Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

نویسندگان

چکیده

The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box primary source non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative associative algebraic structures including Galois fields, unitary rings cyclic non-cyclic finite groups. In this paper, first non-associative ring order 512 obtained by using computational techniques, then triplet 8 × designed. motivation behind designing these upsurge robustness broaden space due non-commutative behavior structure under consideration. A novel color image encryption application anticipated which initially 3 being used produce confusion three layers standard RGB image. However, for sake diffusion 3D Arnold chaotic map proposed scheme. comparison with some existing chaos dependent schemes specs performance results observed as approaching prime level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Encryption Using Chaos and Block Cipher

In this paper, a novel image encryption scheme is proposed based on combination of pixel shuffling and new modified version of simplified AES. Chaotic baker’s map is used for shuffling and improving S-AES efficiency through S-box design. Chaos is used to expand diffusion and confusion in the image. Due to sensitivity to initial conditions, chaotic baker’s map has a good potential for designing ...

متن کامل

A Block Cipher Generation Using Color Substitution

The most powerful and common approach to countering the threats to network / information security is encryption [1]. Even though it is very powerful, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms, Keys with more number of bits (Longer ke...

متن کامل

Making Non - Associative Algebra Associative Pei

Based on results about open string correlation functions, a nonassociative algebra was proposed in a recent paper for D-branes in a background with nonvanishing H. We show that our associative algebra obtained by quantizing the endpoints of an open string in an earlier work can also be used to reproduce the same correlation functions. The novelty of this algebra is that functions on the D-brane...

متن کامل

Image Encryption Using Advanced Hill Cipher Algorithm

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, ...

متن کامل

Image encryption with compound chaotic sequence cipher shifting dynamically

We design a new two-dimensional chaotic function using two one-dimensional chaotic functions, and then prove the chaotic properties to a new function based on a strict Devaney definition. And we propose a new encrypting image scheme using the new compound chaotic function by choosing one of the two one-dimensional chaotic functions randomly. We give statistical analysis, sequence random analysi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2021

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2021.014442