THE SECURITY OF TEXT DATA BASED ON CYCLIC CODES OVER ALGEBRAIC STRUCTURE

被引:0
|
作者
Bahaddad, Adel [1 ]
Asif, Muhammad [2 ]
Ashraf, M. Usman [3 ]
Asiri, Yousef [4 ]
Alkhalaf, Salem [5 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
[2] Univ Management & Technol, Dept Math, Sialkot Campus, Sialkot, Pakistan
[3] GC Women Univ Sialkot, Dept Comp Sci, Sialkot, Pakistan
[4] Najran Univ, Coll Comp Sci & Informat Syst, Najran, Saudi Arabia
[5] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah, Saudi Arabia
来源
THERMAL SCIENCE | 2024年 / 28卷 / 6B期
关键词
AES algorithm; cryptography; cipher text; cyclic codes; Galois field;
D O I
10.2298/TSCI2406205B
中图分类号
O414.1 [热力学];
学科分类号
摘要
The demand for network security is increasing exponentially as businesses strive to protect personal data from theft or loss. Data security is a paramount concern for both individuals and organizations engaged in various forms of communication, particularly in cyberspace due to the rise of digital computing and communication. With the rapid advancement in digital data exchange, securing information during transmission and storage has become increasingly critical. Given the extensive use of text in security agencies and industries, it is crucial to protect confidential text data from unauthorized access. This paper proposes the use of Bose Chaudhary Hochquenghem (BCH) codes over the Galois field in a modified advanced encryption standard (AES) algorithm to secure text data. Secret keys are generated using the generator polynomial of BCH codes over the Galois field, which is also applied to construct maximum distance separable (MDS) matrices. The proposed scheme enhances the mixed column operation and sub-key construction steps of the AES algorithm using BCH codes over the Galois field. The secret key, based on the designed distance of BCH codes, is difficult to predict using exhaustive key search methods. The avalanche effect test, involving single-bit changes in plaintext and secret keys, along with the popular national institute of standards and technology (KIST) test, confirms that the proposed scheme improves ciphertext encryption. Sethe future, this approach could be adapted for encrypting images, audio, and video.
引用
收藏
页码:5205 / 5215
页数:11
相关论文
共 50 条
  • [1] Algebraic structure of cyclic codes over M3(Fp)
    Islam, Habibul
    Prakash, Om
    Bhunia, Dipak Kumar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (01): : 189 - 201
  • [2] Novel algebraic structure for cyclic codes
    Bac, Dang Hoai
    Binh, Nguyen
    Quynh, Nguyen Xuan
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2007, 4851 : 301 - 310
  • [3] ON THE ALGEBRAIC PARAMETERS OF CONVOLUTIONAL CODES WITH CYCLIC STRUCTURE
    Gluesing-Luerssen, Heide
    Langfeld, Barbara
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2006, 5 (01) : 53 - 76
  • [4] On row-cyclic codes with algebraic structure
    Sabin, Roberta Evans
    Designs, Codes, and Cryptography, 1994, 4 (02)
  • [5] The concatenated structure of cyclic codes over
    Cao, Yuan
    Cao, Yonglin
    Li, Qingguo
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2016, 52 (1-2) : 363 - 385
  • [6] Algebraic characterization of MDS group codes over cyclic groups
    Zain, AA
    Rajan, BS
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 2052 - 2056
  • [7] Algebraic characterization of MDS group codes over cyclic groups
    Zain, A.A.
    Rajan, B.Sundar
    IEEE Transactions on Information Theory, 1995, 41 (6 pt 2): : 2052 - 2056
  • [8] A Classification of Linear Codes Based on Algebraic Structures and Local Cyclic Codes
    Nguyen Trung Hieu
    Nguyen Van Trung
    Nguyen Binh
    2014 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2014, : 349 - 354
  • [9] Design of algebraic cyclic codes
    Oggier, Frederique
    2008 IEEE INFORMATION THEORY WORKSHOP, 2008, : 81 - 85
  • [10] Quantum codes from cyclic codes over the mixed alphabet structure
    Ashraf, Mohammad
    Khan, Naim
    Mohammad, Ghulam
    QUANTUM INFORMATION PROCESSING, 2022, 21 (05)