Abstract

Gigantic data transfer over networks and internet turned in developing a large number of encryption techniques. As a consequence, in parallel, it gave birth to new plans of attacks. In facet of data security, the algorithms specifically Rijndael (Advanced Encryption Standard-AES), SERPENT and TWOFISH are equally considered to be the best. However, they pay less attention in some cryptographic areas like digital image encryption schemes because of their time consumption inferiority. In this paper, we introduce a time diminishing improved version of SERPENT algorithm depending upon chain ring-based substitution boxes (S-boxes) dealing with 8-bit vector instead of 4-bit. The multiplicative substructures in a chain ring have multiple generators and thus the chain ring based S-boxes improve the algebraic complexity of the cipher. Apart from it, the algorithm is utilized in a digital RGB image encryption application where throughout the chain ring operations are performed. The digital image analyses reveal that the proposed scheme consumes less time (i.e. 8.2 microseconds for encryption and 5.8 microseconds for decryption of a 128-bit block) as compared to the existing prominent RGB image encryption techniques. Furthermore, the investigation on the suggested RGB image encryption scheme it is observed that it has a great resistance against the statistical and the differential attacks.

Highlights

  • The annexation of chaos is considered as the prodigious development in the field of secure data transmission

  • STATISTICAL ANALYSIS Guaranteeing the resistance of an encryption technique against statistical analysis is of major importance for checking the security of an algorithm

  • Among the statistical investigation of image processing algorithms, histogram analysis and adjacent pixels correlation are of key importance

Read more

Summary

INTRODUCTION

The annexation of chaos is considered as the prodigious development in the field of secure data transmission. By day to day advancement in many cryptanalytic methodologies, these schemes are start breaking [16] In this upshot, S-boxes over the unit elements of Galois ring are constructed by Shah et al in [15]. These S-boxes has look up table of size 4 × 4 and is used for byte substitution [19] Unlike chaotic maps, these schemes are not sensitive to initial conditions, can provide a strong cryptographic application [18]. AES), is considered to be the most secure text encryption tool It fails to be a digital image encryption instrument, due to its worst time complexity, as compared to chaos and S-box based image encryption schemes.

FINITE CHAIN RINGS
IMPROVED SERPENT ALGORITHM
NOISE ANALYSIS
TEXTURE ANALYSIS OF IMAGE ENCRYPTION
ANALYSIS ON EXPERIMENTAL WORK
VIII. CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.