A SECURE BSS-BASED ENCRYPTION SCHEME USING AES KEY EXPANSION APPROACH

被引:0
|
作者
Okhovat, Raziyeh Sadat [1 ]
Sadr, Ali [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
关键词
Cryptography; Blind Source Separation; Advanced Encryption Standard; Key Expansion;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a secure BSS-based cryptosystem has been proposed for encryption of images. Conventional BSS-based encryption scheme is not secure especially against differential attack. The main reason is due to the fixed key which is applied to encrypt all images. Here we have exploited the AES key expansion to produce a different key for transmitting each confidential image. Our simulations and also calculations based on correlation coefficient confirm that the proposed algorithm has effectively enhanced the level of security.
引用
收藏
页码:277 / +
页数:2
相关论文
共 50 条
  • [31] CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling
    Sun, Xiaochao
    Li, Bao
    Lu, Xianhui
    Fang, Fuyang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 361 - 378
  • [32] A CCA secure public key encryption scheme based on finite groups of Lie type
    Haibo Hong
    Jun Shao
    Licheng Wang
    Mande Xie
    Guiyi Wei
    Yixian Yang
    Song Han
    Jianhong Lin
    Science China Information Sciences, 2022, 65
  • [33] A CCA secure public key encryption scheme based on finite groups of Lie type
    Hong, Haibo
    Shao, Jun
    Wang, Licheng
    Xie, Mande
    Wei, Guiyi
    Yang, Yixian
    Han, Song
    Lin, Jianhong
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [34] A CCA secure public key encryption scheme based on finite groups of Lie type
    Haibo HONG
    Jun SHAO
    Licheng WANG
    Mande XIE
    Guiyi WEI
    Yixian YANG
    Song HAN
    Jianhong LIN
    ScienceChina(InformationSciences), 2022, 65 (01) : 268 - 270
  • [35] AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection
    Mathur, Nishtha
    Bansode, Rajesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 1036 - 1043
  • [36] Design and synthesis of Dual Key based AES Encryption
    Abhiram, L. S.
    Gowrav, L.
    Kumar, Punith H. L.
    Sriroop, B. K.
    Lakkannavar, Manjunath C.
    2014 INTERNATIONAL CONFERENCE ON CIRCUITS, COMMUNICATION, CONTROL AND COMPUTING (I4C), 2014, : 85 - 88
  • [37] A Multi-Chaotic Key Expansion for Advanced Encryption Standard (AES) Algorithm
    Assa-Agyei, Kwame
    Owa, Kayode
    Olajide, Funminyi
    Al-Hadhrami, Tawfik
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 711 - 717
  • [38] A Revocable and Key Secure Ciphertext-Policy Attribute-based Encryption Scheme Based on Blockchain
    Zhou, Xingyu
    Li, Wenmin
    Zhang, Huimin
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 7 - 10
  • [39] Efficient and Secure Long-Distance Quantum Key Distribution by using a Proxy Encryption Scheme
    Sundar, K.
    Sasikumar, S.
    Jayakumar, C.
    Nagarajan, D.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (34) : 80285 - 80298
  • [40] Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
    Khan, Majid
    Masood, Fawad
    Alghafis, Abdullah
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (15): : 11837 - 11857