Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security
Main Article Content
Abstract
Every platform of business uses online services and are increasing. Wired and wireless networks are becoming popular day by day. With this the sensitive data is carried over internet on daily basis. Due to rapid growth of networks, information security becomes more important. Hence, there is every chance of misleading the data by unauthorized parties. So, there is need to provide security for the data and cryptography is the science that helps in providing security. Encryption algorithm plays a crucial role in information security. This paper briefly describes a new hybrid system to enhance security. In this work along with traditional operations Lattice permutation is used in encryption process. For key generation Chaos Logistic Mapping is used that shows more resistance while breaking key by unauthorized persons. Services like online transactions may be largely protected with this type of newly proposed hybrid systems.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
S. Herbert, “A brief History of Cryptography”, An article available at hhtp://cybercrimes.net/aindex.html.
B. Reddaiah, R. Pradeep kumar Reddy, S. Hari Krishna, “Enciphering using Bit-wise logical operators and pairing function with text generated hidden key”, IJCA 90975-88870, vol. 121, No. 8, July 2015: pp. 30-35. https://doi.org/10.5120/21562-4597
S. Tanenbaum, “Modern Operating Systems”, Prentice Hall, 2003.
Basic Cryptographic Algorithms”, an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.html#Alogrithms.
P.P. Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc., 2008.
Behrouz A. Forouzan, Cryptography and Network Security, Special Edition, Tata McGraw Hill.
KHAN, “The Codebreakers”, Macmillan Publishing Company, New York, 1967.
S. William, Cryptography and Newtork Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999. Pp 23-50
Sehgal, A., Perelman, V., Kuryla, S. and Schonwalder, J.: Management of resource constrained devices in the internet of things. IEEE Communications Magazine, 50(12). (2012). https://doi.org/10.1109/MCOM.2012.6384464
John S. Birman, Volker Gebhardt and Juan Gonzalez-Meneses, Conjugacy in Garside groups 1: cycling, powers and rigidity, Groups Geom, Dynamics, 1(2007), 221-279. https://doi.org/10.4171/ggd/12
Gryak and D. Kahrobaei, The status of polycyclic group-based cryptography: A survey and open problems, Groups Complexity Cryptology, 8(2016), 171-186. https://doi.org/10.1515/gcc-2016-0013
D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi) groups in public key cryptography, Computability in Europe, LNCS, (2016), 132-141. https://doi.org/10.1007/978-3-319-40189-8_14
Mukhopadhyay, S.C. and Suryadevara, N.K.: Internet of things: Challenges and opportunities. In Internet of Things (pp. 1-17). (2014). Springer, Cham. https://doi.org/10.1007/978-3-319-04223-7_1
Yao, X., Chen, Z. and Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, (2015). Pp.104-112. https://doi.org/10.1016/j.future.2014.10.010
Ion, M., Zhang, J. and Schooler, E.M.: August. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 39-40). ACM. (2013). https://doi.org/10.1145/2491224.2491237
Baptista, M.S.: Cryptography with Chaos. Physics letters A, 240(1-2), (1998). Pp. 50-54. https://doi.org/10.1016/S0375-9601(98)00086-3
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), (2001). Pp. 6-21. https://doi.org/10.1109/7384.963463
Kotulski, Z., SZCZEPANSKI, J., Gorski, K., Paszkiewicz, A. and Zugaj, A.: Application of discrete chaotic dynamical systems in cryptography-DCC method. International Journal of Bifurcation and Chaos, 9(06), (1999). Pp. 1121-1135. https://doi.org/10.1142/S0218127499000778
Alvarez, G., Montoya, F., Romera, M. and Pastor, G.: Breaking parameter modulated chaotic secure communication system. Chaos, Solitons & Fractals, 21(4), (2004). Pp. 783-787. https://doi.org/10.1016/j.chaos.2003.12.041
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), (2001). Pp. 6-21. https://doi.org/10.1109/7384.963463
Reddaiah, B. (2019). Cryptosystem using Crossover Function and Logical Operators. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 55–59). https://doi.org/10.35940/ijeat.b3296.129219
KPELOU, M., & Kishore, K. (2019). Lightweight Security Framework for Data Outsourcing and Storage in Mobile Cloud Computing. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 2, pp. 3405–3412). https://doi.org/10.35940/ijrte.b2239.078219
Wanjau, S. K., Wambugu, G. M., & Oirere, A. M. (2022). Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 7, pp. 1–16). https://doi.org/10.35940/ijese.f2530.0610722
N.S, N., & A, S. (2020). Malware Detection using Deep Learning Methods. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 6, pp. 6–9). https://doi.org/10.35940/ijisme.f1218.046620
C.T, A., O.O, O., O.A, A., & Grace, A. M. (2023). Cryptographic Security Approach for Biometric Verification System. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 2, pp. 7–13). https://doi.org/10.54105/ijcns.c7854.113223