Search
Search Results
-
Qualitative and Quantitative Analysis of Modifications in Playfair Cipher
Security in digital world has become a paramount issue, even more so in the post pandemic world when the digital footprint of the world has... -
Partially identified Babassu cipher and attack on it
In the present article, we consider a new class of one-pad ciphers. We define its encryption algorithm as a partial function with two arguments. The...
-
A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher
The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...
-
Unsafe Mechanisms of Bluetooth, \(E_0\) Stream Cipher Cryptanalysis with Quantum Annealing
Due to Shor’s and Grover’s algorithms, quantum computing has become one of the fastest-evolving areas in computational science. Nowadays, one of the... -
An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme
Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...
-
Image cipher using image filtering with 3D DNA-based confusion and diffusion strategy
In this paper, an image cipher is presented based on DNA sequence operations, image filtering and memrisitve chaotic system. Firstly, plain image is...
-
Securing Digital Images using Stream Cipher and MDS Matrix
This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of...
-
A hybrid authenticated image encryption scheme using elliptic curves for enhanced security
The rapid evolution of digital technology has heightened concerns about the security of multimedia communication across vulnerable platforms. In...
-
TEXCEL: text encryption with elliptic curve cryptography for enhanced security
Elliptic curve cryptography has emerged as a potent tool for safeguarding data communications. This research paper addresses the problem of...
-
Image Security Using Hyperchaos and Multidimensional Playfair Cipher
Image is utilized in diverse fields due to its vividness, intuitiveness, and copiousness. Existing methods for image encryption have limitations such... -
Detection of Classical Cipher Types with Feature-Learning Approaches
To break a ciphertext, as a first step, it is essential to identify the cipher used to produce the ciphertext. Cryptanalysis has acquired deep... -
Multilayer symmetric and asymmetric technique for audiovisual cryptography
In order to ensure the secure transmission and storage of video content, this research work provides a video encryption algorithm using symmetric and...
-
Securing encrypted image information in audio data
Advances in communication technologies have fueled growth in digital data transfer. Images are one of the most often conveyed types of digital...
-
A novel pseudo-random number assisted fast image encryption algorithm
Image information encryption is an essential research direction in symmetric cryptography. A new digital image cryptosystem is proposed in this...
-
Image encryption algorithm based on DNA network and hyperchaotic system
This paper presents a novel deoxyribonucleic acid (DNA) network encryption method combined with a hyperchaotic system for image encryption. The DNA...
-
A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice
An image encryption model is presented in this paper. The model uses two-dimensional Brownian Motion as a source of confusion and diffusion in image...
-
Characterizing a Time–Memory Tradeoff Against PudgyTurtle
PudgyTurtle is not a cipher, but rather an alternative way to utilize the keystream in binary-additive stream-cipher cryptosystems. Instead of...
-
An approach to enhance the security of unmanned aerial vehicles (UAVs)
There is a significant surge in unmanned aerial vehicles’ (UAVs) popularity with an ongoing increase in demand due to their multi-functional uses....
-
DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography
The Internet of Everything (IoE) based cloud computing is one of the most prominent areas in the digital big data world. This approach allows...
-
An Efficient CH Based Authentication and Authorization for Secure EHR Using DF-BCrypt and Hashed Access Structure
An Electronic Health Record (EHR) is a standard collection of health data from the general population and patients that is electronically stored in a...