Planned intervention: On Wednesday June 26th 05:30 UTC Zenodo will be unavailable for 10-20 minutes to perform a storage cluster upgrade.
Published April 30, 2024 | Version CC-BY-NC-ND 4.0
Journal article Open

Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security

  • 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
  • 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
  • 2. Associate Professor, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
  • 3. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
  • 4. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

Description

Abstract: Every platform of business uses online services and are increasing. Wired and wireless networks are becoming popular day by day. With this the sensitive data is carried over internet on daily basis. Due to rapid growth of networks, information security becomes more important. Hence, there is every chance of misleading the data by unauthorized parties. So, there is need to provide security for the data and cryptography is the science that helps in providing security. Encryption algorithm plays a crucial role in information security. This paper briefly describes a new hybrid system to enhance security. In this work along with traditional operations Lattice permutation is used in encryption process. For key generation Chaos Logistic Mapping is used that shows more resistance while breaking key by unauthorized persons. Services like online transactions may be largely protected with this type of newly proposed hybrid systems.

Files

D444113040424.pdf

Files (330.6 kB)

Name Size Download all
md5:ab681a5f049d04ee46de780b8caa9454
330.6 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2024-04-15
Manuscript received on 30 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024.

References

  • S. Herbert, "A brief History of Cryptography", An article available at hhtp://cybercrimes.net/aindex.html.
  • B. Reddaiah, R. Pradeep kumar Reddy, S. Hari Krishna, "Enciphering using Bit-wise logical operators and pairing function with text generated hidden key", IJCA 90975-88870, vol. 121, No. 8, July 2015: pp. 30-35. https://doi.org/10.5120/21562-4597
  • S. Tanenbaum, "Modern Operating Systems", Prentice Hall, 2003.
  • Basic Cryptographic Algorithms", an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro. html#Alogrithms.
  • P.P. Charles & P. L. Shari, "Security in Computing: 4th edition", Prentice-Hall, Inc., 2008.
  • Behrouz A. Forouzan, Cryptography and Network Security, Special Edition, Tata McGraw Hill.
  • KHAN, "The Codebreakers", Macmillan Publishing Company, New York, 1967.
  • S. William, Cryptography and Newtork Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999. Pp 23-50
  • Sehgal, A., Perelman, V., Kuryla, S. and Schonwalder, J.: Management of resource constrained devices in the internet of things. IEEE Communications Magazine, 50(12). (2012). https://doi.org/10.1109/MCOM.2012.6384464
  • John S. Birman, Volker Gebhardt and Juan Gonzalez-Meneses, Conjugacy in Garside groups 1: cycling, powers and rigidity, Groups Geom, Dynamics, 1(2007), 221-279. https://doi.org/10.4171/ggd/12
  • Gryak and D. Kahrobaei, The status of polycyclic group-based cryptography: A survey and open problems, Groups Complexity Cryptology, 8(2016), 171-186. https://doi.org/10.1515/gcc-2016-0013
  • D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi) groups in public key cryptography, Computability in Europe, LNCS, (2016), 132-141. https://doi.org/10.1007/978-3-319-40189-8_14
  • Mukhopadhyay, S.C. and Suryadevara, N.K.: Internet of things: Challenges and opportunities. In Internet of Things (pp. 1-17). (2014). Springer, Cham. https://doi.org/10.1007/978-3-319-04223-7_1
  • Yao, X., Chen, Z. and Tian, Y.: A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, (2015). Pp.104-112. https://doi.org/10.1016/j.future.2014.10.010
  • Ion, M., Zhang, J. and Schooler, E.M.: August. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking (pp. 39-40). ACM. (2013). https://doi.org/10.1145/2491224.2491237
  • Baptista, M.S.: Cryptography with Chaos. Physics letters A, 240(1-2), (1998). Pp. 50-54. https://doi.org/10.1016/S0375-9601(98)00086-3
  • Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), (2001). Pp. 6-21. https://doi.org/10.1109/7384.963463
  • Kotulski, Z., SZCZEPANSKI, J., Gorski, K., Paszkiewicz, A. and Zugaj, A.: Application of discrete chaotic dynamical systems in cryptography-DCC method. International Journal of Bifurcation and Chaos, 9(06), (1999). Pp. 1121-1135. https://doi.org/10.1142/S0218127499000778
  • Alvarez, G., Montoya, F., Romera, M. and Pastor, G.: Breaking parameter modulated chaotic secure communication system. Chaos, Solitons & Fractals, 21(4), (2004). Pp. 783-787. https://doi.org/10.1016/j.chaos.2003.12.041
  • Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), (2001). Pp. 6-21. https://doi.org/10.1109/7384.963463
  • Reddaiah, B. (2019). Cryptosystem using Crossover Function and Logical Operators. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 55–59). https://doi.org/10.35940/ijeat.b3296.129219
  • KPELOU, M., & Kishore, K. (2019). Lightweight Security Framework for Data Outsourcing and Storage in Mobile Cloud Computing. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 2, pp. 3405–3412). https://doi.org/10.35940/ijrte.b2239.078219
  • Wanjau, S. K., Wambugu, G. M., & Oirere, A. M. (2022). Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 7, pp. 1–16). https://doi.org/10.35940/ijese.f2530.0610722
  • N.S, N., & A, S. (2020). Malware Detection using Deep Learning Methods. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 6, pp. 6–9). https://doi.org/10.35940/ijisme.f1218.046620
  • C.T, A., O.O, O., O.A, A., & Grace, A. M. (2023). Cryptographic Security Approach for Biometric Verification System. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 2, pp. 7–13). https://doi.org/10.54105/ijcns.c7854.113223