THE SECURITY OF TEXT DATA BASED ON CYCLIC CODES OVER ALGEBRAIC STRUCTURE

被引:0
|
作者
Bahaddad, Adel [1 ]
Asif, Muhammad [2 ]
Ashraf, M. Usman [3 ]
Asiri, Yousef [4 ]
Alkhalaf, Salem [5 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
[2] Univ Management & Technol, Dept Math, Sialkot Campus, Sialkot, Pakistan
[3] GC Women Univ Sialkot, Dept Comp Sci, Sialkot, Pakistan
[4] Najran Univ, Coll Comp Sci & Informat Syst, Najran, Saudi Arabia
[5] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah, Saudi Arabia
来源
THERMAL SCIENCE | 2024年 / 28卷 / 6B期
关键词
AES algorithm; cryptography; cipher text; cyclic codes; Galois field;
D O I
10.2298/TSCI2406205B
中图分类号
O414.1 [热力学];
学科分类号
摘要
The demand for network security is increasing exponentially as businesses strive to protect personal data from theft or loss. Data security is a paramount concern for both individuals and organizations engaged in various forms of communication, particularly in cyberspace due to the rise of digital computing and communication. With the rapid advancement in digital data exchange, securing information during transmission and storage has become increasingly critical. Given the extensive use of text in security agencies and industries, it is crucial to protect confidential text data from unauthorized access. This paper proposes the use of Bose Chaudhary Hochquenghem (BCH) codes over the Galois field in a modified advanced encryption standard (AES) algorithm to secure text data. Secret keys are generated using the generator polynomial of BCH codes over the Galois field, which is also applied to construct maximum distance separable (MDS) matrices. The proposed scheme enhances the mixed column operation and sub-key construction steps of the AES algorithm using BCH codes over the Galois field. The secret key, based on the designed distance of BCH codes, is difficult to predict using exhaustive key search methods. The avalanche effect test, involving single-bit changes in plaintext and secret keys, along with the popular national institute of standards and technology (KIST) test, confirms that the proposed scheme improves ciphertext encryption. Sethe future, this approach could be adapted for encrypting images, audio, and video.
引用
收藏
页码:5205 / 5215
页数:11
相关论文
共 50 条
  • [31] CYCLIC CODES OVER GF(Q) WITH SIMPLE ORBIT STRUCTURE
    CLARK, WE
    DISCRETE MATHEMATICS, 1986, 61 (2-3) : 151 - 164
  • [32] On the Algebraic Structure of Polycyclic Codes
    Ou-Azzou, Hassan
    Najmeddine, Mustapha
    FILOMAT, 2021, 35 (10) : 3407 - 3421
  • [33] Cyclic codes and algebraic immunity of Boolean functions
    Mesnager, Sihem
    Cohen, Gerard
    2015 IEEE INFORMATION THEORY WORKSHOP (ITW), 2015,
  • [34] ALGEBRAIC DECODING FOR DOUBLY CYCLIC CONVOLUTIONAL CODES
    Gluesing-Luerssen, Heide
    Helmke, Uwe
    Iglesias Curto, Jose Ignacio
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (01) : 83 - 99
  • [35] Algebraic structure of quasicyclic codes
    Lally, K
    Fitzpatrick, P
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 196 - 196
  • [36] ALGEBRAIC STRUCTURE OF CONVOLUTIONAL CODES
    FORNEY, GD
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1970, 16 (01) : 115 - +
  • [37] Algebraic structure of quasicyclic codes
    Lally, K
    Fitzpatrick, P
    DISCRETE APPLIED MATHEMATICS, 2001, 111 (1-2) : 157 - 175
  • [38] New algebraic structure based on cyclic geometric progressions over polynomial ring applied for cryptography
    Dang Hoai Bac
    Nguyen Binh
    Nguyen Xuan Quynh
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 777 - 780
  • [39] Algebraic geometric codes over rings
    Walker, JL
    JOURNAL OF PURE AND APPLIED ALGEBRA, 1999, 144 (01) : 91 - 110
  • [40] Algebraic Constructions of Quasi-Cyclic LDPC Codes Based on Prime Fields
    Zhang, Rui
    Kang, Guixia
    Zhang, Ningbo
    Liu, Xiaoshuang
    Wu, Hao
    2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,