A Novel Cycle Leader Permutation with Elgamal Algorithm for Image Encryption
Creators
- 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
Contributors
Contact person:
Researchers:
- 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa-516005, India.
- 2. Associate Professor, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
- 3. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
Description
Abstract: As more people use networks in whatever capacity, security-related issues come up more frequently. These issues could be external to the network or inside to it. To address the security-related issues The science of cryptography and network security makes it possible to protect the resources, data quality, and network infrastructure. Firewalls and filters are utilized across many workstations to safeguard the resources. However, security services are required to safeguard the data during transmission to prevent unauthorized access. To guard against attacks, these services must be changed often. This paper integrates Cycle Leader permutation with Elgamal algorithms to construct such a system. These hybrid solutions can be used to stop hackers from gaining unauthorized access different commercial applications.
Files
E985513050424.pdf
Files
(335.2 kB)
Name | Size | Download all |
---|---|---|
md5:56073c6e0711bc6e05c9495f08d8d262
|
335.2 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijitee.E9855.13050424
- EISSN
- 2278-3075
Dates
- Accepted
-
2024-04-15Manuscript received on 30 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024.
References
- Moatsum Alawida, "A novel chaos-based permutation for image encryption", Journal of Kind Saud University-Computer and Information Sciences, 35 (2023) 101595, pp. 1–21. https://doi.org/10.1016/j.jksuci.2023.101595
- Sandip Kumar Bhowmick et al., "Modified Elgamal Cryptosystem for Public-Key Encryption and Digital Signature", International Journal of Pharmacy & Technology", Dec-2016, Vol. 8, Issue No. 4, pp. 26578-26583.
- Alejandro Freyre Echevarria et al., "A graph theory approach to heuristic generation of cyclic permutations", Springer Nature 2021, pp. 1-16.
- A. H. Zahid, E. Al-Solami, and M. Ahamad, A Novel Modular Approach Based Substitution-Box Design for Image Encryption", IEEE Access, vol. 8, pp. 150326-150340. 2020. https://doi.org/10.1109/ACCESS.2020.3016401
- R. Bhanot, and R. Hans, "A Review and comparative Analysis of Various Encryption Algorithms:, International Journal of Security and Its Applications, vol. 9, No. 4, pp. 289-306, 2015., to be published. https://doi.org/10.14257/ijsia.2015.9.4.27
- Neha Khandelwal, Prabhakar. M, Kuldeep Sharma, "An Overview of Security Problems in MANET".
- Stallings. W (2006), Cryptography and Network Security, Fourth Edition, Prentice Hall.
- Rajesh P. Singh et al., "A Public Key Cryptosystem Using a Group of Permutation Polynomials", Mathematical Institute, Slovak Acadamy of Science, pp. 139-162.
- Rahmadi Asri et al., " Modification of Ciphertext Elgamal Algorithm using Split Merge", The 3rd International Conference on Computing and Applied Informatics-2018, Journal of Physics: Conference Series, 1235 (2019) 012054, pp. 1-7. https://doi.org/10.1088/1742-6596/1235/1/012054
- Akash Thakkar, Ravi Gor, "Cryptographic method to enhance the Data Security using ElGamal algorithm and Kamal Transform", IOSR Journal of Computer Engineering, vol. 24, Issue. 3, pp. 08-14.
- Gross, Jonathan L. Combinational methods with computer applications. Discrete mathematics and its applications. Boca Raton, Fla.: Chapman & Hall/CRC. P.29 (2008).
- Knuth, Donald E. The Art of Computer Programming. Addision-Wesley. P. 35 (2002).
- Bogart. Kenneth P. Introductory combinatorics (3 ed). London: Harcourt Academic Press. P. 554 (2000).
- Rosen, Kenneth H. Handbook of discrete and combinational mathematics. Boca Raton, London, New York: CRC press.
- Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126. https://doi.org/10.1145/359340.359342
- Merkle, Ralph, and Martin Hellman. "Hiding information and signatures in trapdoor knapsacks." IEEE transactions on Information Theory 24.5 (1978): 525-530.4 4 https://doi.org/10.1109/TIT.1978.1055927
- P. M. Durai Raj Vincent, Sathiyamoorthy E, " A Novel and efficient public key encryption algorithm" International Journal of Information and communication technology, Vol. 9, No. 2, pp 199-211, 2016. https://doi.org/10.1504/IJICT.2016.10000121
- Z Wu, D Su, G Ding. 2014. ElGamal Algorithm for Encryption of Data Transmission. In Proc. of Int. Conf. on Mechatronics and Control (ICMC)
- Rao, D., & Koolagudi, S. (2019). Music Cryptography based on Carnatic Music. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 1, pp. 5107–5114). https://doi.org/10.35940/ijeat.a1358.109119
- Research on Various Cryptography Techniques. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 2S3, pp. 395–405). https://doi.org/10.35940/ijrte.b1069.0782s319
- Abualkas, Y. M. A., & Bhaskari, D. L. (2023). Methodologies for Predicting Cybersecurity Incidents. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 1, pp. 1–8). https://doi.org/10.54105/ijcns.f3677.053123
- Narayanasamy, K., & Arumugam, P. (2019). Symmetric Cryptographic Framework for Network Security. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 10, pp. 3803–3808). https://doi.org/10.35940/ijitee.j9986.0881019
- Priya, Dr. R. (2020). The Estimation of Risk on Cloud Computing Framework. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 4, pp. 5–10). https://doi.org/10.35940/ijisme.d1188.016420