Details



CRYPTOGRAPHY AND DATA TRANSFER- EMPLYOBILITY OF RSA ALGORITHM AND RGB MATRIX IN ENHANCING ENCRYPTION FOR DATA TRANSFERABILITY

Sahil Kapoor

41-50

Vol 7, Jan-Jun, 2018

Date of Submission: 2018-02-01 Date of Acceptance: 2018-03-03 Date of Publication: 2018-03-21

Abstract

Data collected by each individual is increasing day by day and so is the rate of transfer of that data. Hence, there is a need to protect this data while the transfer is being done. One simple solution to this problem of data security is cryptography. Our paper proposes a method to share images after being encrypted by Logistic maps and Linear Feedback Shift Register (LSFR) followed by the RSA Algorithm. Thereby, we provide extra layers of security over the existing encryption technique making it difficult to decrypt the images after data transfer. The image can only be decrypted with the help of a key.

References

  1. Rivest, R.L.,Shamir,A., Adleman, L., “A Method for Obtaining Digital signatures and public-key cryptosystems”, Communications of the ACM, Vol 21, No.2, February 1978.
  2. Jonathan Kaltz, Yehuda Lindell, “Introduction to Modern Cryptography: Principles and Protocols”, ISBN: 978-1-58488-551-1,2008.
  3. Ahmad Abusukhon and Mohammad Talib, “A Novel Network Security Algorithm based on Private Key Encryption”, IEEE 2012.
  4. Yan-Bin, Zheng, Ding Qun. 'A new digital chaotic sequence generator based on Logistic Map', Proceedings of Second International Conference on Innovations in Bio-inspired Computing and Applications (IBICA), 2011,pp.175-178
  5. Zouhozr Ben Jemaa, Safya Belghzth 'Correlation properties of binary sequences generated by the logistic map-application to DSCDMA.' Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Hammamet, Tunisia. 2002, pp. 447-451.
  6. Zhang D., Gu Q. , Pan Y. and Zhang X. “Discrete Chaotic Encryption and Decryption of Digital Images”, Proceedings of International Conference on Computer Science and Software Engineering, 2008, pp. 849-852.
  7. Xiang Di, L. X. , Wang P., “Analysis and improvement of a chaos image encryption algorithm” Chaos, Solution and Fractals, Volume 40, Issue 5, 15 June 2009, pp. 2191– 2199.
  8. Jin-mei Liu, Qiang Qu, “Cryptanalysis of a substitution–diffusion based image cipher using chaotic standard and logistic map” Proceedings of Third International Symposium on Information Processing,2010, pp. 67-69.
  9. M. Salleh, S. Ibrahim, I. F. Isnin, “Enhanced chaotic image encryption algorithm based on Baker's map.” Proceedings of IEEE Conference on Circuits and Systems, 2003, vol.2, pp. 508-511.
  10. K. Wang, W. Pei, L. Zou, A. Song, Z. He, “On the security of 3D Cat map based symmetric image encryption scheme,” Physics Letters A, 2005, vol. 343, pp. 432-439.
  11. Hong, Lianxi, and Chuanmu Li. 'A novel color image encryption approach based on multi-chaotic system.' Proceedings of 2nd IEEE International Conference on Anti-counterfeiting, Security and Identification, 2008, pp. 223-226.
  12. Honglei, Yu, Wu Guang-shou, 'The compounded chaotic sequence research in image encryption algorithm'. Proceedings of WRI Global Congress on Intelligent Systems, 19-21 May 2009. Vol. 3. pp. 252 -256.
  13. Weihua Z. Ying S. “Encryption Algorithms Using Chaos and CAT Methodology”, Proceedings of International Conference on Anti- Counterfeiting Security and Identification in Communication (ASID), 2010, pp. 20 – 23
  14. Al-Najjar, Hazem Mohammad, Asem Mohammad AL-Najjar, K. S. A. Arar 'Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table', Proceedings of International Arab Conference on Information Technology, 2011 (ACIT 2011).
  15. “The RSA Algorithm” – Adrian Dudek, PhD, Australian National University.
Download PDF
Back