2005
DOI: 10.1002/ima.20050
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric-key block cipher for image and text cryptography

Abstract: Public-key cryptography has been widely accepted as the method in which data is encrypted, using algorithms such as the widely known and popularly used RSA algorithm. However, management of the public-key and its storage is an on-going issue. To avoid these problems the symmetric-key approach can be taken, where there is only one key and it must be kept secret. Presented in this paper is a new cipher based on symmetric-key cryptography, called the NASA/Kennedy Cipher (N/KC), and further designed as a block cip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…Each round of master key is using key encryption expansion algorithm or decoding, which needs 128-byte Round Key, Figure 6 [12,20]. The development of decoding operations that are in a reverse order, compared with arranged decoding mode and therefore at the beginning of the preliminary round, followed by nine occurrences of the regular round reverse, but ends with the addition of key stage consists regular tours inverse [3,11]. 2.5 Inv.…”
Section: Shift Rows Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…Each round of master key is using key encryption expansion algorithm or decoding, which needs 128-byte Round Key, Figure 6 [12,20]. The development of decoding operations that are in a reverse order, compared with arranged decoding mode and therefore at the beginning of the preliminary round, followed by nine occurrences of the regular round reverse, but ends with the addition of key stage consists regular tours inverse [3,11]. 2.5 Inv.…”
Section: Shift Rows Transformationmentioning
confidence: 99%
“…Through the digital image processing to get the AES encryption standard data, encrypt the date in packet. Eventually put all the data together, reduction of encrypted image, achieve the desired encryption effect [3,9,17].…”
mentioning
confidence: 99%
“…In contrast, asymmetric key encryption algorithm [10] employed two keys: public and private key. Recent studies mentioned that asymmetric key encryption is slower than symmetric key encryption algorithms [11]. Furthermore, asymmetric encryption algorithm has higher computational complexity which, are most of the time prohibitive for images and mathematical correlation between public and private keys may help attackers to hack the image [12].…”
Section: Introductionmentioning
confidence: 99%
“…There are two classes of cryptographic procedures in use, referred to as i) Symmetric-key cryptography (SKC) and ii) Public key cryptography (PKC). Public-key algorithms are slow, whereas Symmetric-key algorithms generally run much faster [3]. Symmetric-key cryptography has been (and still is) extensively used to solve the traditional problem of communication over insecure channels [4].…”
Section: Introductionmentioning
confidence: 99%