Multiplicative symmetric key generation based encryption for data hiding

Author(s):  
M. Hemalatha ◽  
K. Rajasekhar
2017 ◽  
Vol 6 (3) ◽  
pp. 219-227
Author(s):  
Edwin R. Arboleda ◽  
Joel L. Balaba ◽  
John Carlo L. Espineli

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.


2020 ◽  
Vol 17 (12) ◽  
pp. 5217-5223
Author(s):  
Supriya Khaitan ◽  
Shrddha Sagar ◽  
Rashi Agarwal

Now is the era of online data and transaction, all this happens on an unsecured channel. With this huge data transfer, comes the need of protecting this data. Thus, to achieve security during transmission, several symmetric key encryption algorithms have been proposed. Inspired from researchers, we propose an asymmetric key image security algorithm based on chaotic tent map integrated with Optimized Salp Swarm Algorithm (SSA) for key generation and encryption for gray scale images. Diffusion and confusion are carried out in each round to mix plain text and key to it more secure. Experimental analysis shown by SSA are encouraging and is secure enough to resist brute force, differential cryptoanalysis and key sensitivity analysis attack and is suitable for practical application.


Author(s):  
Francis H. Shajin ◽  
P. Rajesh

Multiple-Input and Multiple-Output (MIMO) technology is a significant and timely subject, which is highly motivated by the needs of 5G wireless communications. Data transmission performs MIMO, which is highly sensitive. There are several security issues while transmitting the data such as loss of data and code injection. Two efficient methods are Encryption and Data Hiding protection of data in wireless communication. This dissertation suggests FPGA Implementation of RDHS by Chaotic Key Generation-Based Paillier Cryptography with LDPC using machine learning technique. RDHS stands for Reversible Data Hiding Scheme. In a reversible method, the initial stage of preprocessing is to shrink the histogram of image before the process of encryption. Hence, the plaintext domain changing the encrypted images to data embedding cannot result from any pixel repletion. A little distortion data embedding may be taken as the original image may recover the directly decrypted image. Here, the performance metrics of throughput, area consumed, latency, delay, packet delivery, network life and overhead are calculated. The proposed Paillier homomorphic cryptosystem proposes higher network throughput as 99%, higher network life 98%, lower delay rate as 60%, packet delivery as 74%, overhead as 66%, latency as 55% and area consumed as 61% with the existing method such as McEliece, Elgamal and Elliptic curve cryptosystem in the security analysis of the proposed method providing decryption time 94% and encryption time 98% better than the existing method.


2017 ◽  
Vol 77 ◽  
pp. 136-148 ◽  
Author(s):  
L. González-Manzano ◽  
José M. de Fuentes ◽  
P. Peris-Lopez ◽  
C. Camara

Sign in / Sign up

Export Citation Format

Share Document