Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG

作者: Anirban Bhowmick , Nishith Sinha , R Vijaya Arjunan , B Kishore

DOI: 10.1109/ICISC.2017.8068729

关键词:

摘要: The growing importance of information security over recent years has prompted development secure encryption algorithms. Most the traditional algorithms such as AES and DES are computationally intensive. Hence, in this paper we propose a simple but symmetric key algorithm. image approach makes use two pseudorandom number generators to encrypt images. Middle Square Algorithm is used swap columns followed by swapping rows. This permutation step produces intermediary cipher image. Subsequently, RC4 algorithm produce stream pseudo-random numbers. These numbers substitute intensity pixels image, which gives final encrypted Various analysis tests performed on quality results these prove that proposed efficient.

参考文章(7)
Ms Ayushi, A Symmetric Key Cryptographic Algorithm International Journal of Computer Applications. ,vol. 1, pp. 1- 6 ,(2010) , 10.5120/331-502
Arihant Kr.Banthia, Namita Tiwari, Image Encryption using Pseudo Random Number Generators International Journal of Computer Applications. ,vol. 67, pp. 1- 8 ,(2013) , 10.5120/11508-7226
Hala Bahjat, May A Salih, None, Speed Image Encryption Scheme using Dynamic Galois Field GF(P) Matrices International Journal of Computer Applications. ,vol. 89, pp. 7- 12 ,(2014) , 10.5120/15513-4218
Nishith Sinha, Mallika Chawda, Kishore Bhamidipati, Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher International Journal of Computer Applications. ,vol. 94, pp. 17- 21 ,(2014) , 10.5120/16459-6132
M. U.Bokhari, Shadab Alam, Faheem Syeed Masoodi, Cryptanalysis Techniques for Stream Cipher: A Survey International Journal of Computer Applications. ,vol. 60, pp. 29- 33 ,(2012) , 10.5120/9721-4187
Nigam Sangwan, Text Encryption with Huffman Compression International Journal of Computer Applications. ,vol. 54, pp. 29- 32 ,(2012) , 10.5120/8572-2307
Ehsan Vahedi, Vincent W.S. Wong, Ian F. Blake, An Overview of Cryptography IGI Global. pp. 70- 100 ,(2013) , 10.4018/978-1-4666-3685-9.CH006