scispace - formally typeset
Search or ask a question

Showing papers on "Transposition cipher published in 2021"


Journal ArticleDOI
TL;DR: A secured lightweight cryptosystem is designed based on lookup table operations that reduce computational overhead, resource requirement and power consumption compared to traditional security mechanisms and yields security primacy in various areas of cryptography.
Abstract: Digital image communication over public networks requires a high level of security to protect picture elements that represent information. Security is an important and challenging issue that can be solved using cryptography techniques. Generally, image encryption techniques are based on multiple rounds and iterations. In this paper, a secured lightweight cryptosystem is designed based on lookup table operations that reduce computational overhead, resource requirement and power consumption compared to traditional security mechanisms. In this context, one-dimensional elementary cellular automaton has been combined with Henon chaotic map to design a cryptosystem, which can produce unprecedented results in cryptography. Initially, state attractors for rule space are investigated and analyzed in Wolfram’s cellular automata to extract the properties and functional abilities to perform cryptographic operations. A novel algorithm of keyed transposition cipher is applied to digital image in P-Box module to produce shuffled image. Then, the extracted properties of ECA are preserved in a tabular form and further used in the diffusion process. Based on the simulation and comparison with other existing mechanisms, it is evident that the proposed algorithm is promising and obstructive to all kinds of statistical attacks, and it yields security primacy in various areas of cryptography. Encryption/Decryption is based on indexed based lookup tables principal using ECA and can be easily implemented using logic gates. The proposed algorithm provides confidentiality and can be adopted in IoT networks that require lightweight cryptography modules. Experimental results of color and gray images demonstrate flourishing results in the real-time environment of cryptography.

23 citations


Proceedings ArticleDOI
10 Sep 2021
TL;DR: In this article, the authors describe a novel cryptosystem, which is evaluated according to speed, entropy level, security, and encrypted text size, and the comparative analysis was done.
Abstract: nowadays, the need to protect information from various attackers is growing. There are asymmetric cryptographic algorithms that offer a good security rate, but at the same time, they consume a lot of system resources and need more encryption time. It is very important to create an algorithm that will have a high level of security and which can be easily implemented in the system. The purpose of this paper is to describe a novel cryptosystem. The encryption algorithm is evaluated according to speed, entropy level, security, and encrypted text size. To evaluate the proposed algorithm, the comparative analysis was done. For comparison, the AES and RSA cryptosystems were used. Experimental research has shown that the proposed cryptosystem has good results in the following criteria: encryption speed, flexibility, needs low system requirements, the ciphertext size. According to the given algorithm, using modern programming technologies we have developed the web application. This software product is easy to implement and fast for use. Experimental research results showed that the proposed encryption method can highly improve transferred information security and has good encryption speed than AES and RSA. To evaluate security and resistance, frequency analysis and entropy research was conducted. Analysis showed that the proposed cryptosystem has a good security level. Security analysis demonstrates that our scheme is secure.

2 citations


Proceedings ArticleDOI
28 Apr 2021
TL;DR: In this article, a combination of Steganography, Cryptography, and Transposition Ciphers is proposed to provide better security and more important integrity in the cloud data, however, these proposed methods are getting snooped.
Abstract: Data Security has become one of the major concerns in the modern world. As everything is going digital and our data is on the cloud, its security is a major research area. The various suggested method provides better security and more important integrity. However, with more advancement in technology, these proposed methods are getting snooped. This paper proposed an approach of a combination of Steganography, Cryptography, and Transposition cipher technique. In particular, it focuses on the LSB technique in another way i.e., while performing the LSB steganography technique instead of embedding data at LSB of the base image, this method takes MSB of Video Frame and LSB of Stego Image. This combination helps in providing very little distortion and higher quality of the secure image. The value of efficiency of the algorithm would be determined by the PSNR value.

1 citations


DOI
Yuzhe Wang1
23 Sep 2021
TL;DR: In this article, three improved versions of the 3D Playfair Ciphers are reviewed and a conclusion was drawn for these three improved variants of the Playfair cipher and the future development of playfair ciphers and cryptography.
Abstract: In today's communications world, protecting data security cannot be ignored. Cryptography, which plays a pivotal role in information security, has become an indispensable and important part of information security. Cryptography is to study secret communication for adopting a kind of secret protection for the information to be transmitted. It is a technical science that studies the preparation and deciphering of codes. Classical encryption can be divided into two categories: transposition ciphers and substitution ciphers. This paper will mainly study a kind of substitution ciphers-Playfair cipher and review three improved versions of the 3D Playfair cipher. Then, a conclusion was drawn for these three improved versions of Playfair cipher. Finally looks forward to the future development of Playfair cipher and cryptography.

DOI
15 Sep 2021
TL;DR: In this article, a Windows desktop application has been developed for purely educational purpose, and only basic substitution and transposition methods are implemented in it, such as Caesar cipher, direct substitution cipher, polyalphabetic substitution cipher and matrix substitution cipher; a transposition cipher with text blocks or with text formatting.
Abstract: The main purpose of this paper is to protect the transmission of important information from hacker attacks. This is achieved by encrypting the messages before transmission and decrypting them after their receipt, respectively. A Windows desktop application has been developed for purely educational purpose. For this reason, only basic substitution and transposition methods are implemented in it. Namely: Caesar cipher (simple monoalphabetic substitution), direct substitution cipher, polyalphabetic substitution cipher and matrix substitution cipher; a transposition cipher with text blocks or with text formatting. Three roles are implemented in the suggested application: administrator, teacher and student. The interface of the application consists of 2 parts: presentation and logical. Additionally, it contains a data section, including text files that the application can work with. This type of applications can be used in different areas of human life. For example, to protect information in custom text files (.doc,. txt,. pdf etc.) that can be written to various storage devices (hard drives, flash drives, DVDs, CDs etc.) or sent via e-mail or stored in cloud space. The information can be related to management, finance or military purposes. The transmitted data may be to banks, insurance companies or other corporations making responsible economic and financial transactions.



Book ChapterDOI
01 Jan 2021
TL;DR: The Enyo block cipher as mentioned in this paper uses partitioned key-based encryption with unique mapping followed by various bitwise swaps, a shifted modulo encryption, and using a transposition matrix.
Abstract: The increase in demand for information security has made cryptography a basic need for protecting data from unauthorized access. In this paper, a computationally inexpensive Enyo block cipher has been presented. This multi-layered algorithm provides a promising solution to safeguard user’s information. The cipher works on the same line as the Feistel-based network with the symmetric structure and operates on 8-bit ASCII characters. Using 6-bit custom encoding, a secret key generates 6-bit encrypted text. This cipher modeled using undemanding operations utilizes partitioned key-based encryption with unique mapping followed by various bitwise swaps, a shifted modulo encryption, and using a transposition matrix. The proposed cipher is highly customizable as per user demands and necessities that make it more dependent on user inputs. Enyo cipher is faster in encryption and decryption than the Playfair cipher and shows comparable performance with XOR encryption. Enyo cipher demonstrates good resistance to a brute-force attack. It is well suited for small-scale applications where the computational power is a bottleneck. A comparison is also made that shows the impact of the proposed cipher to commonly available classical ciphers.

Journal ArticleDOI
28 Feb 2021
TL;DR: The Hungarian cube can move left and skilfully in a circular manner, as well as any face of the cube, to realize the image encryption system that is a kind of diffusion cipher or a cipher transposition, baptized Six-Dos Transposition.