THERMAL SCIENCE

International Scientific Journal

THE SECURITY OF TEXT DATA BASED ON CYCLIC CODES OVER ALGEBRAIC STRUCTURE

ABSTRACT
The demand for network security is increasing exponentially as businesses strive to protect personal data from theft or loss. Data security is a paramount concern for both individuals and organizations engaged in various forms of communication, particularly in cyberspace due to the rise of digital computing and communication. With the rapid advancement in digital data exchange, securing information during transmission and storage has become increasingly critical. Given the extensive use of text in security agencies and industries, it is crucial to protect confidential text data from unauthorized access. This paper proposes the use of Bose Chaudhary Hochquenghem (BCH) codes over the Galois field in a modified advanced encryption standard (AES) algorithm to secure text data. Secret keys are generated using the generator polynomial of BCH codes over the Galois field, which is also applied to construct maximum distance separable (MDS) matrices. The proposed scheme enhances the mixed column operation and sub-key construction steps of the AES algorithm using BCH codes over the Galois field. The secret key, based on the designed distance of BCH codes, is difficult to predict using exhaustive key search methods. The avalanche effect test, involving single-bit changes in plaintext and secret keys, along with the popular national institute of standards and technology (NIST) test, confirms that the proposed scheme improves ciphertext encryption. Security analysis results demonstrate better encryption performance for text data. In the future, this approach could be adapted for encrypting images, audio, and video.
KEYWORDS
PAPER SUBMITTED: 2024-07-13
PAPER REVISED: 2024-10-05
PAPER ACCEPTED: 2024-11-02
PUBLISHED ONLINE: 2025-01-25
DOI REFERENCE: https://doi.org/10.2298/TSCI2406205B
CITATION EXPORT: view in browser or download as text file
THERMAL SCIENCE YEAR 2024, VOLUME 28, ISSUE Issue 6, PAGES [5205 - 5215]
REFERENCES
  1. Shannon, C. E., Communication Theory of Secrecy Systems, Bell System Technical Journal, 28 (1949), 4, pp. 656-715
  2. Heys, H. M., Tavares, S. E., The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis, Proceedings, 2nd ACM Conference on Computer and Communications Security, Fairfax, Va, USA, 1994, pp. 148-155
  3. Heys, H. M., Tavares, S. E., The Design of Product Ciphers Resistant to Differential and Linear Cryptanalysis, Journal of Cryptology, 9 (1996), 1, pp. 1-19
  4. Heys, H .M., Tavares, S. E., Avalanche Characteristics Oo Substitution-Permutation Encryption Networks, IEEE Transactions on Computers, 44 (1995), 9, pp. 1131-1139
  5. Rijmen, V., et al., The Cipher SHARK, In Fast Software Encryption: Proceedings, 3rd International Workshop, Cambridge, UK, 1996, pp. 99-111
  6. Daemen, J., Rijmen, V., The Rijndael Block Cipher: AES Proposal, Proceedings, 1st Candidate Conference (AeS1), London, UK, 1999, pp. 343-348
  7. Schneier, B., et al., Twofish: A 128-Bit Block Cipher, NIST AES Proposal, 15 (1998), 1, pp. 23-91
  8. Schneier, B., et al., The Twofish Team's Final Comments on AES Selection, AES Round, 2 (2000), 1, pp. 1-13
  9. El Maraghy, M., et al., Real-Time Efficient FPGA Implementation of AES Algorithm, Proceedings, IEEE International SOC Conference, Erlangen, Germany, 2013, pp. 203-208
  10. Singh, L. D., Singh, K. M., Implementation of Text Encryption Using Elliptic Curve Cryptography, Procedia Computer Science, 54 (2015), Dec., pp. 73-82
  11. Shah, T., et al., Statistical Analysis of S-Box in Image Encryption Applications Based on Majority Logic Criterion, International Journal of Physical Sciences, 6 (2011), 16, pp. 4110-4127
  12. Shah, T., Shah, D., Construction of Highly Non-Linear S-Boxes for Degree 8 Primitive Irreducible Polynomials over ℤ2, Multimedia Tools and Applications, 78 (2019), 2, pp. 1219-1234
  13. Naseer, Y., et al., A Novel Algorithm of Constructing Highly Non-linear Sp-boxes, Cryptography, 3 (2019), 1, pp. 1-6
  14. Mathivanan, P., et al., The QR Code-Based ECG Signal Encryption/Decryption Algorithm, Cryptologia, 43 (2019), 3, pp. 233-253
  15. Kamali, S. H., et al., A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption, Proceedings, International Conference on Electronics and Information Engineering, 2010, Kyoto, Japan, Vol. 1, pp. V1-141
  16. Asif, M., Shah, T., The BCH Codes with Computational Approach and Its Applications in Image Encryption, Journal of Intelligent and Fuzzy Systems, 37 (2019), 4, pp. 3925-3939
  17. Gao, S., et al., Asynchronous Updating Boolean Network Encryption Algorithm, IEEE Transactions on Circuits and Systems for Video Technology, 33 (2023), 8, pp. 4388-4400
  18. Gao., S., et al., A 3-D Model Encryption Scheme Based on a Cascaded Chaotic System, Signal Processing, 202 (2023), 108745
  19. Gao, S., et al., The EFR-CSTP: Encryption for Face Recognition Based on the Chaos and Semi-Tensor Product Theory, Information Sciences, 621 (2023), Apr., pp. 766-781
  20. Alanazi, A. S., et al., Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution boxes, IEEE Access, 9 (2021), June, pp. 93795-93802
  21. Khan, M., et al., An Efficient Image Encryption Scheme Based on Double Affine Substitution Box and Chaotic System, Integration, 81 (2021), Nov., pp. 108-122
  22. Asif, M., et al., A Novel Image Encryption Technique Based on Mobius Transformation, Computational Intelligence and Neuroscience, 2021 (2021), 1, pp. 1-14
  23. Naseer, Y., et al., Advance Image Encryption Technique Utilizing Compression, Dynamical System and S-Boxes, Mathematics and Computers in Simulation, 178 (2020), Dec., pp. 207-217
  24. Naseer, Y., et al., A Novel Approach to Improve Multimedia Security Utilizing 3-D Mixed Chaotic Map, Microprocessors and Microsystems, 65 (2019), Mar., pp. 1-6
  25. Naseer, Y., et al., A Novel Hybrid Permutation Substitution Base Colored Image Encryption Scheme for Multimedia Data, Journal of Information Security and Applications, 59 (2021), 102829
  26. Khan, M., et al., An Efficient Method for the Construction of Block Cipher with Multi-Chaotic Systems, Non-Linear Dynamics, 71 (2013), 3, pp. 489-492
  27. Khan, M., Masood, F., A Novel Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps, Multimedia Tools and Applications, 78 (2019), 18, pp. 26203-26222
  28. Hussain, I., et al., A Novel Image Encryption Algorithm Based on Chaotic Maps and GF (28) Exponent Transformation, Non-Linear Dynamics, 72 (2013), 1, pp. 399-406
  29. Hussain, I., et al., Image Encryption Algorithm Based on PGL (2, GF (28)) S-Boxes and TD-ERCS Chaotic Sequence, Non-linear Dynamics, 70 (2012), 1, pp.181-198
  30. Rayarikar, R., et al., The SMS Encryption Using AES Algorithm on Android, International Journal of Computer Applications, 50 (2012), 19, pp. 12-17
  31. Padate, R., Patel, A., Encryption and Decryption of Text Using AES Algorithm, International Journal of Emerging Technology and Advanced Engineering, 4 (2014) 5, pp. 54-69
  32. Mahboob, A., et al., A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation, IEEE Access, 10 (2022), Dec., pp. 132908-132916
  33. Khalid, I., et al., An Integrated Image Encryption Scheme Based on Elliptic Curve, IEEE Access, 11 (2022), Dec., pp. 5483-5501
  34. Abdullah, A. M., Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data, Cryptography and Network Security, 16 (2017), 1, 11
  35. Alemami, Y., et al., Advanced Approach for Encryption Using Advanced Encryption Standard with Chaotic Map, Int. J. Electr. Comput. Eng, 13 (2023), 2, 1708
  36. Asif, M., et al., A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field, in: Computational Intelligence and Neuroscience, Wiley, New York, USA, 2022, pp. 1-9
  37. Hussain, S., Redesigning the Serpent Algorithm by PA-Loop and its Image Encryption Application, IEEE Access, 11 (2023), Mar., pp. 29698-29710
  38. Abu-Faraj, M., et al., Increasing the Security of Transmitted Text Messages Using Chaotic Key and Image Key Cryptography, International Journal of Data and Network Science, 7 (2023), 2, pp. 809-820
  39. Kumar, M., et al., Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique, Proceedings, 2nd International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2022, pp. 1453-1457
  40. Noor, N. S., et al., A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication, Computers, 11 (2022), 3, pp. 1-16

2025 Society of Thermal Engineers of Serbia. Published by the Vinča Institute of Nuclear Sciences, National Institute of the Republic of Serbia, Belgrade, Serbia. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 International licence