Image Encryption Based on Multi-Level Keys on RC5 Algorithm

被引:4
|
作者
Jamil A.S. [1 ]
Rahma A.M.S. [2 ]
机构
[1] Department of Computer Technology Engineering, Al-Mansour University College, Baghdad
[2] Computer Science Department, Al-Maarif University College, Baghdad
关键词
4-state operation; Encryption and decryption operation; Modify rc5 algorithm; Multi-level keys; Rc5; algorithm;
D O I
10.3991/ijim.v16i17.34335
中图分类号
学科分类号
摘要
In recent years, the need to develop encryption algorithms has led to an increase in the working and efficiency of algorithms to protect the transmission and reception of information from any security breach. The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs only twice by working on its also, the algorithm is used for only 1 function (XOR) through the encryption process. A research report on digital image development by developing the RC5 algorithm makes that algorithm more secure by adding a new security level (using two keys) and thus increasing the key space. The encryption and decryption process can be done by substituting the XOR operation applied to Sixteen rounds of the algorithm with the new operation (#) based on the use of 2 keys, each of it consisting of 4 states (0,1,2,3) instead of using the traditional key that uses two states (0,1). This development of the RC5 algorithm increases the security and robustness of the hacking methods. © 2022,International Journal of Interactive Mobile Technologies.All Rights Reserved
引用
收藏
页码:101 / 115
页数:14
相关论文
共 50 条
  • [21] Multi-level Image Thresholding based on Improved Fireworks Algorithm
    Ma, Miao
    Zheng, Weige
    Wu, Jie
    Yang, Kaifang
    Guo, Min
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017, : 997 - 1004
  • [22] An area optimized implementation of cryptographic algorithm RC5
    Liang, Jing
    Wang, Qin
    Qi, Yue
    Yu, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4585 - 4588
  • [23] Multi-Level Encryption Framework
    Habboush, Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 130 - 134
  • [24] Image segmentation algorithm based on multi-level feature adaptive fusion
    Yuan X.-P.
    He X.
    Wang X.-Q.
    Hu Y.-M.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (10): : 1958 - 1966
  • [25] A multi-level thresholding image segmentation algorithm based on equilibrium optimizer
    Hu, Pei
    Han, Yibo
    Zhang, Zheng
    Chu, Shu-Chuan
    Pan, Jeng-Shyang
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [26] Bee Foraging Algorithm Based Multi-Level Thresholding For Image Segmentation
    Zhang, Zhicheng
    Yin, Jianqin
    IEEE ACCESS, 2020, 8 : 16269 - 16280
  • [27] Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic-Chebyshev Coupled Map
    Jiang, Mingfang
    Yang, Hengfu
    INFORMATION, 2023, 14 (08)
  • [28] Performance evaluation of different hardware models of RC5 algorithm
    Elkeelany, Omar
    Nimmagadda, Suman
    PROCEEDINGS OF THE THIRTY-NINTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2007, : 124 - +
  • [29] Multi-level Thresholding Algorithm For Color Image Segmentation
    Nimbarte, Nita M.
    Mushrif, Milind M.
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: ICCEA 2010, PROCEEDINGS, VOL 2, 2010, : 231 - 233
  • [30] A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
    Rahman, Shahid
    Uddin, Jamal
    Hussain, Hameed
    Ahmed, Aftab
    Khan, Ayaz Ali
    Zakarya, Muhammad
    Rahman, Afzal
    Haleem, Muhammad
    SCIENTIFIC REPORTS, 2023, 13 (01)