Mir et al., 2023 - Google Patents
A public and private key image encryption by modified approach of Vigener cipher and the chaotic mapsMir et al., 2023
View PDF- Document ID
- 18014188743279877713
- Author
- Mir U
- Lone P
- Singh D
- Mishra D
- Publication year
- Publication venue
- The Imaging Science Journal
External Links
Snippet
The article presents a real-time image encryption using a modified approach of Vigenère cipher and the chaotic maps with an efficient key management. The modification is provided to Vigenère cipher through the key expansion procedure. The proposed encryption chooses …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Batool et al. | A novel image encryption scheme based on Arnold scrambling and Lucas series | |
| Suri et al. | A synchronous intertwining logistic map-DNA approach for color image encryption | |
| CN111510281B (en) | Homomorphic encryption method and device | |
| Brahim et al. | A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes | |
| Lone et al. | A novel image encryption using random matrix affine cipher and the chaotic maps | |
| Wang et al. | A novel image encryption algorithm based on chaotic shuffling method | |
| Mir et al. | Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain | |
| Mir et al. | A public and private key image encryption by modified approach of Vigener cipher and the chaotic maps | |
| Som et al. | Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator | |
| Gopalakrishnan et al. | Chaotic image encryption with hash keying as key generator | |
| Attaullah et al. | Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption | |
| Kebache et al. | Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications. | |
| Kumar et al. | Overview of information security using genetic algorithm and chaos | |
| Zarei Zefreh et al. | LSIE: a fast and secure Latin square-based image encryption scheme | |
| Chong et al. | Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations | |
| Mastan et al. | Cryptanalysis of two similar chaos-based image encryption schemes | |
| Güvenoğlu et al. | ZigZag transform with Durstenfeld shuffle for fast and secure image encryption | |
| Ullah et al. | Provably secure color image encryption algorithm based on FO 4D-HCS and ACM: S. Ullah et al. | |
| Singh et al. | Improvement of image transmission using chaotic system and elliptic curve cryptography | |
| Mehta et al. | DieRoll: A unique key generation and encryption technique | |
| Mehta et al. | Enhancing multimedia security using shortest weight first algorithm and symmetric cryptography | |
| Jnana Ramakrishna et al. | A secure authenticated image encryption scheme based on elliptic curve cryptography | |
| Bhat et al. | Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication | |
| Wu et al. | Vpip: Values packing in paillier for communication efficient oblivious linear computations | |
| Yan et al. | A conservative chaotic system with coexisting chaotic-like attractors and its application in image encryption |