A Novel Cycle Leader Permutation with Elgamal Algorithm for Image Encryption

Main Article Content

Boggana Vadana
Kanusu. Srinivasa Rao
Buduri. Reddaiah
Bodi. Susheel Kumar

Abstract

As more people use networks in whatever capacity, security-related issues come up more frequently. These issues could be external to the network or inside to it. To address the security-related issues The science of cryptography and network security makes it possible to protect the resources, data quality, and network infrastructure. Firewalls and filters are utilized across many workstations to safeguard the resources. However, security services are required to safeguard the data during transmission to prevent unauthorized access. To guard against attacks, these services must be changed often. This paper integrates Cycle Leader permutation with Elgamal algorithms to construct such a system. These hybrid solutions can be used to stop hackers from gaining unauthorized access different commercial applications.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Boggana Vadana, Kanusu. Srinivasa Rao, Buduri. Reddaiah, and Bodi. Susheel Kumar , Trans., “A Novel Cycle Leader Permutation with Elgamal Algorithm for Image Encryption”, IJITEE, vol. 13, no. 5, pp. 13–17, Apr. 2024, doi: 10.35940/ijitee.E9855.13050424.
Section
Articles

How to Cite

[1]
Boggana Vadana, Kanusu. Srinivasa Rao, Buduri. Reddaiah, and Bodi. Susheel Kumar , Trans., “A Novel Cycle Leader Permutation with Elgamal Algorithm for Image Encryption”, IJITEE, vol. 13, no. 5, pp. 13–17, Apr. 2024, doi: 10.35940/ijitee.E9855.13050424.
Share |

References

Moatsum Alawida, “A novel chaos-based permutation for image encryption”, Journal of Kind Saud University-Computer and Information Sciences, 35 (2023) 101595, pp. 1–21. https://doi.org/10.1016/j.jksuci.2023.101595

Sandip Kumar Bhowmick et al., “Modified Elgamal Cryptosystem for Public-Key Encryption and Digital Signature”, International Journal of Pharmacy & Technology”, Dec-2016, Vol. 8, Issue No. 4, pp. 26578-26583.

Alejandro Freyre Echevarria et al., “A graph theory approach to heuristic generation of cyclic permutations”, Springer Nature 2021, pp. 1-16.

A. H. Zahid, E. Al-Solami, and M. Ahamad, A Novel Modular Approach Based Substitution-Box Design for Image Encryption”, IEEE Access, vol. 8, pp. 150326-150340. 2020. https://doi.org/10.1109/ACCESS.2020.3016401

R. Bhanot, and R. Hans, “A Review and comparative Analysis of Various Encryption Algorithms:, International Journal of Security and Its Applications, vol. 9, No. 4, pp. 289-306, 2015., to be published. https://doi.org/10.14257/ijsia.2015.9.4.27

Neha Khandelwal, Prabhakar. M, Kuldeep Sharma, “An Overview of Security Problems in MANET”.

Stallings. W (2006), Cryptography and Network Security, Fourth Edition, Prentice Hall.

Rajesh P. Singh et al., “A Public Key Cryptosystem Using a Group of Permutation Polynomials”, Mathematical Institute, Slovak Acadamy of Science, pp. 139-162.

Rahmadi Asri et al., “ Modification of Ciphertext Elgamal Algorithm using Split Merge”, The 3rd International Conference on Computing and Applied Informatics-2018, Journal of Physics: Conference Series, 1235 (2019) 012054, pp. 1-7. https://doi.org/10.1088/1742-6596/1235/1/012054

Akash Thakkar, Ravi Gor, “Cryptographic method to enhance the Data Security using ElGamal algorithm and Kamal Transform”, IOSR Journal of Computer Engineering, vol. 24, Issue. 3, pp. 08-14.

Gross, Jonathan L. Combinational methods with computer applications. Discrete mathematics and its applications. Boca Raton, Fla.: Chapman & Hall/CRC. P.29 (2008).

Knuth, Donald E. The Art of Computer Programming. Addision-Wesley. P. 35 (2002).

Bogart. Kenneth P. Introductory combinatorics (3 ed). London: Harcourt Academic Press. P. 554 (2000).

Rosen, Kenneth H. Handbook of discrete and combinational mathematics. Boca Raton, London, New York: CRC press.

Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126. https://doi.org/10.1145/359340.359342

Merkle, Ralph, and Martin Hellman. "Hiding information and signatures in trapdoor knapsacks." IEEE transactions on Information Theory 24.5 (1978): 525-530.4 4 https://doi.org/10.1109/TIT.1978.1055927

P. M. Durai Raj Vincent, Sathiyamoorthy E, “ A Novel and efficient public key encryption algorithm” International Journal of Information and communication technology, Vol. 9, No. 2, pp 199-211, 2016. https://doi.org/10.1504/IJICT.2016.10000121

Z Wu, D Su, G Ding. 2014. ElGamal Algorithm for Encryption of Data Transmission. In Proc. of Int. Conf. on Mechatronics and Control (ICMC)

Rao, D., & Koolagudi, S. (2019). Music Cryptography based on Carnatic Music. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1, pp. 5107–5114). https://doi.org/10.35940/ijeat.a1358.109119

Research on Various Cryptography Techniques. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 2S3, pp. 395–405). https://doi.org/10.35940/ijrte.b1069.0782s319

Abualkas, Y. M. A., & Bhaskari, D. L. (2023). Methodologies for Predicting Cybersecurity Incidents. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 1, pp. 1–8). https://doi.org/10.54105/ijcns.f3677.053123

Narayanasamy, K., & Arumugam, P. (2019). Symmetric Cryptographic Framework for Network Security. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 10, pp. 3803–3808). https://doi.org/10.35940/ijitee.j9986.0881019

Priya, Dr. R. (2020). The Estimation of Risk on Cloud Computing Framework. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 4, pp. 5–10). https://doi.org/10.35940/ijisme.d1188.016420

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>