Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
37 result(s) for "hill cipher"
Sort by:
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
A new hybrid text encryption approach over mobile ad hoc network
Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.
Image encryption based on novel Hill Cipher variant and 2D-IGSCM hyper-chaotic map
The Hill Cipher(HC) is a simple and fast encryption technique that is suitable for encrypting images with large data volume, but it still has some shortcomings like failing to effectively hide all image features and encrypt uniform backgrounds, and relying on the use of reversible matrices. In this paper, firstly, a new two-dimensional Iterative Gaussian Sine chaotic map(2D-IGSCM) with heightened ergodicity and unpredictability is introduced. Then, in addressing the various deficiencies of the HC, we propose an improved three-dimensional Hill Cipher(3D-HC) model where a dynamic column vector based on chaotic sequences generated by 2D-IGSCM is utilized to enhance encryption effects. Finally, based on the 2D-IGSCM and 3D-HC model, an image encryption method is proposed. Experimental results and security analysis exhibit that the proposed algorithm possesses excellent security characteristics and high efficiency.
New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z
Currently, digital communication generates a considerable amount of data from digital images. Preserving the confidentiality of these images during transmission through network channels is of crucial importance. To ensure the security of this data, this article proposes an image encryption approach based on enhancing the Hill cipher by constructing pseudo-random matrices operating in the ring Z/212Z injected into a controlled affine transformation. This approach relies on the use of chaotic maps for generating matrices used in the encryption process. The use of the ring Z/212Z aims to expand the key space of our cryptosystem, thus providing increased protection against brute-force attacks. Moreover, to enhance security against differential attacks, a matrix of size (4×4), not necessarily invertible, is also integrated into a diffusion phase. The effectiveness of our technique is evaluated through specific tests, such as key space analysis, histogram analysis, entropy calculation, NPCR and UACI values, correlation analysis, as well as avalanche effect assessment.
An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices
In the last decade, the communication of images through the internet has increased. Due to the growing demands for data transfer through images, protection of data and safe communication is very important. For this purpose, many encryption techniques have been designed and developed. New and secured encryption schemes based on chaos theory have introduced methods for secure as well as fast communication. A modified image encryption process is proposed in this work with chaotic maps and orthogonal matrix in Hill cipher. Image encryption involves three phases. In the first phase, a chaotic Henon map is used for permuting the digital image. In the second phase, a Hill cipher is used whose encryption key is generated by an orthogonal matrix which further is produced from the equation of the plane. In the third phase, a sequence is generated by a chaotic tent map which is later XORed. Chaotic maps play an important role in the encryption process. To deal with the issues of fast and highly secured image processing, the prominent properties of non-periodical movement and non-convergence of chaotic theory play an important role. The proposed scheme is resistant to different attacks on the cipher image. Different tests have been applied to evaluate the proposed technique. The results of the tests such as key space analysis, key sensitivity analysis, and information entropy, histogram correlation of the adjacent pixels, number of pixel change rate (NPCR), peak signal to noise ratio (PSNR), and unified average changing intensity (UCAI) showed that our proposed scheme is an efficient encryption technique. The proposed approach is also compared with some state-of-the-art image encryption techniques. In the view of statistical analysis, we claim that our proposed encryption algorithm is secured.
A chaos-based augmented image encryption scheme for satellite images using Fredkin logic
This article presents a novel augmented image encryption algorithm tailored for securing satellite images, addressing the critical need for robust protection of sensitive geographic data. Implementing Shannon’s principles of confusion and diffusion, the method begins by augmenting multiple plain images into a single large image, followed by a three-stage encryption process. Initially, the augmented image is separated into its three color channels, which are transformed into one-dimensional (1D) bit-streams, split and altered using the Gauss Circle map, and restructured via Fredkin Gates to enhance unpredictability. Subsequently, the bit-streams are converted into 1D bytes and matrices, processed through three systems incorporating hyperchaos-induced keys and dynamic Hill Cipher matrices for additional confusion and diffusion. The final stage combines these encrypted streams into one image while preserving the integrity of color data. The proposed method achieves strong security metrics, including an average Number of Pixels Change Rate (NPCR) of , a Unified Average Changing Intensity (UACI) of , and high entropy values (e.g., 7.9989) for encrypted images, ensuring robust resistance to differential and statistical attacks. The encryption demonstrates computational efficiency with an encryption time of 0.2817s for images and maintains a low Peak Signal-to-Noise Ratio (PSNR) of 8.1 dB, reflecting effective data obfuscation. This multistage chaos-based approach, leveraging Fredkin logic gates and hyperchaos-induced keys, significantly enhances security, scalability, and efficiency, making it ideal for high-stakes satellite imagery applications where data integrity and confidentiality are paramount.
Generation of high-order random key matrix for Hill Cipher encryption using the modular multiplicative inverse of triangular matrices
Hill Cipher is one of the classic symmetric encryption algorithms widely used in cloud data security. Although the hill cipher principle is relatively simple, its key matrix must be invertible, and all elements must be integers. However, the inverses of randomly generated matrix does not always exist and it is time-consuming to test whether the higher-order matrix is reversible. In this paper, we propose Random Key Matrix Generation Method (RKMGM), a novel algorithm to randomly generate a high order hill key matrix based on the modular multiplicative inverse of a triangular matrix. We prove that RKMGM extends the selection of key matrices from finite field to the rational number field and has no constraints on matrix order, and then analyze the time complexity of RKMGM. Compared to alternative hill key generation methods based on the involutory matrix, self-inversion matrix, and single mode, RKMGM has the advantages of simplicity, fewer constraints, one-time random generation, and high key space complexity.
Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats. Therefore, efficient cryptosystems are highly necessary for the fast and secure transmission of multimedia data. In this article, cryptanalysis is performed on an existing encryption scheme designed using elliptic curve cryptography (ECC) and a Hill cipher. The work shows that the scheme is vulnerable to brute force attacks and lacks both Shannon’s primitive operations of cryptography and Kerckchoff’s principle. To circumvent these limitations, an efficient modification to the existing scheme is proposed using an affine Hill cipher in combination with ECC and a 3D chaotic map. The efficiency of the modified scheme is demonstrated through experimental results and numerical simulations.
Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map
In today’s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor product, Hill cipher, and sigmoid logistic Map. Our proposed algorithm begins by shifting the values in each row of the state matrix to the left by a predetermined number of positions, then encrypting the resulting image using the Hill Cipher. The top value of each odd or even column is used to perform an xor operation with all values in the corresponding even or odd column, excluding the top value. The resulting image is then diffused using a sigmoid logistic map and subjected to the Kronecker xor product operation among the pixels to create a secure image. The image is then diffused again with other keys from the sigmoid logistic map for the final product. We compared our proposed method to recent work and found it to be safe and efficient in terms of performance after conducting statistical analysis, differential attack analysis, brute force attack analysis, and information entropy analysis. The results demonstrate that our proposed method is robust, lightweight, and fast in performance, meets the requirements for encryption and decryption, and is resistant to various attacks.