Optimized Crypto Table-Based Key Generation for Enhanced Security against Brute-Force and Frequency Analysis Attacks
Optimized Crypto Table-Based Key Generation for Enhanced Security against Brute-Force and Frequency Analysis Attacks |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-7 |
||
Year of Publication : 2025 | ||
Author : Syed Usman Basha, Brintha Rajakumari S | ||
DOI : 10.14445/22315381/IJETT-V73I7P139 |
How to Cite?
Syed Usman Basha, Brintha Rajakumari S, "Optimized Crypto Table-Based Key Generation for Enhanced Security against Brute-Force and Frequency Analysis Attacks," International Journal of Engineering Trends and Technology, vol. 73, no. 7, pp.505-521, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I7P139
Abstract
Cryptographic security remains a crucial research topic due to the increasing complexity of cyber threats. Existing key generation methods are vulnerable to frequency analysis and brute-force attacks, as they often exhibit similarities. High levels of randomness in key creation are essential to strengthen encryption safeguards and protect sensitive information from cryptanalytic attacks. Existing key generation techniques frequently have predictable structures and low entropy, allowing attackers to anticipate key patterns. Frequency analysis attacks identify recurring patterns, compromising encryption security. Brute-force attacks exploit these weaknesses by systematically attempting every possible key. To address these challenges, a novel system is needed one that maintains computational efficiency while enhancing volatility and unpredictability. This study proposes an optimal key generation technique using Crypto Tables that employ dynamic yet structured modifications to increase key uncertainty. The system integrates adaptive key generation methods, non-deterministic transformation operations, and entropy enhancement techniques to minimise vulnerabilities. The primary objective of this research is to develop a robust key generation technique that enhances security against statistical analysis and brute-force attacks. The study compares the efficiency of Crypto Tables with existing methods and evaluates their ability to generate unpredictable keys. Experimental data indicate that the proposed technique effectively eliminates detectable patterns by significantly increasing key randomness. Security analyses show that higher entropy and an expanded key space enhance resistance to brute-force attacks. Comparative results demonstrate that the proposed system surpasses existing cryptographic strength and unpredictability methods.
Keywords
Cryptographic security, Key generation, Crypto tables, Brute-force attacks, Frequency analysis, Entropy enhancement, Non-deterministic mapping, Encryption mechanisms, Cyber threats, Randomness optimization.
References
[1] Sohail Saif et al., “A Secure Data Transmission Framework for IoT-Enabled Healthcare,” Heliyon, vol. 10, no. 16, pp. 1-16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ishfaq Sultan, and M. Tariq Banday, “An Energy-Efficient Encryption Technique for the Internet of Things Sensor Nodes,” International Journal of Information Technology, vol. 16, no. 4, pp. 2517-2533, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Mohammad Ubaidullah Bokhari et al., “Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher,” SN Computer Science, vol. 6, no. 2, pp. 1-19, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Arslan Shafique et al., “A Fusion of Machine Learning and Cryptography for Fast Data Encryption through Encoding High and Moderate Plaintext Information Blocks,” Multimedia Tools and Applications, vol. 84, no. 8, pp. 5349-5375, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[5] R.V. Chothe et al., “Joint Encryption and Error Correction Schemes: A Survey,” Indonesian Journal of Electrical Engineering and Informatics (IJEEI), vol. 12, no. 4, pp. 895-913, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Priyabrata Dash, Monalisa Sarma, and Debasis Samanta, “Privacy-Preserving Unique Identity Generation from Multimodal Biometric Data for Privacy and Security Applications,” Security and Privacy, vol. 7, no. 3, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Jongchan Woo, “Energy-Efficient Hardware Architectures for Enhanced Secure Communication Systems,” Doctoral Theses, Massachusetts Institute of Technology, 2024.
[Google Scholar] [Publisher Link]
[8] Shahwar Al et al., “Systematic Literature Review of Security Schemes for Data Exchange in Wireless Sensor Networks,” Authorea Preprints, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Yuxiang Peng et al., “JPEG-Compatible Joint Image Compression and Encryption Algorithm with File Size Preservation,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 20, no. 4, pp. 1-20, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Cheng-Ta Huang et al., “Hybrid Coding Table-Based Semi-Reversible Data Hiding Using Least Significant Bits and Encryption,” The Journal of Supercomputing, vol. 81, no. 1, pp. 1-31, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ravi Anand et al., “Gleeok: A Family of Low-Latency PRFS and its Applications to Authenticated Encryption,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2024, no. 2, pp. 545-587, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Hani Tawfiq Rateb Khader, “The Impact of Modern Consumer GPUs on Commonly Used Secure Password Standards,” Master Thesis, University and State Library of Saxony-Anhalt, Halle (Saale), 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Li-Xun Zhi et al., “Chaotic Video Encryption Based on DNA Coding, Confusion, and Diffusion,” International Journal of Bifurcation and Chaos, vol. 34, no. 14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Devanshi Upadhyaya, Maël Gay, and Ilia Polian, “Locking-Enabled Security Analysis of Cryptographic Circuits,” Cryptography, vol. 8, no. 1, pp. 1-25, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Qingxin Sheng et al., “An Efficient Chaotic Image Encryption Scheme using a Simultaneous Permutation-Diffusion Operation,” The Visual Computer, vol. 40, no. 3, pp. 1643-1658, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Aiguo Chen, and Yong Zhang, “A Novel Pseudo-Random Number-Assisted Fast Image Encryption Algorithm,” Multimedia Tools and Applications, vol. 83, no. 14, pp. 42349-42378, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yunkai Bai et al., “HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management,” 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO), Austin, TX, USA, pp. 105-120, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Shengtao Geng, Heng Zhang, and Xuncai Zhang, “A Hexadecimal Scrambling Image Encryption scheme Based on an Improved Four-Dimensional Chaotic System,” The Journal of Supercomputing, vol. 80, no. 18, pp. 25853-25887, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Xueming Zhang et al., “Secure Routing Strategy Based on Attribute-Based Trust Access Control in Social-Aware Networks,” Journal of Signal Processing Systems, vol. 96, no. 2, pp. 153-168, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Zain Ul Abideen et al., “An Overview of FPGA-Inspired Obfuscation Techniques,” ACM Computing Surveys, vol. 56, no. 12, pp. 1-35, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Muhammad Azeem et al., “Analyzing and Comparing the Effectiveness of Malware Detection: A Study of Machine Learning Systems,” Heliyon, vol. 10, no. 1, pp. 1-19, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Pu Sun et al., “EasyBC: A Cryptography-Specific Language for Security Analysis of Block Cyphers against Differential Cryptanalysis,” Proceedings of the ACM on Programming Languages, vol. 8, no. POPL, pp. 848-881, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Leqian Zheng, et al., “H $ _2 $ O $ _2$ $ RAM: A High-Performance Hierarchical Doubly Oblivious RAM,” arXiv Preprint, pp. 1-20, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Debdeep Mukhopadhyay, and Sayandeep Saha, Fault Attacks on Symmetric Cryptography, Embedded Cryptography, vol. 1, John Wiley & Sons, pp. 277-309, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Zain Ul Abideen, and Samuel Pagliarini, ReBO Leveraging Emerging Technologies, Reconfigurable Obfuscation Techniques for the IC Supply Chain: Using FPGA-Like Schemes for Protection of Intellectual Property, Springer, Cham, pp. 113-131, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Hyunseok Chang, and Sarit Mukherjee, “Zeta: Transparent Zero-Trust Security Add-on for RDMA,” IEEE INFOCOM 2024-IEEE Conference on Computer Communications, Vancouver, BC, Canada, pp. 1041-1050, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Leki Chom Thungon et al., “A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions,” Wireless Personal Communications, vol. 137, no. 1, pp. 153-197, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Florian Sieck et al., “Teejam: Sub-Cache-Line Leakages Strike Back,” IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2024, no. 1, pp. 457-500, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Jean-Philippe Aumasson, Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press, Inc, 2024.
[Google Scholar] [Publisher Link]
[30] Wala’a Essa Al-Ahmadi et al., “A Secure Fingerprint Hiding Technique Based on DNA Sequence and Mathematical Function,” PeerJ Computer Science, vol. 10, pp. 1-33, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Fan-feng Shi et al., “Heterogeneous Parallel Computing-Based Real-Time Chaotic Video Encryption and its Application to Drone-Oriented Secure Communication,” Chaos, Solitons & Fractals, vol. 181, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Liang Liu, Tong Wang, and Zhijun Wu, “Denial of Firewalling Attacks (DoF): Detection, Defense, and Challenge,” 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Asmita Pal et al., “Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program Traces,” ACM Transactions on Architecture and Code Optimization, vol. 21, no. 2, pp. 1-23, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Jiliang Zhang et al., “Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures,” ACM Computing Surveys, vol. 56, no. 7, pp. 1-40, 2024.
[CrossRef] [Google Scholar] [Publisher Link]