Image Encryption Based on Multi-Level Keys on RC5 Algorithm

被引:4
|
作者
Jamil A.S. [1 ]
Rahma A.M.S. [2 ]
机构
[1] Department of Computer Technology Engineering, Al-Mansour University College, Baghdad
[2] Computer Science Department, Al-Maarif University College, Baghdad
关键词
4-state operation; Encryption and decryption operation; Modify rc5 algorithm; Multi-level keys; Rc5; algorithm;
D O I
10.3991/ijim.v16i17.34335
中图分类号
学科分类号
摘要
In recent years, the need to develop encryption algorithms has led to an increase in the working and efficiency of algorithms to protect the transmission and reception of information from any security breach. The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs only twice by working on its also, the algorithm is used for only 1 function (XOR) through the encryption process. A research report on digital image development by developing the RC5 algorithm makes that algorithm more secure by adding a new security level (using two keys) and thus increasing the key space. The encryption and decryption process can be done by substituting the XOR operation applied to Sixteen rounds of the algorithm with the new operation (#) based on the use of 2 keys, each of it consisting of 4 states (0,1,2,3) instead of using the traditional key that uses two states (0,1). This development of the RC5 algorithm increases the security and robustness of the hacking methods. © 2022,International Journal of Interactive Mobile Technologies.All Rights Reserved
引用
收藏
页码:101 / 115
页数:14
相关论文
共 50 条
  • [31] A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
    Shahid Rahman
    Jamal Uddin
    Hameed Hussain
    Aftab Ahmed
    Ayaz Ali Khan
    Muhammad Zakarya
    Afzal Rahman
    Muhammad Haleem
    Scientific Reports, 13
  • [32] Image Blind Deblurring Algorithm Based on Deep Multi-level Wavelet Transform
    Chen Shuzhen
    Cao Shipeng
    Cui Meiyue
    Lian Qiusheng
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 154 - 161
  • [33] Underwater image enhancement algorithm based on GAN and multi-level wavelet CNN
    Wen, Pei-Zhi
    Chen, Jun-Mou
    Xiao, Yan-Nan
    Wen, Ya-Yuan
    Huang, Wen-Ming
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (02): : 213 - 224
  • [34] Image Blind Deblurring Algorithm Based on Deep Multi-level Wavelet Transform
    Chen, Shuzhen
    Cao, Shipeng
    Cui, Meiyue
    Lian, Qiusheng
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2021, 43 (01): : 154 - 161
  • [35] Multi-level image thresholding based on social spider algorithm for global optimization
    Rahkar Farshi T.
    Orujpour M.
    International Journal of Information Technology, 2019, 11 (4) : 713 - 718
  • [36] Image-text matching algorithm based on multi-level semantic alignment
    Li Y.
    Yao T.
    Zhang L.
    Sun Y.
    Fu H.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2024, 50 (02): : 551 - 558
  • [37] Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext
    Zhu Congxu
    Sun Kehui
    CHINA COMMUNICATIONS, 2012, 9 (01) : 73 - 79
  • [38] Complete SAT based Cryptanalysis of RC5 Cipher
    Sobon, Artur
    Kurkowski, Miroslaw
    Stachowiak, Sylwia
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2020, 44 (02) : 365 - 382
  • [39] An image encryption algorithm based on mixed chaotic dynamic systems and external keys
    Fei, P
    Qiu, SS
    Min, L
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 1135 - 1139
  • [40] Implementation of the Enhanced RC5 (ERC5) Algorithm in an RFID-based Payment Scheme
    Villanueva, Excel B.
    Gerardo, Bobby D.
    Medina, Ruji P.
    2018 2ND INTERNATIONAL CONFERENCE ON BUSINESS AND INFORMATION MANAGEMENT (ICBIM 2018), 2018, : 6 - 10