ABSTRACT
The demand for network security is increasing exponentially as businesses strive to protect personal data from theft or loss. Data security is a paramount concern for both individuals and organizations engaged in various forms of communication, particularly in cyberspace due to the rise of digital computing and communication. With the rapid advancement in digital data exchange, securing information during transmission and storage has become increasingly critical. Given the extensive use of text in security agencies and industries, it is crucial to protect confidential text data from unauthorized access. This paper proposes the use of Bose Chaudhary Hochquenghem (BCH) codes over the Galois field in a modified advanced encryption standard (AES) algorithm to secure text data. Secret keys are generated using the generator polynomial of BCH codes over the Galois field, which is also applied to construct maximum distance separable (MDS) matrices. The proposed scheme enhances the mixed column operation and sub-key construction steps of the AES algorithm using BCH codes over the Galois field. The secret key, based on the designed distance of BCH codes, is difficult to predict using exhaustive key search methods. The avalanche effect test, involving single-bit changes in plaintext and secret keys, along with the popular national institute of standards and technology (NIST) test, confirms that the proposed scheme improves ciphertext encryption. Security analysis results demonstrate better encryption performance for text data. In the future, this approach could be adapted for encrypting images, audio, and video.
KEYWORDS
PAPER SUBMITTED: 2024-07-13
PAPER REVISED: 2024-10-05
PAPER ACCEPTED: 2024-11-02
PUBLISHED ONLINE: 2025-01-25
THERMAL SCIENCE YEAR
2024, VOLUME
28, ISSUE
Issue 6, PAGES [5205 - 5215]
- Shannon, C. E., Communication Theory of Secrecy Systems, Bell System Technical Journal, 28 (1949), 4, pp. 656-715
- Heys, H. M., Tavares, S. E., The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis, Proceedings, 2nd ACM Conference on Computer and Communications Security, Fairfax, Va, USA, 1994, pp. 148-155
- Heys, H. M., Tavares, S. E., The Design of Product Ciphers Resistant to Differential and Linear Cryptanalysis, Journal of Cryptology, 9 (1996), 1, pp. 1-19
- Heys, H .M., Tavares, S. E., Avalanche Characteristics Oo Substitution-Permutation Encryption Networks, IEEE Transactions on Computers, 44 (1995), 9, pp. 1131-1139
- Rijmen, V., et al., The Cipher SHARK, In Fast Software Encryption: Proceedings, 3rd International Workshop, Cambridge, UK, 1996, pp. 99-111
- Daemen, J., Rijmen, V., The Rijndael Block Cipher: AES Proposal, Proceedings, 1st Candidate Conference (AeS1), London, UK, 1999, pp. 343-348
- Schneier, B., et al., Twofish: A 128-Bit Block Cipher, NIST AES Proposal, 15 (1998), 1, pp. 23-91
- Schneier, B., et al., The Twofish Team's Final Comments on AES Selection, AES Round, 2 (2000), 1, pp. 1-13
- El Maraghy, M., et al., Real-Time Efficient FPGA Implementation of AES Algorithm, Proceedings, IEEE International SOC Conference, Erlangen, Germany, 2013, pp. 203-208
- Singh, L. D., Singh, K. M., Implementation of Text Encryption Using Elliptic Curve Cryptography, Procedia Computer Science, 54 (2015), Dec., pp. 73-82
- Shah, T., et al., Statistical Analysis of S-Box in Image Encryption Applications Based on Majority Logic Criterion, International Journal of Physical Sciences, 6 (2011), 16, pp. 4110-4127
- Shah, T., Shah, D., Construction of Highly Non-Linear S-Boxes for Degree 8 Primitive Irreducible Polynomials over ℤ2, Multimedia Tools and Applications, 78 (2019), 2, pp. 1219-1234
- Naseer, Y., et al., A Novel Algorithm of Constructing Highly Non-linear Sp-boxes, Cryptography, 3 (2019), 1, pp. 1-6
- Mathivanan, P., et al., The QR Code-Based ECG Signal Encryption/Decryption Algorithm, Cryptologia, 43 (2019), 3, pp. 233-253
- Kamali, S. H., et al., A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption, Proceedings, International Conference on Electronics and Information Engineering, 2010, Kyoto, Japan, Vol. 1, pp. V1-141
- Asif, M., Shah, T., The BCH Codes with Computational Approach and Its Applications in Image Encryption, Journal of Intelligent and Fuzzy Systems, 37 (2019), 4, pp. 3925-3939
- Gao, S., et al., Asynchronous Updating Boolean Network Encryption Algorithm, IEEE Transactions on Circuits and Systems for Video Technology, 33 (2023), 8, pp. 4388-4400
- Gao., S., et al., A 3-D Model Encryption Scheme Based on a Cascaded Chaotic System, Signal Processing, 202 (2023), 108745
- Gao, S., et al., The EFR-CSTP: Encryption for Face Recognition Based on the Chaos and Semi-Tensor Product Theory, Information Sciences, 621 (2023), Apr., pp. 766-781
- Alanazi, A. S., et al., Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution boxes, IEEE Access, 9 (2021), June, pp. 93795-93802
- Khan, M., et al., An Efficient Image Encryption Scheme Based on Double Affine Substitution Box and Chaotic System, Integration, 81 (2021), Nov., pp. 108-122
- Asif, M., et al., A Novel Image Encryption Technique Based on Mobius Transformation, Computational Intelligence and Neuroscience, 2021 (2021), 1, pp. 1-14
- Naseer, Y., et al., Advance Image Encryption Technique Utilizing Compression, Dynamical System and S-Boxes, Mathematics and Computers in Simulation, 178 (2020), Dec., pp. 207-217
- Naseer, Y., et al., A Novel Approach to Improve Multimedia Security Utilizing 3-D Mixed Chaotic Map, Microprocessors and Microsystems, 65 (2019), Mar., pp. 1-6
- Naseer, Y., et al., A Novel Hybrid Permutation Substitution Base Colored Image Encryption Scheme for Multimedia Data, Journal of Information Security and Applications, 59 (2021), 102829
- Khan, M., et al., An Efficient Method for the Construction of Block Cipher with Multi-Chaotic Systems, Non-Linear Dynamics, 71 (2013), 3, pp. 489-492
- Khan, M., Masood, F., A Novel Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps, Multimedia Tools and Applications, 78 (2019), 18, pp. 26203-26222
- Hussain, I., et al., A Novel Image Encryption Algorithm Based on Chaotic Maps and GF (28) Exponent Transformation, Non-Linear Dynamics, 72 (2013), 1, pp. 399-406
- Hussain, I., et al., Image Encryption Algorithm Based on PGL (2, GF (28)) S-Boxes and TD-ERCS Chaotic Sequence, Non-linear Dynamics, 70 (2012), 1, pp.181-198
- Rayarikar, R., et al., The SMS Encryption Using AES Algorithm on Android, International Journal of Computer Applications, 50 (2012), 19, pp. 12-17
- Padate, R., Patel, A., Encryption and Decryption of Text Using AES Algorithm, International Journal of Emerging Technology and Advanced Engineering, 4 (2014) 5, pp. 54-69
- Mahboob, A., et al., A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation, IEEE Access, 10 (2022), Dec., pp. 132908-132916
- Khalid, I., et al., An Integrated Image Encryption Scheme Based on Elliptic Curve, IEEE Access, 11 (2022), Dec., pp. 5483-5501
- Abdullah, A. M., Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data, Cryptography and Network Security, 16 (2017), 1, 11
- Alemami, Y., et al., Advanced Approach for Encryption Using Advanced Encryption Standard with Chaotic Map, Int. J. Electr. Comput. Eng, 13 (2023), 2, 1708
- Asif, M., et al., A Novel Image Encryption Technique Based on Cyclic Codes over Galois Field, in: Computational Intelligence and Neuroscience, Wiley, New York, USA, 2022, pp. 1-9
- Hussain, S., Redesigning the Serpent Algorithm by PA-Loop and its Image Encryption Application, IEEE Access, 11 (2023), Mar., pp. 29698-29710
- Abu-Faraj, M., et al., Increasing the Security of Transmitted Text Messages Using Chaotic Key and Image Key Cryptography, International Journal of Data and Network Science, 7 (2023), 2, pp. 809-820
- Kumar, M., et al., Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique, Proceedings, 2nd International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2022, pp. 1453-1457
- Noor, N. S., et al., A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication, Computers, 11 (2022), 3, pp. 1-16