A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

نویسندگان

چکیده

Standard methods used in the encryption and decryption process are implemented to protect confidential data. These require many arithmetic logical operations that negatively affect performance of process. In addition, they use private keys a specific length, addition fixed length data block encryption, which may provide possibility penetration these methods, thus decreasing level security. this research paper, new method digital image cryptography is introduced. This based on using color as an image_key generate sophisticated matrix key (MPK) cannot be hacked. The proposed uses initial state set required parameters, with secret information needed key. data-block size variable, complicity MPK depends number selected rounds size. appropriate for publication Symmetry because it employs symmetrical complex encrypt decrypt images. simple yet very efficient terms throughput scalability. experiments show meets quality requirements can speed up encryption–decryption compared standard including DES, 3DES, AES, Blowfish.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forward-Security in Private-Key Cryptography

This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forward-secure pseudorandom bit generators as the central pri...

متن کامل

from linguistics to literature: a linguistic approach to the study of linguistic deviations in the turkish divan of shahriar

chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...

15 صفحه اول

Practical Security in Public-Key Cryptography

Since the appearance of public-key cryptography in Diffie-Hellman seminal paper, many schemes have been proposed, but many have been broken. Indeed, for many people, the simple fact that a cryptographic algorithm withstands cryptanalytic attacks for several years is considered as a kind of validation. But some schemes took a long time before being widely studied, and maybe thereafter being brok...

متن کامل

Dynamic Runtime Methods to Enhance Private Key Blinding

In this paper we propose new methods to blind exponents used in RSA and in elliptic curves based algorithms. Due to classical differential power analysis (DPA and CPA), a lot of countermeasures to protect exponents have been proposed since 1999 Kocher [20] and by Coron [13]. However, these blinding methods present some drawbacks regarding execution time and memory cost. It also got some weaknes...

متن کامل

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2022

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym14040664