Developing a New Secret Symmetric Algorithm for Securing Wireless Applications Omar A. Dawood 1 Othman I. Hammadi 2 Thaar Kh. Asman 3 College of Arts University Of Anbar Anbar , Iraq University Of Anbar University Of Anbar thaerk20000@yahoo.com Anbar, Iraq Anbar, Iraq Omar-Abdulrahman@uoanbar.edu.iq ed.osman.ibrahim@uoanbar.edu.iq AbstractThe security of wireless protocols has been evolved and become widespread for different sectors because it is very important in daily lives and it became ubiquitous. The introduced paper includes the developing of new variant fast block cipher design for trusted wireless security protocols with a high level of security. Currently, the security of wireless become one of the hottest topics in the cryptography fields. The recent active attacks on the internet and the networks' penetration in addition to several technical troubleshooting generated a substantial concern about data transmission. For these reasons, wireless security protocols can be considered the best solution for various environments and for different applications. The bandwidth limitations and the security of ciphering design consider the main challenges of wireless issues that took a great interest from researchers and pay attention to propose successful ways to solve these problems. The present cipher proposed to handle the security of transmitted data with secure communication. The proposed cipher works with Substitution-Permutation Network (SPN) structure and with three ciphering key of 128-bit, 192-bit and 256-bit similar to the Advance Encryption Standard (AES) cipher in term of the number of rounds and the design strategy. The proposed cipher designed to be suitable for encryption the packets of data across the wireless techniques to ensure a secure band through the synchronous broadcast from the transmission’s station to the target destination. So the proposed cipher can trust the transmission media in a secure and effective way since it depends on a solid algebraic base and approvable mathematical foundation. The internal structure looks like a hybrid structure of several embedded stages from several modern ciphers. KeywordsAES Cipher, Block Cipher, Wireless Security, Wi-Fi Protected Access (WPA), Wireless Equivalent Privacy (WEP), Network Security. I. INTRODUCTION The wireless networks play a vital role in modern ubiquitous technologies via transferred data from source to target using the broadcasting radio wave. Recently the widespread utilization for the wireless techniques compared with the wired networks has taken a high interest to adopt the wireless techniques in most of the daily digital applications [1]. The wireless networks characterized by several good features like the effectiveness, flexibility and low cost. On other hand, the wireless networks transmitted the data in open space that exposing it to eavesdropping and vulnerable penetrations from intruders [2]. Data privacy is the main concern for the network security and communication systems, especially for wireless networks. There are several approaches of security methodologies for trusting the wireless infrastructure and network protocols. Since the network levels and the access control issues need compact ciphers with different visions and with different sizes [3][4]. This paper introduces a high margin of security for the security wireless protocols by implementing a new variant of the proposed symmetric cipher. The proposed cipher uses a new security strategy to trust the transmitted data and to encrypt the passwords at the access point and the router transmission devices in order to prevent the stealing of sensitive information and the secret data. Outline of the present paper: this paper is organized as follows: Section II Explains the main problem statement in this study: Section III Shows the global overview about the most common wireless security protocols: Section IV introduces the design strategy and the major stages construction of the proposed model: Section V Explains the internal structure and algebraic foundation for the round transformation: Section VI Involves the design criteria and the most cipher utilizations: The cipher analysis and the acquired results submitted in Section VII: Section VIII includes the conclusion of this study. II. THE RESEARCH PROBLEM STATEMENT The wireless networks have many restrictions compared with the wired networks represented by low data storage, low power consuming, additional cost of hardware and software in addition to several security challenges [5]. The main sensitive security issues in a wireless environment are the confidentiality, authentication, and integrity axes. The confidentiality matter comprises the encryption algorithms whether the block ciphers or stream ciphers that encrypt the transmitted packets over the network and should be secure. The most popular encryption algorithms are RC4 stream cipher and the Advance Encryption Standard (AES) block cipher [6]. From another perspective, the authentication matter involves the identification who generate a specific traffic from certain part to the intended node and verifying from its source identity to prevent an authorized access [7]. The integrity term comprises the data correction in communication networks in case of data mismatching, data corruption, noise interleaving and the most common kind of an occasional errors in data communication. The most popular integrity method is Cyclic Redundancy Check (CRC) which represents a code word of a fixed length