This article through to the symmetrical secret key and asymmetric contrast and secret key system requirements analysis identified on the basis of AES encryption mode choice,in describing the AES encryption principle i...
详细信息
This article through to the symmetrical secret key and asymmetric contrast and secret key system requirements analysis identified on the basis of AES encryption mode choice,in describing the AES encryption principle introduced before AES encryption used knowledge of number theory,namely the finite field addition and multiplication *** the next round of AES encryption of byte replace operation,line shift operation,columns,confusion and rounds of secret key addition operation phases one by one,mainly around the security of the AES ascension to *** through an 8 X 8 involution hadamard matrix column confusion to replace the original AES operation link used in the cycle of 4 * 4 matrix,so that the spread of the original branch number raised from 5 to 9,achieved better diffusion ability,at the same time also reduce the burden of the inverse confused column *** experiment proves that the enhancement of diffusion ability does not cause excessive time cost for encryption and decryption performance.
Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration pr...
详细信息
ISBN:
(数字)9781728154237
ISBN:
(纸本)9781728154244
Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration process even during emergencies, such as a patient healthcare record at the hospital. In this case study, patient data should only be accessed and known by people who have rights. So it is necessary for the security of data storage such as cryptography algorithms. The algorithm needed for patient cards is an algorithm that has fast processing capability and a high level of security. So the aim of this study is to implement the Tiny encryption algorithm on Smart Cards. Based on the results of testing in this study the time of encrypting patient data with a total of 600 lines of patient history measuring 30.6 Kb produces an average encryption time of 20.17 ms. While the decryption for the same data takes 17.21 ms which shows very little processing time and the tolerance for waiting time for accessing data. Furthermore, the Avalanche Effect test carried out in the TEA encryption process results 77%, where these results indicate that encrypted data has very random cipher-text results so that the data contents are kept confidential with a high level of security. The results of testing the processing time and AE can be concluded that TEA is an algorithm that has a fast data security process with high security and time that can be tolerated by users.
Advanced encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) is the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper analyzes the AES algorithm and S-...
详细信息
ISBN:
(纸本)9781424458653
Advanced encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) is the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper analyzes the AES algorithm and S-box structure, then the replace plan based on S-box structure is proposed to improve AES encryption algorithm, secondly the ECC algorithm is been discussed. Based on this we put forward an mix encryption scheme of improved AES and ECC. This plan has high operation *** security performance and strong usability.
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key inst...
详细信息
ISBN:
(纸本)9781728123264
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key instead of been utilized directly. Second, both original image and derived chaotic signals are divided into bit signals form pixel values. In addition, high bits and low bits are also separated. Third, the high bits and low bits are scrambled with different methods at the same time and combined bit signals after scrambling are used to get the final results by global diffusion. At last, the image is encrypted and a corresponding decryption is designed to recover the encrypt image. In the simulation, properties including key space, information entropy, correlation analysis, key sensitivity and resistance to differential attack are provided to show the effectiveness and robustness of the high secure image encryption algorithm.
Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encryp...
详细信息
ISBN:
(纸本)9781467317139
Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encrypt images. Simulation results and security analysis are provided to show the encryption performance of the proposed algorithm.
A new image encryption algorithm based on three levels and multilayer scramble is proposed in this *** scrambling schemes can be divided into primary, intermediate and advanced levels, with gradually increasing securi...
详细信息
A new image encryption algorithm based on three levels and multilayer scramble is proposed in this *** scrambling schemes can be divided into primary, intermediate and advanced levels, with gradually increasing security. The key parameters of different levels are encrypted by Elliptic Curve Cryptography (ECC). We analyzed and verified the security, reliability and efficiency of this algorithm with an elaborate experiment. The experimental results and subsequent analysis indicate that this new algorithm possesses a large key space and high level security, and that time needed for decrypting the interactive image tends to +. It provides a new method to satisfy the practical secure requirements of interactive information in the fields of aerospace, military, finance and economy, national security and so on.
A new image encryption algorithm based on pixels is proposed in this paper. All the strategies, programs, parameters, encryption and decryption steps and other key technologies arc given in detail. First, scrambling t...
详细信息
A new image encryption algorithm based on pixels is proposed in this paper. All the strategies, programs, parameters, encryption and decryption steps and other key technologies arc given in detail. First, scrambling the image pixels, then through the method of watermark increasing the difficulty' of its decoded. At last, choose a camouflaged image to vision or the pixels of the true image, getting the final encryption image. The key parameters arc encrypted by Elliptic Curve Cryptography (ECC). We verify and analyze the algorithm security, reliability and efficiency with an experiment. The experiment results and algorithm analyses indicate that the new algorithm possesses a large key space and high level security and the time needed for encrypting the interactive image tends to +∞. It provides a new access to satisfy high level security of interactive information requirements in the fields of aerospace, military, confidential, financial and economic, national security and so on.
The security situation of mobile communication becomes even more grim, at present, the complete bug-free secure communications system solutions has not been found. For the realization of the end to end secure encrypte...
详细信息
The security situation of mobile communication becomes even more grim, at present, the complete bug-free secure communications system solutions has not been found. For the realization of the end to end secure encrypted communication of speech, this paper proposes a speech encryption algorithm, which can penetrate compression encoder. The algorithm scrambles the speech signal in frequency domain based on FFT transformation domain in the sender, and it decrypts and reconstructs the signal in the receiving end. The encrypted speech signal still has the characteristics of speech, The residual intelligibility of the speech is low enough and the speech bandwidth does not be widen. Scramble matrix can meet the needs of speech transmission security and achieve one key for one secret communication flexibly. End-to-end communication can avoid the common eavesdropping and theft, and has a relatively broad prospects for development.
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box...
详细信息
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining. The paper also considers an optimization technique to advance the efficiency of key selection and calculation. We discuss the possibility to obtain good results by applying the peculiar properties of cryptographic primitives in the Galois field. To increase the strength and speed of the encryption algorithm, we used a nonpositional polynomial notation and an indexed view for the Galois field. The paper provides for statistical properties of the ciphertext obtained with the developed algorithm. We also present the results of differential and linear cryptanalysis of the S-box used.
We propose a new and efficient method to develop secure image-encryption techniques. The new algorithm combines two techniques: encryption and compression. In this technique, a wavelet transform was used to decompose ...
详细信息
We propose a new and efficient method to develop secure image-encryption techniques. The new algorithm combines two techniques: encryption and compression. In this technique, a wavelet transform was used to decompose the image and decorrelate its pixels into approximation and detail components. The more important component (the approximation component) is encrypted using a chaos-based encryption algorithm. This algorithm produces a cipher of the test image that has good diffusion and confusion properties. The remaining components (the detail components) are compressed using a wavelet transform. This proposed algorithm was verified to provide a high security level. A complete specification for the new algorithm is provided. Several test images are used to demonstrate the validity of the proposed algorithm. The results of several experiments show that the proposed algorithm for image cryptosystems provides an efficient and secure approach to real-time image encryption and transmission.
暂无评论