What is it about?

The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption, and permutation powers.

Featured Image

Why is it important?

The proposed algorithm described in this paper based on Rubik's cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption, and permutation powers. The XOR and XNOR operators applied on the even and odd rows of the image with two keys. The main strength of the proposed algorithm lies in the large keyspaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different keyspaces at multiple stages of the algorithm. Moreover, the effectiveness and the security analysis tests show that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks than other image encryption algorithms. The performance assessment tests based on different parameters also show that it has the capabilities of fast encryption and decryption appropriate for real-time wireless transmission encryption applications over the Internet.

Perspectives

Image encryption techniques have increased over the years to make secure image transmission over both wired and wireless networks. Encryption algorithms like DES and AES, which are both private encryption techniques, DES encryption schemes for image encryption applications have low efficiency because of bulk data of the image. The proposed image has great potential to be used for lower computational devices.

Showkat Ahmad Bhat
National Tsing Hua University

Read the Original

This page is a summary of: A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices, International Journal of Sensors Wireless Communications and Control, September 2020, Bentham Science Publishers,
DOI: 10.2174/2210327909666190408094102.
You can read the full text:

Read

Contributors

The following have contributed to this page