There are procedures to encrypt images; however, sometimes there is a loss of information in the decryption process or the key set size is not specifically mentioned. In this research, substitution ...boxes are built for the Advanced Encryption Standard (AES) cryptosystem using Chaos, and generated by a non-linear differential equation. The boxes’ non-linearity is quantified using the Walsh function. One thousand twenty four boxes are chosen with a non-linearity of 106. To generate a pseudorandom permutation over 256 elements, an algorithm that defines a bijective function is employed. The AES utilized in this article uses 128 bit keys and applies a box in each round; that is, using an array of 10 boxes for each plaintext block of 128 bits. An encryption application for color images is presented. The degree of the encrypted images’ randomness is measured to quantify the cipher quality. Image encryption is performed without information loss. The aim in future is to design a device to encrypt video in a robust manner and in real time without loss of information.
In this paper we present a differential fault attack that can be applied to the AES using a single fault. We demonstrate that when a single random byte fault is induced at the input of the eighth ...round, the AES key can be deduced using a two stage algorithm. The first step has a statistical expectation of reducing the possible key hypotheses to 232, and the second step to a mere 28.
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the ...Advanced Encryption Standard (AES) algorithm for encryption and decryption. This paper propose an analysis for performing image encryption and decryption by hybridization of Elliptic Curve Cryptography (ECC) with Hill Cipher (HC), ECC with Advanced Encryption Standard (AES) and ElGamal with Double Playfair Cipher (DPC). This analysis is based on the following parameters: (i) Encryption and decryption time, (ii) entropy of encrypted image, (iii) loss in intensity of the decrypted image, (iv) Peak Signal to Noise Ratio (PSNR), (v) Number of Pixels Change Rate (NPCR), and (vi) Unified Average Changing Intensity (UACI). The hybrid process involves the speed and ease of implementation from symmetric algorithms, as well as improved security from asymmetric algorithms. ECC and ElGamal cryptosystems provide asymmetric key cryptography, while HC, AES, and DPC are symmetric key algorithms. ECC with AES are perfect for remote or private communications with smaller image sizes based on the amount of time needed for encryption and decryption. The metric measurement with test cases finds that ECC and HC have a good overall solution for image encryption.
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value. Specifically, in the ...National Institute of Standards and Technology's ongoing postquantum standardization effort, different security categories are defined that reflect the quantum resources needed to attack AES-128, AES-192, and AES-256. This article presents a quantum circuit to implement the S-box of AES. Also, leveraging an improved implementation of the key expansion, we identify new quantum circuits for all three AES key lengths. For AES-128, the number of Toffoli gates can be reduced by more than 88% compared to Almazrooie et al.'s and Grassl et al.'s estimates while simultaneously reducing the number of qubits. Our circuits can be used to simplify a Grover-based key search for AES.
Encryption of data with high correlation, such as images, is a challenge for block ciphers, since patterns of the original image may remain after encryption. This is due to the deterministic mapping ...performed by the cipher. To overcome this limitation, a block cipher is used in an adequate mode of operation, such as cipher block chaining, counter mode. It is presented in this work randomized block ciphers inspired by the Rijndael architecture employing chaotic maps as an entropy source. It is shown that the proposal achieves good security and robustness indicators with fewer rounds compared to that obtained with the Rijndael algorithm.
•Propose randomized block ciphers inspired by the Rijndael architecture employing chaotic maps as an entropy source.•Encrypt images using the randomized version of the Rijndael S-box.•Propose alternatives to the diffusion layer of the Rijndael that speed up the encryption process.•Analyze the level of security of the proposed ciphers.
With the increasing reliance on digital technologies in power grid systems, ensuring the security and confidentiality of data has become paramount. This study focuses on optimizing security ...identification processes in power grid data using the Advanced Encryption Standard (AES) algorithm. The research explores the application of AES to enhance data protection and improve the accuracy and efficiency of security identification techniques. By implementing AES encryption, the study aims to fortify the security measures within the power grid infrastructure, safeguard sensitive information, and mitigate potential threats. The findings provide insights into the benefits of AES-based security optimization, contributing to the advancement of data security in power grid operations.
The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the ...most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.
In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency of the AES algorithm by increasing the algorithm's security to make the algorithm more suitable for color image encryption, and make it more resistant to many attacks. The modification is conducted on ShiftRows transformation of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the Signal and Image Processing Institute's (SIPI) image dataset. Moreover, the Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Entropy (H), Correlation Coefficient (CC), visual evaluation of histogram, Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) are used as an evaluation metric. The results show that proposed modification to the AES algorithm makes the algorithm more appropriate to image and surpasses the original AES.
The modification is conducted on ShiftRows step of the original AES algorithm. To test the efficiency of the proposed M-AES algorithm, several images are drawn from the signal and image processing institute's (SIPI) image dataset. Moreover, the mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy (H), correlation coefficient (CC), visual evaluation of histogram, number of pixels change rate (NPCR) and unified average changing intensity (UACI) are used as an evaluation metrics. The results show that the suggested modification to AES makes it's more appropriate to the image and surpasses the original AES.
Unmanned Aerial Vehicle (UAV) or drone, is an evolving technology in today's market with an enormous number of applications. Mini UAVs are developed in order to compensate the performance constraints ...imposed by larger UAVs during emergency situations. Multiple mini autonomous UAVs require communication and coordination for ubiquitous coverage and relaying during deployment. Multi-UAV coordination or swarm optimization is required for reliable connectivity among UAVs, due to its high mobility and dynamic topology. In this paper, a Secured UAV (S-UAV) model is proposed which takes the location of the UAVs as inputs to form a Wireless Mesh Network (WMN) among multiple drones with the help of a centralized controller. After WMN formation, efficient communication takes place using A* search, an intelligent algorithm that finds the shortest communication path among UAVs. Further, the S-UAV model utilizes cryptographic techniques such as Advanced Encryption Standard (AES) and Blowfish to overcome the security attacks efficiently. Simulation results show that the S-UAV model offers higher throughput, reduced power consumption and guaranteed message transmission with reduced encryption and decryption time.
The activities of using the internet and exchanging information and sending messages have used a lot of internet media, one of which is chat message media, but over time data and information security ...problems in chat messages that are often encountered are active and passive wiretapping. In this research, the author wants to create a counseling chat message security application using the AES (Advanced Encryption Standard) algorithm cryptographic method combined with the CBC (Cipher Block Chaining) technique which is an advanced development of the ECB (Electronic Code Book) technique. AES basically uses a block cipher with a length of 128 bits as the default operation, and the key length size varies from 128, 192 and 256 bits. so AES uses a 4x4 matrix equation with each section having a size of 1 byte. From these problems, research will be conducted to develop an application to accommodate the counseling process using a chat application that has the main focus of securing messages with image types and stored in the Firebase database service (Backend as a Service). As well as using the End-to-End service principle so that users do not need to do the encryption or decryption process directly because the process has been carried out by the system, this will also provide more security aspects in terms of confidentiality of key data and initialization vectors. So that the process of exchanging information using the media chat counseling application is secured and avoids tapping by irresponsible parties.