Explore chapters and articles related to this topic
Fundamentals of Image Encryption for Wireless Communications
Published in Mai Helmy Shaheen, Hybrid Encryption Algorithms Over Wireless Communication Channels, 2021
The RC6 algorithm depends on four processing registers, each register works with 32 bits to handle 128 bits as a total size of the input or output block. The RC6 is parameterized by the word size (w) in bits, the number of rounds (r), and the encryption/decryption key length in bytes (b). Figure 2.4 shows the different stages of the RC6 encryption algorithm, where any round in this algorithm has the following five stages: The function described as a squaring one,f(x) = g(x)mod 2w = x(2x + 1)mod 232, twice.Two modulo 232 additions described in the figure by + in a square.Two XOR operations described by + in a circle.Two fixed right rotations described by <<, and two fixed left rotations, all are data dependent and described in the figure by >>.The XOR operation is used as a mixing operation.
Sparse Compression-Based Image Encryption using Data Encryption Standards RC5
Published in IETE Technical Review, 2023
Arghya Pathak, Hrishikesh Mondal, Jayashree Karmakar, Subhashish Pal, Debasish Nandi, Mrinal Kanti Mandal
From the early days to the present, numerous cryptosystems have been developed, but none of them can demand that their system is fully resistive against several third-party attacks. With the improvement of the performance and speed of modern days computers, it becomes easier for the intervention to extract information from the cipher text in a short time. Therefore, it becomes a challenging task for the researchers to design an encryption mechanism that is unpredictable by nature as well as having a high key dependency. The encryption technique should be designed in such a way that it can resist unwanted intervention and provides robust security. Many image encryption algorithms have been reported to date, but all are basically confined within chaos and number theory-based encryption mechanisms [2–12]. A standard data encryption algorithm mainly works through three operations: diffusion, confusion and pixel permutation. DES, AES, RC5, RC6, etc. [13, 14] are some conventional encryption techniques used to encrypt different classes of text data [1, 2, 15, 16]. The well-known cryptographic algorithm like AES, and DES are useful for raw data of small size but in the case of digital images, these algorithms fail to provide the desired result. So, more non-linear science-based encryption techniques have been developed and become popular [3].
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Published in Cybernetics and Systems, 2023
Ozgu Can, Fursan Thabit, Asia Othman Aljahdali, Sharaf Al-Homdy, Hoda A. Alkhzaimi
The authors (Elgeldawi, Mahrous, and Sayed 2019) Studied the performance of the most prevalent symmetric cryptographic techniques in a cloud computing environment, including DES, 3DES, Blowfish, Twofish, RC2, RC5, RC6, and AES Comparison research was conducted based on the method structure, encryption and decryption timings, throughput, and memory usage. They also developed a hybrid encryption model to capitalize on each system’s ability to safeguard cloud data. A comparison of IDAs, SHA-512, 3DES, and AES-256 was performed by (Keer, Ali, and Sharma 2016).