Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security

Main Article Content

Thoti. Sasikala
Kanusu. Srinivasa Rao
Buduri. Reddaiah
Bodi. Susheel Kumar

Abstract

Every platform of business uses online services and are increasing. Wired and wireless networks are becoming popular day by day. With this the sensitive data is carried over internet on daily basis. Due to rapid growth of networks, information security becomes more important. Hence, there is every chance of misleading the data by unauthorized parties. So, there is need to provide security for the data and cryptography is the science that helps in providing security. Encryption algorithm plays a crucial role in information security. This paper briefly describes a new hybrid system to enhance security. In this work along with traditional operations Lattice permutation is used in encryption process. For key generation Chaos Logistic Mapping is used that shows more resistance while breaking key by unauthorized persons. Services like online transactions may be largely protected with this type of newly proposed hybrid systems.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Thoti. Sasikala, Kanusu. Srinivasa Rao, Buduri. Reddaiah, and Bodi. Susheel Kumar , Trans., “Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security”, IJEAT, vol. 13, no. 4, pp. 34–38, Apr. 2024, doi: 10.35940/ijeat.D4441.13040424.
Section
Articles

How to Cite

[1]
Thoti. Sasikala, Kanusu. Srinivasa Rao, Buduri. Reddaiah, and Bodi. Susheel Kumar , Trans., “Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security”, IJEAT, vol. 13, no. 4, pp. 34–38, Apr. 2024, doi: 10.35940/ijeat.D4441.13040424.
Share |

References

S. Herbert, “A brief History of Cryptography”, An article available at hhtp://cybercrimes.net/aindex.html.

B. Reddaiah, R. Pradeep kumar Reddy, S. Hari Krishna, “Enciphering using Bit-wise logical operators and pairing function with text generated hidden key”, IJCA 90975-88870, vol. 121, No. 8, July 2015: pp. 30-35. https://doi.org/10.5120/21562-4597

S. Tanenbaum, “Modern Operating Systems”, Prentice Hall, 2003.

Basic Cryptographic Algorithms”, an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.html#Alogrithms.

P.P. Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc., 2008.

Behrouz A. Forouzan, Cryptography and Network Security, Special Edition, Tata McGraw Hill.

KHAN, “The Codebreakers”, Macmillan Publishing Company, New York, 1967.

S. William, Cryptography and Newtork Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999. Pp 23-50

Sehgal, A., Perelman, V., Kuryla, S. and Schonwalder, J.: Management of resource constrained devices in the internet of things. IEEE Communications Magazine, 50(12). (2012). https://doi.org/10.1109/MCOM.2012.6384464

John S. Birman, Volker Gebhardt and Juan Gonzalez-Meneses, Conjugacy in Garside groups 1: cycling, powers and rigidity, Groups Geom, Dynamics, 1(2007), 221-279. https://doi.org/10.4171/ggd/12

Gryak and D. Kahrobaei, The status of polycyclic group-based cryptography: A survey and open problems, Groups Complexity Cryptology, 8(2016), 171-186. https://doi.org/10.1515/gcc-2016-0013

D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi) groups in public key cryptography, Computability in Europe, LNCS, (2016), 132-141. https://doi.org/10.1007/978-3-319-40189-8_14

Mukhopadhyay, S.C. and Suryadevara, N.K.: Internet of things: Challenges and opportunities. In Internet of Things (pp. 1-17). (2014). Springer, Cham. https://doi.org/10.1007/978-3-319-04223-7_1

Yao, X., Chen, Z. and Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, (2015). Pp.104-112. https://doi.org/10.1016/j.future.2014.10.010

Ion, M., Zhang, J. and Schooler, E.M.: August. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 39-40). ACM. (2013). https://doi.org/10.1145/2491224.2491237

Baptista, M.S.: Cryptography with Chaos. Physics letters A, 240(1-2), (1998). Pp. 50-54. https://doi.org/10.1016/S0375-9601(98)00086-3

Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), (2001). Pp. 6-21. https://doi.org/10.1109/7384.963463

Kotulski, Z., SZCZEPANSKI, J., Gorski, K., Paszkiewicz, A. and Zugaj, A.: Application of discrete chaotic dynamical systems in cryptography-DCC method. International Journal of Bifurcation and Chaos, 9(06), (1999). Pp. 1121-1135. https://doi.org/10.1142/S0218127499000778

Alvarez, G., Montoya, F., Romera, M. and Pastor, G.: Breaking parameter modulated chaotic secure communication system. Chaos, Solitons & Fractals, 21(4), (2004). Pp. 783-787. https://doi.org/10.1016/j.chaos.2003.12.041

Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), (2001). Pp. 6-21. https://doi.org/10.1109/7384.963463

Reddaiah, B. (2019). Cryptosystem using Crossover Function and Logical Operators. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 55–59). https://doi.org/10.35940/ijeat.b3296.129219

KPELOU, M., & Kishore, K. (2019). Lightweight Security Framework for Data Outsourcing and Storage in Mobile Cloud Computing. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 2, pp. 3405–3412). https://doi.org/10.35940/ijrte.b2239.078219

Wanjau, S. K., Wambugu, G. M., & Oirere, A. M. (2022). Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 7, pp. 1–16). https://doi.org/10.35940/ijese.f2530.0610722

N.S, N., & A, S. (2020). Malware Detection using Deep Learning Methods. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 6, pp. 6–9). https://doi.org/10.35940/ijisme.f1218.046620

C.T, A., O.O, O., O.A, A., & Grace, A. M. (2023). Cryptographic Security Approach for Biometric Verification System. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 2, pp. 7–13). https://doi.org/10.54105/ijcns.c7854.113223