[go: up one dir, main page]

Mir et al., 2023 - Google Patents

A public and private key image encryption by modified approach of Vigener cipher and the chaotic maps

Mir et al., 2023

View PDF
Document ID
18014188743279877713
Author
Mir U
Lone P
Singh D
Mishra D
Publication year
Publication venue
The Imaging Science Journal

External Links

Snippet

The article presents a real-time image encryption using a modified approach of Vigenère cipher and the chaotic maps with an efficient key management. The modification is provided to Vigenère cipher through the key expansion procedure. The proposed encryption chooses …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • H04L9/0836Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator

Similar Documents

Publication Publication Date Title
Batool et al. A novel image encryption scheme based on Arnold scrambling and Lucas series
Suri et al. A synchronous intertwining logistic map-DNA approach for color image encryption
CN111510281B (en) Homomorphic encryption method and device
Brahim et al. A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes
Lone et al. A novel image encryption using random matrix affine cipher and the chaotic maps
Wang et al. A novel image encryption algorithm based on chaotic shuffling method
Mir et al. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain
Mir et al. A public and private key image encryption by modified approach of Vigener cipher and the chaotic maps
Som et al. Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator
Gopalakrishnan et al. Chaotic image encryption with hash keying as key generator
Attaullah et al. Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
Kebache et al. Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.
Kumar et al. Overview of information security using genetic algorithm and chaos
Zarei Zefreh et al. LSIE: a fast and secure Latin square-based image encryption scheme
Chong et al. Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations
Mastan et al. Cryptanalysis of two similar chaos-based image encryption schemes
Güvenoğlu et al. ZigZag transform with Durstenfeld shuffle for fast and secure image encryption
Ullah et al. Provably secure color image encryption algorithm based on FO 4D-HCS and ACM: S. Ullah et al.
Singh et al. Improvement of image transmission using chaotic system and elliptic curve cryptography
Mehta et al. DieRoll: A unique key generation and encryption technique
Mehta et al. Enhancing multimedia security using shortest weight first algorithm and symmetric cryptography
Jnana Ramakrishna et al. A secure authenticated image encryption scheme based on elliptic curve cryptography
Bhat et al. Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication
Wu et al. Vpip: Values packing in paillier for communication efficient oblivious linear computations
Yan et al. A conservative chaotic system with coexisting chaotic-like attractors and its application in image encryption