THE SECURITY OF TEXT DATA BASED ON CYCLIC CODES OVER ALGEBRAIC STRUCTURE

被引:0
|
作者
Bahaddad, Adel [1 ]
Asif, Muhammad [2 ]
Ashraf, M. Usman [3 ]
Asiri, Yousef [4 ]
Alkhalaf, Salem [5 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
[2] Univ Management & Technol, Dept Math, Sialkot Campus, Sialkot, Pakistan
[3] GC Women Univ Sialkot, Dept Comp Sci, Sialkot, Pakistan
[4] Najran Univ, Coll Comp Sci & Informat Syst, Najran, Saudi Arabia
[5] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah, Saudi Arabia
来源
THERMAL SCIENCE | 2024年 / 28卷 / 6B期
关键词
AES algorithm; cryptography; cipher text; cyclic codes; Galois field;
D O I
10.2298/TSCI2406205B
中图分类号
O414.1 [热力学];
学科分类号
摘要
The demand for network security is increasing exponentially as businesses strive to protect personal data from theft or loss. Data security is a paramount concern for both individuals and organizations engaged in various forms of communication, particularly in cyberspace due to the rise of digital computing and communication. With the rapid advancement in digital data exchange, securing information during transmission and storage has become increasingly critical. Given the extensive use of text in security agencies and industries, it is crucial to protect confidential text data from unauthorized access. This paper proposes the use of Bose Chaudhary Hochquenghem (BCH) codes over the Galois field in a modified advanced encryption standard (AES) algorithm to secure text data. Secret keys are generated using the generator polynomial of BCH codes over the Galois field, which is also applied to construct maximum distance separable (MDS) matrices. The proposed scheme enhances the mixed column operation and sub-key construction steps of the AES algorithm using BCH codes over the Galois field. The secret key, based on the designed distance of BCH codes, is difficult to predict using exhaustive key search methods. The avalanche effect test, involving single-bit changes in plaintext and secret keys, along with the popular national institute of standards and technology (KIST) test, confirms that the proposed scheme improves ciphertext encryption. Sethe future, this approach could be adapted for encrypting images, audio, and video.
引用
收藏
页码:5205 / 5215
页数:11
相关论文
共 50 条
  • [21] Data security over wireless transmission for enterprise multimedia security with fountain codes
    Hongli Nie
    Xutong Jiang
    Wenda Tang
    Song Zhang
    Wanchun Dou
    Multimedia Tools and Applications, 2020, 79 : 10781 - 10803
  • [22] Algebraic Constructions of Quasi-Cyclic LDPC Codes Based on Generators
    Zhang, Ningbo
    Zhang, Rui
    Kang, Guixia
    Guo, Yanyan
    2015 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2015,
  • [23] Data security over wireless transmission for enterprise multimedia security with fountain codes
    Nie, Hongli
    Jiang, Xutong
    Tang, Wenda
    Zhang, Song
    Dou, Wanchun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10781 - 10803
  • [24] ALGEBRAIC CONSTRUCTION OF CYCLIC CODES OVER Z(8) WITH A GOOD EUCLIDEAN MINIMUM DISTANCE
    PIRET, PM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (03) : 815 - 818
  • [25] Algebraic structure of additive conjucyclic codes over F4
    Abualrub, Taher
    Cao, Yonglin
    Dougherty, Steven T.
    FINITE FIELDS AND THEIR APPLICATIONS, 2020, 65
  • [26] Nonperiodic cyclic equivalence classes of cyclic codes and algebraic constructions of cyclically permutable codes
    Xia, ST
    Fu, FW
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, 1997, 1255 : 341 - 352
  • [27] On the Structure of Linear and Cyclic Codes over a Finite Chain Ring
    Graham H. Norton
    Ana Sălăgean
    Applicable Algebra in Engineering, Communication and Computing, 2000, 10 : 489 - 506
  • [28] Structure of skew cyclic codes over Fp[u]/⟨uk⟩
    Islam, Habibul
    Prakash, Om
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (08): : 2243 - 2255
  • [29] On the structure of linear and cyclic codes over a finite chain ring
    Norton, GH
    Salagean, A
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2000, 10 (06) : 489 - 506
  • [30] On the Structure of Cyclic and Negacyclic Codes over Finite Chain Rings
    Dinh, Hai Q.
    Lopez-Permouth, Sergio R.
    Szabo, Steve
    CODES OVER RINGS, 2009, 6 : 22 - +