Secure communication applications rely heavily on strong encryption algorithms to ensure confidentiality and integrity. Traditional AES provides robust security, but known structural patterns in the S-Box and predictable transformations in MixColumns make it a target for advanced cryptanalysis. This paper proposes an Enhanced Encryption AES (EE-AES) algorithm that replaces the MixColumns operation with a Bitwise Reverse Transposition (BRT) technique and introduces a Dynamic S-Box generated per session. These modifications increase diffusion, reduce predictability, and minimize vulnerability to algebraic attacks. The proposed system is implemented as a secure multi-platform communication application supporting encrypted text messaging. Preliminary results from the completed encryption module indicate improved randomness and stronger resistance to differential and linear analysis. Decryption implementation is in progress.
Introduction
The text presents EE-AES, an enhanced version of the Advanced Encryption Standard (AES), designed to strengthen data confidentiality and integrity for secure multi-platform communication. Standard AES is efficient but uses static structures like fixed S-Boxes and MixColumns, which can create predictable patterns exploitable by attackers. EE-AES addresses these vulnerabilities by introducing dynamic S-Box generation and Bitwise Reverse Transposition (BRT) to improve confusion, diffusion, and resistance to cryptanalysis.
Key Features and Methodology:
Dynamic S-Box Generation – The S-Box is created per session using a cryptographically strong seed and key-dependent permutations, ensuring that identical plaintexts produce different ciphertexts.
Bitwise Reverse Transposition (BRT) – Replaces MixColumns with bit-level reversal and transposition of bytes across the state matrix, improving diffusion while remaining computationally efficient.
EE-AES Encryption Flow – Follows AES rounds with added dynamic S-Box substitution and BRT steps, producing ciphertext that is highly unpredictable.
EE-AES Decryption – Uses inverse operations (inverse dynamic S-Box and reverse BRT) to recover plaintext accurately, ensuring data integrity.
Encryption ensures confidentiality; decryption guarantees correct reconstruction only for authorized users.
Results and Analysis:
Functional Validation: Successfully encrypts/decrypts files without data loss.
Security Enhancement: Stronger confusion and diffusion, high avalanche effect, resistance to linear/differential cryptanalysis and known-plaintext attacks, and improved key dependency.
Performance: Slight increase in processing time due to additional operations, but remains acceptable; memory usage is efficient.
User Interface: Simplified for file encryption/decryption with secure local processing.
Conclusion
This paper presents an enhanced AES model, EE-AES, that incorporates Dynamic S-Box generation and Bitwise Reverse Transposition to overcome structural limitations of standard AES[1][5][6].The proposed approach increases security by reducing predictability and strengthening resistance to cryptanalytic attacks. A secure communication application using EE-AES has been developed, with encryption completed and decryption in progress. Future work includes full decryption validation, performance benchmarking, and expanding support for multimedia communication.
References
[1] FIPS PUB 197, “Advanced Encryption Standard (AES),” National Institute of Standards and Technology, 2001.
[2] R. L. Rivest, “The RC5 Encryption Algorithm,” Fast Software Encryption, 1995.
[3] IEEE Reference Paper: “Secured Multi-Platform Communication Application Using Advanced Encryption Standard Algorithm,”
DOI:10.1109/ICOEI58756.2024.10716832.
[4] ResearchGate. (2022). Enhanced Efficiency of Advanced Encryption Standard (EE-AES).
[5] SpringerOpen. (2024). A new S-box pattern generation based on chaotic enhanced logistic map.
[6] MDPI Mathematics. (2023). A Novel Dynamic S-Box Generation Scheme Based on Compound Chaotic Systems.
[7] Springer, Journal of Supercomputing. (2019–2024). Secure Image Encryption Using AES with Chaotic Map-Based S-Box.
[8] ETASR. (2024). Advancing Cloud Image Security via AES Algorithm Variants.
[9] arXiv preprint. (2025). A Dual-Layer Image Encryption Framework Using Chaotic Maps + Enhanced AES.
[10] PLOS ONE. (2025). Enhancing AES Image Encryption with a Three-Dimensional Chaotic Map.
[11] ETT / ResearchGate. (2025). A Lightweight AES for Resource-Constrained IoT Devices
[12] Springer. (2025). A Systematic Review on Lightweight Security Algorithms for IoT
[13] INASS Conference Proceedings. (2023–2024). A Hybrid Algorithm for Enhancement of Data Security (RSA+DH+AES)
[14] William Stallings, Cryptography and Network Security: Principles and Practice, Pearson, 7th Edition, 2022
[15] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 5th Edition, 2021.
[16] NIST (2025). Advanced Encryption Standard (AES) – FIPS Publication 197. Available: https://csrc.nist.gov/publications/detail/fips/197/final
[17] IEEE Xplore Digital Library (2025). Cryptography and AES-related Publications. Available: https://ieeexplore.ieee.org
[18] Cryptography Research Portal (2025)