2023
DOI: 10.1109/access.2023.3261568
|View full text |Cite
|
Sign up to set email alerts
|

Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application

Abstract: This article presents a cryptographic encryption standard whose model is based on Serpent presented by Eli Biham, Ross Anderson, and Lars Knudsen. The modification lies in the design of the Cipher, we have used power associative (PA) loop and group of permutations. The proposed mathematical structure is superior to Galois Field (GF) in terms of complexity and has the ability to create arbitrary randomness due to a larger key space. The proposed method is simple and speedy in terms of computations, meanwhile it… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 36 publications
0
1
0
Order By: Relevance
“…Various image encryption approaches have been developed over the years, including conventional methods like symmetric and asymmetric encryption and more advanced techniques such as chaos-based encryption and cryptographic transformations. Some algorithms have been proposed in which images were encrypted using ECC and S-boxes Hussain et al (2023); Khalid et al (2022); Mahboob et al (2022). Each technique employs different principles and mechanisms to achieve image security Choi et al (2016); Hu et al (2017); Takkar and Singh (2017); Xu et al (2017).…”
Section: Introductionmentioning
confidence: 99%
“…Various image encryption approaches have been developed over the years, including conventional methods like symmetric and asymmetric encryption and more advanced techniques such as chaos-based encryption and cryptographic transformations. Some algorithms have been proposed in which images were encrypted using ECC and S-boxes Hussain et al (2023); Khalid et al (2022); Mahboob et al (2022). Each technique employs different principles and mechanisms to achieve image security Choi et al (2016); Hu et al (2017); Takkar and Singh (2017); Xu et al (2017).…”
Section: Introductionmentioning
confidence: 99%
“…These tables add complexity and non-linearity to cryptographic operations. This enhances resistance attacks, such as differential and linear cryptanalysis, algebraic attacks, and brute-force attacks [16]. GF arithmetic enables efficient operations such as addition, subtraction, multiplication, and division.…”
Section: An Overview Of Finite Fieldmentioning
confidence: 99%