2022
DOI: 10.3390/sym14040664
|View full text |Cite
|
Sign up to set email alerts
|

A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography

Abstract: Standard methods used in the encryption and decryption process are implemented to protect confidential data. These methods require many arithmetic and logical operations that negatively affect the performance of the encryption process. In addition, they use private keys of a specific length, in addition to the fixed length of the data block used in encryption, which may provide the possibility of penetration of these methods, thus decreasing the level of security. In this research paper, a new method of digita… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
43
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

5
1

Authors

Journals

citations
Cited by 27 publications
(43 citation statements)
references
References 1 publication
0
43
0
Order By: Relevance
“…Some of other users and business owners prefer to dispense with the transfer of important or confidential data over the Internet. Therefore, they use external storage cards or disks to transfer data between devices [8], [9]. Other users and business owners are concerned in anti-virus programs and electronic piracy and they seek to obtain the programs from reliable companies that are more careful in adopting new and updated programs for detecting new viruses and malware.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of other users and business owners prefer to dispense with the transfer of important or confidential data over the Internet. Therefore, they use external storage cards or disks to transfer data between devices [8], [9]. Other users and business owners are concerned in anti-virus programs and electronic piracy and they seek to obtain the programs from reliable companies that are more careful in adopting new and updated programs for detecting new viruses and malware.…”
Section: Related Workmentioning
confidence: 99%
“…The encryption process uses an encryption key that is a set of mathematical values agreed upon by both the sender and the receiver. The recipient uses the key to decrypt the ciphertext and convert it back to readable plain text [7], [8]. The more complex the encryption key, the more secure the encryption as third parties are less likely to be able to decrypt data through brute force attacks (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In computing, unencrypted data is also known as common text, and encrypted data is called cipher text. The formulas used to encrypt and decrypt messages are called cipher algorithms or ciphers [55][56][57][58][59][60][61][62]. To be effective, encryption includes a variable as part of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…With RSA, the public or private key can be used to encrypt a message; Whichever is not used for encryption becomes the decryption key (see figure 1) [40][41][42][43][44][45][46][47][48][49][50]. Today, many cryptographic processes use a symmetric algorithm to encrypt data and an asymmetric algorithm for secure secret key exchange [55][56][57][58][59][60][61][62].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation