Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
نویسندگان
چکیده
This article presents a cryptographic encryption standard whose model is based on Serpent presented by Eli Biham, Ross Anderson, and Lars Knudsen. The modification lies in the design of Cipher, we have used power associative (PA) loop group permutations. proposed mathematical structure superior to Galois Field (GF) terms complexity has ability create arbitrary randomness due larger key space. method simple speedy computations, meanwhile it affirms higher security sensitivity. In contrast GF, PA-loop are non-isomorphic several Cayley table representations. validates resistance cryptanalytic attacks, particularly those targeting structures. scheme’s full description decryption measured rigorously assessed support its multimedia applications. observed speed this technique, which uses 256 bits block size 128 bits, comparable three-key triple-DES.
منابع مشابه
Image Encryption by using Modified Genetic Algorithm
Security of multimedia data is an imperative issue because of fast evolution of digital data exchanges over unsecured network. With the progress in data exchange by the electronic system, we need to secure information. In this paper 128 bit image encryption is used for securing the image. Many security issues are also concern with this exchange and sharing of information. These may be authentic...
متن کاملSeRPEnT: Secure Remote Peripheral Encryption Tunnel
Client endpoint systems are a prime target for attackers of every sophistication level. These systems take part in many transactions demanding a degree of trust that cannot be placed in a general-purpose, commodity, computer system. We propose that these sensitive transactions can be made more secure by creating a new kind of trusted path, one that connects a server directly to a client’s hardw...
متن کاملTimed Encryption and Its Application
In this paper, we propose a new notion of timed encryption, in which the encryption is secure within time t while it is totally insecure after some time T > t. We are interested in the case where t and T are both polynomial. We propose a concrete construction that is provably secure in the random oracle model. We show that it can be generically (although inefficient) constructed from a timed co...
متن کاملA Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map
Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...
متن کاملMedical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm
Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services ( i.e. , confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3261568