scispace - formally typeset
Proceedings ArticleDOI

Public key cryptosystems based on chaotic-Chebyshev polynomials

Reads0
Chats0
TLDR
The main scope of this paper is to propose an extension of the chebyshev polynomials algorithm to images and videos and making it secure using multilevel scrambling and hash.
Abstract
Due to rapid developments in limits and possibilities of communications and information transmissions, there is a growing demand of cryptographic techniques, which has spurred a great deal of intensive research activities in the study of cryptography. This paper describes a public key encryption based on chebyshev polynomials [1].We discuss the algorithm for textual data and present the cryptanalysis which can be performed on this algorithm for the recovery of encrypted data [2]. We also describe a simple hashing algorithm for making this algorithm more secure, and which can also be used for digital signature [3]. The main scope of this paper is to propose an extension of this algorithm to images and videos and making it secure using multilevel scrambling and hash. Software implementations and experimental results are also discussed in detail.

read more

Citations
More filters
Journal ArticleDOI

Statistical analysis of S-box in image encryption applications based on majority logic criterion

TL;DR: This paper proposes a criterion to analyze the prevailing S-boxes and study their strengths and weaknesses in order to determine their suitability in image encryption applications and uses the results from correlation analysis, entropy analysis, contrast analysis, homogeneity analysis, energy analysis, and mean of absolute deviation analysis.
Journal ArticleDOI

Analyses of S-boxes based on interval valued intuitionistic fuzzy sets and image encryption

TL;DR: This work transforms the three dimensional matrix corresponding to colour image with the help of nonlinear component and uses the algebraic structure of IVIFS to choose the best substitution box for image encryption based on entropy, contrast, homogeneity, correlation, energy and mean of absolute devotion.
Journal ArticleDOI

Secure and Fast Chaos based Encryption System using Digital Logic Circuit

TL;DR: It has been proposed a novel fast & secure encryption Technique which uses the chaotic map function to generate the different multiple keys and shows that negligible difference in parameters of chaotic function generate completely different keys as well as cipher text.
Proceedings ArticleDOI

Fully phase encrypted memory using cascaded extended fractional Fourier transform

TL;DR: In this article, a fully phase encrypted memory system using cascaded extended fractional Fourier transform (FRT) was implemented, where a two-dimensional image obtained from an amplitude image was encrypted and decrypted using phase contrast technique.
Journal ArticleDOI

Public Encryption Techniques for Cloud Computing: Randomness and Performance Testing

TL;DR: An evaluation for selected eight modern encryption techniques namely: RC4, RC6, MARS, AES, DES, 3DES, Two-Fish, and Blow-Fish at two independent platforms namely; desktop computer and Amazon EC2 Micro Instance cloud computing environment.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Chaos-based cryptography: a brief overview

TL;DR: In this paper, chaos-based cryptography is discussed from a point of view which the author believes is closer to the spirit of both cryptography and chaos theory than the way the subject has been treated recently by many researchers.
Journal ArticleDOI

Security of public-key cryptosystems based on Chebyshev polynomials

TL;DR: This paper describes an attack which permits to recover the corresponding plaintext from a given ciphertext and points out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem are not secure due to the aforementioned attack.
Proceedings ArticleDOI

Public-key encryption based on Chebyshev maps

TL;DR: A public-key encryption algorithm based on Chebyshev maps is proposed, which is secure, practical, and can be used for both encryption and digital signature.
Related Papers (5)