Session key based fast, secure and lightweight image encryption algorithm

被引:0
|
作者
Manish Gupta
Kamlesh Kumar Gupta
Piyush Kumar Shukla
机构
[1] UIT-RGPV,Department of Computer Science and Engineering
[2] RJIT,Department of Information Technology
来源
关键词
Encryption algorithm; Decryption algorithm; Session key; Crossover operator; Mutation operator; Block cipher;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been proposed, some of the algorithms are based on symmetric-key cryptography and others are based on asymmetric key cryptography. This work proposed a fast, secure, and lightweight symmetric image cryptographic algorithm based on the session key. In this work, for every image encryption, a new session key is generated. Here session keys are generated with the help of crossover and mutation operators of genetic algorithm. This proposed algorithm uses a 64-bit plain text and requires an 80-bit key, where 64-bits of a key is generated via symmetric hexadecimal key and the remaining 16-bits of a key are randomly added, to encrypt the image. Here crossover and mutation operators are used to generate random 64-bits of a key. The proposed algorithm will work for both color and grayscale images. The proposed algorithm is simulated on MATLAB 2017 platform and compared with similar types of the existing algorithm on various parameters.
引用
收藏
页码:10391 / 10416
页数:25
相关论文
共 50 条
  • [31] A fast image encryption algorithm based on chaotic map
    Liu, Wenhao
    Sun, Kehui
    Zhu, Congxu
    OPTICS AND LASERS IN ENGINEERING, 2016, 84 : 26 - 36
  • [32] Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    Ma, Junchao
    Al Sibahee, Mustafa A.
    Nyangaresi, Vincent Omollo
    Honi, Dhafer G.
    Abdulsada, Ayad, I
    Jiao, Xianlong
    IEEE ACCESS, 2022, 10 : 26257 - 26270
  • [33] VLSI Implementation of Text to Image Encryption Algorithm based on Private Key Encryption
    Suresh, Anjali
    Ajai, Remya A. S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 4879 - 4881
  • [34] Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture
    Song, Yanjie
    Zhu, Zhiliang
    Zhang, Wei
    Yu, Hai
    Zhao, Yuli
    IEEE ACCESS, 2019, 7 : 84386 - 84400
  • [35] A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map
    Liu, Hui
    Zhao, Bo
    Zou, Jianwen
    Huang, Linquan
    Liu, Yifan
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution
    Alghamdi, Yousef
    Munir, Arslan
    Ahmad, Jawad
    ENTROPY, 2022, 24 (10)
  • [37] Permutated Symmetric Key for Perfect Lightweight Image Encryption
    Janakiraman, Siva
    Roshini, P.
    Rajagopalan, Sundararaman
    Thenmozhi, K.
    Amirtharajan, Rengarajan
    2018 4TH INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS), 2018, : 80 - 83
  • [38] A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication
    Noor, Noor Sattar
    Hammood, Dalal Abdulmohsin
    Al-Naji, Ali
    Chahl, Javaan
    COMPUTERS, 2022, 11 (03)
  • [39] A Fast and Secure Image Encryption Algorithm Using Number Theoretic Transforms and Discrete Logarithms
    Chandrasekaran, Jeyamala
    Jayaraman, Thiruvengadam S.
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2015,
  • [40] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Bhaskar Mondal
    Prabhakar Kumar
    Shrey Singh
    Multimedia Tools and Applications, 2018, 77 : 31177 - 31198