A Novel Cycle Leader Permutation with Elgamal Algorithm for Image Encryption
Main Article Content
Abstract
As more people use networks in whatever capacity, security-related issues come up more frequently. These issues could be external to the network or inside to it. To address the security-related issues The science of cryptography and network security makes it possible to protect the resources, data quality, and network infrastructure. Firewalls and filters are utilized across many workstations to safeguard the resources. However, security services are required to safeguard the data during transmission to prevent unauthorized access. To guard against attacks, these services must be changed often. This paper integrates Cycle Leader permutation with Elgamal algorithms to construct such a system. These hybrid solutions can be used to stop hackers from gaining unauthorized access different commercial applications.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Moatsum Alawida, “A novel chaos-based permutation for image encryption”, Journal of Kind Saud University-Computer and Information Sciences, 35 (2023) 101595, pp. 1–21. https://doi.org/10.1016/j.jksuci.2023.101595
Sandip Kumar Bhowmick et al., “Modified Elgamal Cryptosystem for Public-Key Encryption and Digital Signature”, International Journal of Pharmacy & Technology”, Dec-2016, Vol. 8, Issue No. 4, pp. 26578-26583.
Alejandro Freyre Echevarria et al., “A graph theory approach to heuristic generation of cyclic permutations”, Springer Nature 2021, pp. 1-16.
A. H. Zahid, E. Al-Solami, and M. Ahamad, A Novel Modular Approach Based Substitution-Box Design for Image Encryption”, IEEE Access, vol. 8, pp. 150326-150340. 2020. https://doi.org/10.1109/ACCESS.2020.3016401
R. Bhanot, and R. Hans, “A Review and comparative Analysis of Various Encryption Algorithms:, International Journal of Security and Its Applications, vol. 9, No. 4, pp. 289-306, 2015., to be published. https://doi.org/10.14257/ijsia.2015.9.4.27
Neha Khandelwal, Prabhakar. M, Kuldeep Sharma, “An Overview of Security Problems in MANET”.
Stallings. W (2006), Cryptography and Network Security, Fourth Edition, Prentice Hall.
Rajesh P. Singh et al., “A Public Key Cryptosystem Using a Group of Permutation Polynomials”, Mathematical Institute, Slovak Acadamy of Science, pp. 139-162.
Rahmadi Asri et al., “ Modification of Ciphertext Elgamal Algorithm using Split Merge”, The 3rd International Conference on Computing and Applied Informatics-2018, Journal of Physics: Conference Series, 1235 (2019) 012054, pp. 1-7. https://doi.org/10.1088/1742-6596/1235/1/012054
Akash Thakkar, Ravi Gor, “Cryptographic method to enhance the Data Security using ElGamal algorithm and Kamal Transform”, IOSR Journal of Computer Engineering, vol. 24, Issue. 3, pp. 08-14.
Gross, Jonathan L. Combinational methods with computer applications. Discrete mathematics and its applications. Boca Raton, Fla.: Chapman & Hall/CRC. P.29 (2008).
Knuth, Donald E. The Art of Computer Programming. Addision-Wesley. P. 35 (2002).
Bogart. Kenneth P. Introductory combinatorics (3 ed). London: Harcourt Academic Press. P. 554 (2000).
Rosen, Kenneth H. Handbook of discrete and combinational mathematics. Boca Raton, London, New York: CRC press.
Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126. https://doi.org/10.1145/359340.359342
Merkle, Ralph, and Martin Hellman. "Hiding information and signatures in trapdoor knapsacks." IEEE transactions on Information Theory 24.5 (1978): 525-530.4 4 https://doi.org/10.1109/TIT.1978.1055927
P. M. Durai Raj Vincent, Sathiyamoorthy E, “ A Novel and efficient public key encryption algorithm” International Journal of Information and communication technology, Vol. 9, No. 2, pp 199-211, 2016. https://doi.org/10.1504/IJICT.2016.10000121
Z Wu, D Su, G Ding. 2014. ElGamal Algorithm for Encryption of Data Transmission. In Proc. of Int. Conf. on Mechatronics and Control (ICMC)
Rao, D., & Koolagudi, S. (2019). Music Cryptography based on Carnatic Music. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1, pp. 5107–5114). https://doi.org/10.35940/ijeat.a1358.109119
Research on Various Cryptography Techniques. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 2S3, pp. 395–405). https://doi.org/10.35940/ijrte.b1069.0782s319
Abualkas, Y. M. A., & Bhaskari, D. L. (2023). Methodologies for Predicting Cybersecurity Incidents. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 1, pp. 1–8). https://doi.org/10.54105/ijcns.f3677.053123
Narayanasamy, K., & Arumugam, P. (2019). Symmetric Cryptographic Framework for Network Security. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 10, pp. 3803–3808). https://doi.org/10.35940/ijitee.j9986.0881019
Priya, Dr. R. (2020). The Estimation of Risk on Cloud Computing Framework. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 4, pp. 5–10). https://doi.org/10.35940/ijisme.d1188.016420