Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


January Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the January 2023 Edition of the journal. The last date of research paper submission is December 15, 2022.

Random Key Chaining (RKC): AES Mode of Operation

Puneet Kumar Kaushal, Rajeev Sobti, Dr. G. Geetha Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
Download full text
  1. Puneet Kumar Kaushal, Rajeev Sobti and Dr. G Geetha. Article: Random Key Chaining (RKC): AES Mode of Operation. International Journal of Applied Information Systems 1(5):39-45, February 2012. BibTeX

    	author = "Puneet Kumar Kaushal and Rajeev Sobti and Dr. G. Geetha",
    	title = "Article: Random Key Chaining (RKC): AES Mode of Operation",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 1,
    	number = 5,
    	pages = "39-45",
    	month = "February",
    	note = "Published by Foundation of Computer Science, New York, USA"


There is a compelling need for a mode of operation that can efficiently provide authenticated encryption at a higher data rate, and is capable of making use of pipelining and parallel processing. This paper describes Random Key Chaining (RKC) block cipher mode of operation that fills this need. RKC mode makes use of Deterministic Random Bit Generator (DRBG) andwith the application of DRBG every block of plaintext is being encrypted with a different key bringing it closer to one-time pad approach. The slight variation of RKC mode can be used as a confidentiality mode that can be used in application like hard-disk compression with reduced computational cost.


  1. Lipmaa, H., Rogaway, P., Wagner, D., CTR-Mode Encryption, Comments to NIST concerning AES Modes of Operations, pp. 1-3. Available online at
  2. McGrew, D. A., Nov 15, 2002, Counter Mode Security: Analysis and Recommendations, pp. 2.
  3. McGrew, D. A., Viega, J., June 2005, Galois/CTR Mode of Operation. Available online at
  4. Kohno, T., Viega, J., Whiting, D., May 27, 2003, the CWC Authenticated Encryption (Associated Data) Mode. Available online at
  5. Gopal, V., Ozturk, E., Feghali, W., Guilford, J., Wolrich, G., Dixon, M., August 2010, Optimized Galois-Counter-Mode Implementation on Intel Architecture Processors, Intel Corporation.
  6. Furguson, N., May 20, 2005, Authentication Weakness in GCM. Available online at
  7. Furguson, N.,May 20, 2005, Authentication Weakness in GCM, pp. 7-8. Available online at
  8. Black, J., Rogaway, P., Comments to NIST concerning AES Mode of Operation: A suggestion for handling Arbitrary-Length Messages with CBC-MAC, pp. 1-2, Section 2.
  9. Iwata, T., Kurosawa, K.,Dec 20, 2002, One Key CBC-MAC, Available online at
  10. Bellare, M., Rogaway, P., Wagner, D., April 13, 2003, A Conventional Authenticated-Encryption Mode, Available online at
  11. Housley, R., Whiting, D., Furguson, N., June 3, 2002, Counter with CBC-MAC, Submission to NIST Concerning AES mode of Operation. Available online at
  12., Section 2.5.
  13. Krovetz T., Rogaway P., March 21, 2011, the Software Performance of Authenticated Encryption Modes.
  14. Rogaway, P., Bellare, M., Black, J., Krovetz, T.,Aug 3, 2001, OCB: A Block Cipher Mode of Operation for Efficient Authenticated Encryption. Available online at
  15. Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication, FIPS 197, Nov 26, 2001.
  16. Barker, E., Kelsey, J., Recommendation for Random Number Generation Using Deterministic Random Bit Generators, March 2007, revised May 2011, NIST Special Publication 800-90, pp. 34-38. Available online at:
  17. Announcing Secure Hash Standard, Federal Information Processing Standards Publication, FIPS 180-2, Aug 1, 2002, pp. 18-19, 33-40.
  18. William Stallings, Cryptography and Network Security Principles and Practices, Pearson, Fourth Edition, pp. 48-49.


Random Key chaining RKC, Deterministic Random Bit Generator DRBG, Confidentiality mode, Authenticated Encryption Mode of Operation, Advanced Encryption Standard AES