Image Encryption Based on Multi-Level Keys on RC5 Algorithm

被引:4
|
作者
Jamil A.S. [1 ]
Rahma A.M.S. [2 ]
机构
[1] Department of Computer Technology Engineering, Al-Mansour University College, Baghdad
[2] Computer Science Department, Al-Maarif University College, Baghdad
关键词
4-state operation; Encryption and decryption operation; Modify rc5 algorithm; Multi-level keys; Rc5; algorithm;
D O I
10.3991/ijim.v16i17.34335
中图分类号
学科分类号
摘要
In recent years, the need to develop encryption algorithms has led to an increase in the working and efficiency of algorithms to protect the transmission and reception of information from any security breach. The RC5 type encryption algorithm is the most common and closest to perfection and symmetry algorithms, knowing that it faces many problems in which data collection was limited because it occurs only twice by working on its also, the algorithm is used for only 1 function (XOR) through the encryption process. A research report on digital image development by developing the RC5 algorithm makes that algorithm more secure by adding a new security level (using two keys) and thus increasing the key space. The encryption and decryption process can be done by substituting the XOR operation applied to Sixteen rounds of the algorithm with the new operation (#) based on the use of 2 keys, each of it consisting of 4 states (0,1,2,3) instead of using the traditional key that uses two states (0,1). This development of the RC5 algorithm increases the security and robustness of the hacking methods. © 2022,International Journal of Interactive Mobile Technologies.All Rights Reserved
引用
收藏
页码:101 / 115
页数:14
相关论文
共 50 条
  • [41] An Efficient Image Encryption Algorithm Based on Innovative DES Structure and Hyperchaotic Keys
    Li, Shih-Yu
    Gai, Yanwen
    Shih, Kai-Chung
    Chen, Chin-Sheng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 70 (10) : 4103 - 4111
  • [42] Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys
    Al-Hazaimeh, Obaida M.
    Al-Jamal, Mohammad F.
    Alhindawi, Nouh
    Omari, Abedalkareem
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (07): : 2395 - 2405
  • [43] Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys
    Obaida M. Al-Hazaimeh
    Mohammad F. Al-Jamal
    Nouh Alhindawi
    Abedalkareem Omari
    Neural Computing and Applications, 2019, 31 : 2395 - 2405
  • [44] Enhancement of RC6 Block Cipher Algorithm and Comparison with RC5 & RC6
    Verma, Harsh Kumar
    Singh, Ravindra Kumar
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 556 - 561
  • [45] Multi-level Scheduling Algorithm Based on Storm
    Wang, Jie
    Hang, Siguang
    Liu, Jiwei
    Chen, Weihao
    Hou, Gang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (03): : 1091 - 1110
  • [46] Improving Stored Data Security In Cloud Using Rc5 Algorithm
    Singh, Jay
    Kumar, Brajesh
    Khatri, Asha
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [47] Enhancing Satellite Image Security Through Multiple Image Encryption via Hyperchaos, SVD, RC5, and Dynamic S-Box Generation
    Youssef, Mohammed
    Gabr, Mohamed
    Alexan, Wassim
    Mansour, Marvy Badr Monir
    Kamal, Karim
    Hosny, Hisham
    El-Damak, Dina
    IEEE ACCESS, 2024, 12 : 123921 - 123945
  • [48] Selection of Parameter 'r' in RC5 Algorithm on the basis of Prime Number
    Gill, Harsimranjit Singh
    2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [49] A novel algorithm for the multi-level semantic information of image searching
    Yi, Ouyang
    Zhang-Zhiyong
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 758 - +
  • [50] A novel algorithm for the multi-level semantic ecommerce image searching
    Ouyang Yi
    Yun Ling
    Zhiyong Zhang
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 639 - 646