Mythili, P; Paul, A J; Poulose Jacob,K(IEEE, September 22, 2011)
[+]
[-]
Abstract:
In this paper we propose a cryptographic
transformation based on matrix manipulations for image
encryption. Substitution and diffusion operations, based on the
matrix, facilitate fast conversion of plaintext and images into
ciphertext and cipher images. The paper describes the encryption
algorithm, discusses the simulation results and compares with
results obtained from Advanced Encryption Standard (AES). It
is shown that the proposed algorithm is capable of encrypting
images eight times faster than AES.
Description:
Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE
Mythili, P; Paul, A J; Poulose Jacob,K(International Journal of Computer Applications® (IJCA), 2011)
[+]
[-]
Abstract:
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure
Description:
International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011
Poulose Jacob,K; Sheena, Mathew(IEEE, September 15, 2006)
[+]
[-]
Abstract:
A novel and fast technique for cryptographic
applications is designed and developed using the symmetric key
algorithm “MAJE4” and the popular asymmetric key algorithm
“RSA”. The MAJE4 algorithm is used for encryption /
decryption of files since it is much faster and occupies less
memory than RSA. The RSA algorithm is used to solve the
problem of key exchange as well as to accomplish scalability and
message authentication. The focus is to develop a new hybrid
system called MARS4 by combining the two cryptographic
methods with an aim to get the advantages of both. The
performance evaluation of MARS4 is done in comparison with
MAJE4 and RSA.