8eb7de52f","is_oa":true,"landing_page_url":"https://doaj.org/article/99a1395731ae4094b726fdf8eb7de52f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/9802475","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/9802475","pdf_url":"https://downloads.hindawi.com/journals/scn/2018/9802475.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2899732343.pdf","grobid_xml":"https://content.openalex.org/works/W2899732343.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1497481941","https://openalex.org/W1572300106","https://openalex.org/W1966729413","https://openalex.org/W1997643618","https://openalex.org/W2031989101","https://openalex.org/W2032972350","https://openalex.org/W2067008732","https://openalex.org/W2110162979","https://openalex.org/W2110941647","https://openalex.org/W2112284176","https://openalex.org/W2148184032","https://openalex.org/W2154271831","https://openalex.org/W2196583729","https://openalex.org/W2342570382","https://openalex.org/W2345156494","https://openalex.org/W2366221705","https://openalex.org/W2401397160","https://openalex.org/W2469954170","https://openalex.org/W2549668244","https://openalex.org/W2555323242","https://openalex.org/W2562445052","https://openalex.org/W2758029476"],"related_works":["https://openalex.org/W1985115047","https://openalex.org/W2786303832","https://openalex.org/W2986543571","https://openalex.org/W2125214861","https://openalex.org/W2919954404","https://openalex.org/W2955579865","https://openalex.org/W2534971686","https://openalex.org/W2387168119","https://openalex.org/W2059218952","https://openalex.org/W3214586009"],"abstract_inverted_index":{"Advanced":[0],"Encryption":[1],"Standard":[2],"(AES)":[3],"is":[4,48,60,104,141],"a":[5,82],"standard":[6],"algorithm":[7,21,36,57],"for":[8,11],"block":[9,102],"ciphers":[10],"providing":[12],"security":[13,26,33,53],"services.":[14],"A":[15],"number":[16],"of":[17,19,30,55,73,94,139],"variations":[18],"this":[20,35,56,66,107],"are":[22],"available":[23],"in":[24,62,76,96,101,106,143],"network":[25],"domain.":[27,108],"In":[28,65],"spite":[29],"the":[31,43,52,71,74,97,116],"strong":[32],"features,":[34],"has":[37],"been":[38],"recently":[39],"broken":[40],"down":[41],"by":[42,84],"cryptanalysis":[44],"processes.":[45],"Therefore,":[46],"it":[47],"required":[49],"to":[50],"improve":[51],"strength":[54],"as":[58,124],"AES":[59,77,118,140],"popular":[61],"commercial":[63],"use.":[64],"paper,":[67],"we":[68],"have":[69,80,110],"shown":[70],"reasons":[72],"loopholes":[75],"and":[78,130],"also":[79,111],"provided":[81],"solution":[83],"using":[85],"our":[86,113,136],"Symmetric":[87],"Random":[88],"Function":[89],"Generator":[90],"(SRFG).":[91],"The":[92,132],"use":[93],"randomness":[95],"key":[98],"generation":[99],"process":[100],"cipher":[103],"novel":[105],"We":[109],"compared":[112],"results":[114,133],"with":[115],"original":[117],"based":[119],"upon":[120],"some":[121],"parameters":[122],"such":[123],"nonlinearity,":[125],"resiliency,":[126],"balancedness,":[127],"propagation":[128],"characteristics,":[129],"immunity.":[131],"show":[134],"that":[135],"proposed":[137],"version":[138],"better":[142],"withstanding":[144],"attacks.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
