scholarly journals RSA ALGORITHM ELEMENTS IN TERNARY AFFINE TRANSFORMATIONS IN ENCRYPTION-DECRYPTION OF IMAGES

2020 ◽  
Vol 81 (4) ◽  
pp. 25-29
Author(s):  
Anatoliy Kovalchuk ◽  
◽  
Nataliia Lotoshynska ◽  
Mariia Podavalkina ◽  
Khrystyna Pelekh ◽  
...  
2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


2014 ◽  
Vol 543-547 ◽  
pp. 3610-3613
Author(s):  
You Guo Li

Montgomery algorithm will die N operation into shift operation, optimized Systolic array with fewer resources to achieve efficient Montgomery algorithm, and the application of power conversion technology to further improve the RSA encryption,decryption speed. In order to make full use of FPGA resources, this paper analyzes the impact of the Systolic array at different levels of granularity on the performance of the system, and gives the realization and S = key and encryption,decryption information are RSA encryption system of s hardware 1024 time results.


2015 ◽  
Vol 14 (12) ◽  
pp. 6361-6367 ◽  
Author(s):  
Ari Shawkat Tahir

RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet.  The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a new architecture and modeling has been proposed for RSA public key algorithm, the suggested system uses 1024-bit RSA encryption/decryption for restricted system. The system uses the multiply and square algorithm to perform modular operation. The design has been described by VHDL and simulated by using Xilinx ISE 12.2 tool. The architectures have been implemented on reconfigurable platforms FPGAs. Accomplishment when implemented on Xilinx_Spartan3 (device XC3S50, package PG208, speed -4) which confirms that the proposed architectures have minimum hardware resource, where only 29% of the chip resources are used for RSA algorithm design with realizable operating clock frequency of 68.573 MHz.


System security is a basic aspect of data sharing. Aspires have been made to exhaust particular defects over the web. For this, different creative usage and security methods have been made. The measure of information exchange isn't a factor. The major factor is, how much it's secure, the channel gives while transmitting information. Cryptography is one such structure, which grants secure information transmission without losing its protection and uprightness. In light of the key circulation, cryptography is also assembled into two critical forms Symmetric Key Cryptography as well as Asymmetric Key Cryptography. RSA is one of the best conspicuous public-key cryptography based algorithms is unequivocally utilized for encryption/decryption. It's far based on the logical arrangement of factorization of strongly enormous whole numbers which is a compute-intensive way. In this paper, we have provided a novel, secure and profitable information communication system dependent on the RSA algorithm. Mystery updating signal dealing with systems have been proposed in the exploration for the two data transmission and the channel estimation stages. The proposed one facilitates the advantages of both RSA calculation and One Time Password (OTP) produced by the sender and got just by the endorsed customer. Despite that not at all like conventional RSA algorithm, in this work we embrace perfect key assurance by particle swarm optimization (PSO) during both encryption and decryption. The use of PSO for perfect key decision makes the general technique proficient by extending the security level and making the computation procedure very easy.


2020 ◽  
Vol 2 (1) ◽  
pp. 37-42
Author(s):  
A. M. Kovalchuk ◽  

The images are one of the most used kinds of the information in modern information company. Therefore actual problems is the organization of protection from unauthorized access and usage. An important characteristic of the image is the presence of contours in the image. The task of contour selection requires the use of operations on adjacent elements that are sensitive to change and suppress areas of constant levels of brightness, that is, contours are those areas where changes occur, becoming light, while other parts of the image remain dark. Mathematically, the ideal outline is to break the spatial function of the brightness levels in the image plane. Therefore, contour selection means finding the most dramatic changes, that is, the maxima of the gradient vector module. This is one of the reasons that the contours remain in the image when encrypted in the RSA system, since the encryption here is based on a modular elevation of some natural number. At the same time, on the contour and on the neighboring contours of the peak villages, the elevation of the brightness value gives an even bigger gap. Problem protect from unauthorized access is by more composite in matching with a problem protect from usage. Basis for organization of protection is the interpretation of the image as stochastic signal. It stipulates carry of methods of encoding of signals on a case of the images. But the images are a specific signal, which one in possesses, is padding to representative selfless creativeness, also by visual selfless creativeness. Therefore to methods of encoding, in case of their usage concerning the images, one more requirement – full noise of the coded image is put forward. It is necessary to make to impossible usage of methods of visual image processing. The algorithm RSA is one of the most used production specifications of encoding of signals. In attitude of the images there are some problems of its encoding, the contours on the coded image are in particular saved. Therefore actual problem is the mining of modification to a method RSA such, that: to supply stability to decoding; to supply full noise of the images. One of pathes of the solution of this problem is usage of affine transformations.


2017 ◽  
Vol 1 (1) ◽  
pp. 1
Author(s):  
Muhammad Yasin Simargolang

Abstract - Cryptography is an art and science to maintain data security. In maintaining the security of cryptographic data transforming clear data (plaintext) into a password (ciphertext) that cannot be recognized. This ciphertext is then sent by the sender to the recipient. After arriving at the recipient, the ciphertext is transformed back into a plaintext form so that it can be recognized. The method used is the encryption method asymmetrical Rivest Shamir Adleman (RSA). The security of the RSA algorithm lies in the difficulty of factoring large numbers into prime factors. Factoring is done to obtain a private key. Making this application using the PHP programming language. The final result is a desktop-based application that can be used to encrypt text files. This application can be used as a way to secure data, because only authorized people can view encrypted data. Keywords - Cryptography, RSA, Encryption - Decryption, Text, PHP


Author(s):  
Bernhard M¨uhlherr ◽  
Holger P. Petersson ◽  
Richard M. Weiss

This chapter presents some results about groups generated by reflections and the standard metric on a Bruhat-Tits building. It begins with definitions relating to an affine subspace, an affine hyperplane, an affine span, an affine map, and an affine transformation. It then considers a notation stating that the convex closure of a subset a of X is the intersection of all convex sets containing a and another notation that denotes by AGL(X) the group of all affine transformations of X and by Trans(X) the set of all translations of X. It also describes Euclidean spaces and assumes that the real vector space X is of finite dimension n and that d is a Euclidean metric on X. Finally, it discusses Euclidean representations and the standard metric.


Author(s):  
Ali Saleh Al Najjar

Absolute protection is a difficult issue to maintain the confidentiality of images through their transmission over open channels such as internet or networks and is a major concern in the media, so image Cryptography becomes an area of attraction and interest of research in the field of information security. The paper will offer proposed system that provides a special kinds of image Encryption image security, Cryptography using RSA algorithm for encrypted images by HEX function to extract HEX Code and using RSA public key algorithm, to generate cipher image text. This approach provides high security and it will be suitable for secured transmission of images over the networks or Internet.


Sign in / Sign up

Export Citation Format

Share Document