A CRYPTOGRAPHY USING LIFTING SCHEME INTEGER WAVELET TRANSFORM OVER MIN-MAX-PLUS ALGEBRA

被引:1
作者
Yunus, Mahmud [1 ]
Firmansyah, Mohamad ilham dwi [1 ]
Subiono [1 ]
机构
[1] Inst Teknol Sepuluh Nopember, Fac Sci & Data Analyt, Dept Math, Kampus ITS Sukolilo, Surabaya 60111, Indonesia
关键词
cryptography; lifting scheme; min-max-plus algebra; wavelet;
D O I
10.14736/kyb-2024-5-0576
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a cryptographic algorithm utilizing integer wavelet transform via a lifting scheme. In this research, we construct some predict and update operators within the lifting scheme of wavelet transforms employing operations in min-max-plus algebra, termed as lifting scheme integer wavelet transform over min-max-plus algebra (MMPLS-IWavelet). The analysis and synthesis process on MMPLS-IWavelet is implemented for both encryption and decryption processes. The encryption key comprises a sequence of positive integers, where the first element specifies MMPLS-IWavelet type and subsequent elements indicate the levels of each executed transformation. The decryption key involves three components: the original encryption key, a binary encoding of the analyzed signal, and a sequence of non-negative integer representing the length of coefficient signals from the approximation and detail signals. We present a rigorous analysis confirming the correctness of the proposed cryptographic scheme, and evaluate its performance based on various metrics such as correlation value between plaintext and ciphertext, encryption quality, computation time, key sensitivity, entropy analysis, and key space analysis. We also analyze the computational costs of the encryption and decryption processes. The experimental results demonstrate that the proposed algorithms empirically yield satisfactory performance, exhibiting a near zero correlation between plaintext and ciphertext for most of test data, high encryption quality (over 80%), substantial key sensitivity, the large key space, and greater randomness in ciphertext compare to plaintext. The algorithm is efficient in terms of computational time and has linear complexity with respect to the number of input characters. The vast key space makes it highly impractical for brute-force approaches to find the decryption key directly.
引用
收藏
页码:576 / 602
页数:27
相关论文
共 32 条
[1]  
Arul J., 2012, J. Inform. Engrg. Appl., V2
[2]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[3]  
Durcheva M., 2015, ACM Commun. Comput. Algebra, V49, P9, DOI [10.1145/2768577.2768600, DOI 10.1145/2768577.2768600]
[4]   On a generalization of power algorithms over max-plus algebra [J].
Fahim, Kistosil ;
Subiono ;
van der Woude, Jacob .
DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2017, 27 (01) :181-203
[5]  
Foltyniewicz R., 1996, Proceedings of the 13th International Conference on Pattern Recognition, P13, DOI 10.1109/ICPR.1996.546715
[6]   Directional lifting wavelet transform for image edge analysis [J].
Fujinoki, Kensuke ;
Ashizawa, Keita .
SIGNAL PROCESSING, 2024, 216
[7]   Hardware implementation of the Haar 2D discrete wavelet transform with an application to image watermarking [J].
Gafsi, Mohamed ;
Abbassi, Nessrine ;
Amdouni, Rim ;
Hajjaji, Mohamed Ali ;
Mtibaa, Abdellatif .
PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022), 2022, :324-329
[8]   FPGA-Based Low-Cost Architecture for R-Peak Detection and Heart-Rate Calculation Using Lifting-Based Discrete Wavelet Transform [J].
Gon, Anusaka ;
Mukherjee, Atin .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2023, 42 (01) :580-600
[9]  
Goswami D, 2011, INT J COMPUT SCI NET, V11, P178
[10]   TROPICAL CRYPTOGRAPHY [J].
Grigoriev, Dima ;
Shpilrain, Vladimir .
COMMUNICATIONS IN ALGEBRA, 2014, 42 (06) :2624-2632