Enhancement IDEA Algorithm with Digital Image as Key Encryption and Decryption

被引:0
|
作者
Rahim, Robbi [1 ]
Siregar, Helmy Fauzi [2 ]
Sitanggang, Delima [3 ]
机构
[1] Sekolah Tinggi Ilmu Manajemen Sukma, Medan, Indonesia
[2] Univ Asahan, Dept Informat, Kisaran, Indonesia
[3] Univ Prima Indonesia, Dept Informat, Medan, Indonesia
来源
1ST INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCE | 2019年 / 1381卷
关键词
D O I
10.1088/1742-6596/1381/1/012043
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cryptography is one type of protection that is widely used to secure information, encryption, and decryption and the use of keys is a common process used to secure information; and also the cryptographic processes have a classic problem that is the distribution of keys that are vulnerable to interception when the sender sends the key to the receiver, the cryptographic protocol (Authentication) could be used to minimize key distribution problem because there is no need for key exchanges. Shamir's Three-Pass Protocol, Secret Splitting, Bit-Commitment Protocol and Blind Signature are few cryptographic protocols that can be used to help with key distribution issues, this article performs systematic approach to protocol cryptography for security level and the using other algorithms to combine with protocol.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Digital Image Encryption and Decryption Algorithm Based on Optimization and Fusion Strategy
    Wan, Nan
    Zhang, Yi
    2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, : 244 - 248
  • [2] Digital Image Encryption and Decryption Algorithm Based on Wavelet Transform and Chaos System
    Li, Xiaofeng
    Zhang, Yinhui
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 253 - 257
  • [3] An Encryption and Decryption Algorithm for Image Based on DNA
    Soni, Ranu
    Johar, Arun
    Soni, Vishakha
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 478 - 481
  • [4] Implementation IDEA algorithm for image encryption
    Dang, PP
    Chau, PM
    MATHEMATICS AND APPLICATIONS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION III, 2000, 4122 : 1 - 9
  • [5] Image Encryption and Decryption in Public Key Cryptography based on MR
    Amalarethinam, D. I. George
    Geetha, J. Sai
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 133 - 138
  • [6] A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm
    ZHANG Yong
    ChineseJournalofElectronics, 2017, 26 (05) : 1022 - 1031
  • [7] A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm
    Zhang Yong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (05) : 1022 - 1031
  • [8] Image encryption/decryption algorithm based on standard chaos map
    Fan, Chun-Xia
    Jiang, Chang-Sheng
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2006, 38 (01): : 119 - 122
  • [9] An Approach Using Stream Cipher Algorithm for Image Encryption and Decryption
    Aissa, Belmeguenai
    Nadir, Derouiche
    Ammar, Medoued
    201415th International Conference on Sciences & Techniques of Automatic Control & Computer Engineering (STA'2014), 2014, : 498 - 503
  • [10] A fast decryption algorithm for BSS-based image encryption
    Lin, Qiu-Hua
    Yin, Fu-Liang
    Liang, Hua-Lou
    ADVANCES IN NEURAL NETWORKS - ISNN 2006, PT 3, PROCEEDINGS, 2006, 3973 : 318 - 325