DOI QR코드

DOI QR Code

Create a hybrid algorithm by combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image Encryption

  • Rania A. Tabeidi (Computer Department, College of Science and Humanities, Imam Abdulrahman Bin Faisal University ) ;
  • Hanaa F. Morse (Computer Department, College of Science and Humanities, Imam Abdulrahman Bin Faisal University ) ;
  • Samia M. Masaad (Computer Department, College of Science and Humanities, Imam Abdulrahman Bin Faisal University ) ;
  • Reem H. Al-shammari (Computer Department, College of Science and Humanities, Imam Abdulrahman Bin Faisal University ) ;
  • Dalia M. Alsaffar (Computer Department, College of Science and Humanities, Imam Abdulrahman Bin Faisal University )
  • Received : 2023.10.05
  • Published : 2023.10.30

Abstract

The greatest challenge of this century is the protection of stored and transmitted data over the network. This paper provides a new hybrid algorithm designed based on combination algorithms, in the proposed algorithm combined with Hill and the Advanced Encryption Standard Algorithms, to increase the efficiency of color image encryption and increase the sensitivity of the key to protect the RGB image from Keyes attackers. The proposed algorithm has proven its efficiency in encryption of color images with high security and countering attacks. The strength and efficiency of combination the Hill Chipper and Advanced Encryption Standard Algorithms tested by statical analysis for RGB images histogram and correlation of RGB images before and after encryption using hill cipher and proposed algorithm and also analysis of the secret key and key space to protect the RGB image from Brute force attack. The result of combining Hill and Advanced Encryption Standard Algorithm achieved the ability to cope statistically

Keywords

References

  1. Xingyuan Wang, Hui-li Zhang, Madhuviswanatham, A. V. N. Krishna, A color image encryption with heterogeneous bit -permutation and correlated chaos 2014 Elsevier 
  2. Y. Li, F. Zhang, Y. Li, et al., Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform, Opt. Lasers Eng. 72 (2015)18-25  https://doi.org/10.1016/j.optlaseng.2015.03.027
  3. J. Daemen and V. Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard J. Springer-Verlag. 2002:55-56 ). 
  4. S. Kartalopoulos, "Security of Information and Communication Networks", Wiley-IEEE Press, (2009). 
  5. Priyadarshini Patil, Prashant Narayankar, Narayan D G, Meena S Md, A Comprehensive Evaluation of Cryptographic Algorithms: DES,3DES, AES, RSA,Blowfish. ( 2016 ) 617 - 624 
  6. Hongjun Liu, Abdurahman Kadir, Yangling Li, 'Asymmetric color image encryption scheme using 2D discrete-time map (2015)104-112 
  7. KOCAREV L, Lian S, editors. Chaos based cryptography. Springer; 2011 
  8. K. Adinarayana Reddy, B. Vishnuvardhan, Madhuviswanatham, A. V. N. Krishna,'A Modified Hill Cipher Based on Circulant Matrices Procedia Technology Volume 42012Pages 114-118 
  9. Zhang, Q., & Ding, Q. (2015, September). Digital image encryption based on advanced encryption standard (aes). In 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC) (pp. 1218-1221). IEEE. 
  10. Reddy, M. I. S., & Kumar, A. S. (2016, January). Secured data transmission using wavelet based steganography and cryptography by using AES algorithm. In Elsevier, International Conference on Computational Modeling and Security (CMS), Procedia Computer Science (Vol. 85, pp. 62-69).
  11. Hraoui, S., Gmira, F., Abbou, M. F., Oulidi, A. J., & Jarjar, A. (2019). A new cryptosystem of color image using a dynamic-chaos Hill Cipher algorithm. Procedia computer science, 148, 399-408.  https://doi.org/10.1016/j.procs.2019.01.048
  12. Agung, A., Heryana, N., & Solehudin, A. (2020). Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security. Buana Information Technology and Computer Sciences (BIT and CS), 1(2), 42-45.  https://doi.org/10.36805/bit-cs.v1i2.1072
  13. Essaid, M., Akharraz, I., & Saaidi, A. (2019). Image encryption scheme based on a new secure variant of Hill Cipher and 1D chaotic maps. Journal of Information Security and Applications, 47, 173-187.  https://doi.org/10.1016/j.jisa.2019.05.006
  14. Almaiah, M. A., Dawahdeh, Z., Almomani, O., Alsaaidah, A., Al-khasawneh, A., & Khawatreh, S. (2020). A new hybrid text encryption approach over mobile ad hoc network. International Journal of Electrical and Computer Engineering (IJECE), 10(6), 6461-6471.  https://doi.org/10.11591/ijece.v10i6.pp6461-6471
  15. Das, B. K., & Garg, R. (2019, July). Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption. In 2019 International Conference on Communication and Electronics Systems (ICCES) (pp. 515-520). IEEE. 
  16. N. El-Fishawy and O. Zaid, "Quality of encryption measurementof bitmap images with rc6, mrc6, and rijndael block cipher algorithms," International Journal of Network Security, vol. 5, 
  17. Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. The Journal of Supercomputing, 75(10), 6663-6682. doi:10.1007/s11227-019-02878-7