Image Encryption Based on Multi-Level Keys on RC5 Algorithm

被引:4
|
作者
Jamil A.S. [1 ]
Rahma A.M.S. [2 ]
机构
[1] Department of Computer Technology Engineering, Al-Mansour University College, Baghdad
[2] Computer Science Department, Al-Maarif University College, Baghdad
关键词
4-state operation; Encryption and decryption operation; Modify rc5 algorithm; Multi-level keys; Rc5; algorithm;
D O I
10.3991/ijim.v16i17.34335
中图分类号
学科分类号
摘要
In recent years, the need to develop encryption algorithms has led to an increase in the working and efficiency of algorithms to protect the transmission and reception of information from any security breach. The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs only twice by working on its also, the algorithm is used for only 1 function (XOR) through the encryption process. A research report on digital image development by developing the RC5 algorithm makes that algorithm more secure by adding a new security level (using two keys) and thus increasing the key space. The encryption and decryption process can be done by substituting the XOR operation applied to Sixteen rounds of the algorithm with the new operation (#) based on the use of 2 keys, each of it consisting of 4 states (0,1,2,3) instead of using the traditional key that uses two states (0,1). This development of the RC5 algorithm increases the security and robustness of the hacking methods. © 2022,International Journal of Interactive Mobile Technologies.All Rights Reserved
引用
收藏
页码:101 / 115
页数:14
相关论文
共 50 条
  • [1] THE RC5 ENCRYPTION ALGORITHM
    RIVEST, RL
    DR DOBBS JOURNAL, 1995, 20 (01): : 146 - &
  • [2] Digital Image Encryption Based on the RC5 Block Cipher Algorithm
    Faragallah, Osama S.
    SENSING AND IMAGING, 2011, 12 (3-4): : 73 - 94
  • [3] Efficient modified RC5 based on chaos adapted to image encryption
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    JOURNAL OF ELECTRONIC IMAGING, 2010, 19 (01)
  • [4] On differential and linear cryptanalysis of the RC5 encryption algorithm
    Kaliski, BS
    Yin, YL
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 171 - 184
  • [5] Linearly weak keys of RC5
    Heys, HM
    ELECTRONICS LETTERS, 1997, 33 (10) : 836 - 838
  • [6] Sparse Compression-Based Image Encryption using Data Encryption Standards RC5
    Pathak, Arghya
    Mondal, Hrishikesh
    Karmakar, Jayashree
    Pal, Subhashish
    Nandi, Debasish
    Mandal, Mrinal Kanti
    IETE TECHNICAL REVIEW, 2024, 41 (03) : 353 - 365
  • [7] The design of encryption system based on RC5 arithmetic
    Liang, SongFeng
    Dong, ZhuRong
    Qiu, Hao
    ADVANCED DESIGN TECHNOLOGY, PTS 1-3, 2011, 308-310 : 1370 - 1374
  • [8] A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5
    Alexan, Wassim
    Youssef, Mohamed
    Hussein, Hisham H.
    Ahmed, Karim K.
    Hosny, Khalid M.
    Fathy, Abdallah
    Mansour, Marvy Badr Monir
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [9] Area optimized architecture and VLSI implementation of RC5 encryption algorithm
    Sklavos, N
    Machas, C
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 172 - 175
  • [10] Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm
    Bertoni, G
    Breveglieri, L
    Koren, I
    Maistri, P
    Piuri, V
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 423 - 432