Increasing the security of transmitted text messages using chaotic key and image key cryptography

M. Abu-Faraj, Abeer Y. Al-Hyari, Ismail Altaharwa, Zaid Alqad, Basel J. A. Ali
{"title":"Increasing the security of transmitted text messages using chaotic key and image key cryptography","authors":"M. Abu-Faraj, Abeer Y. Al-Hyari, Ismail Altaharwa, Zaid Alqad, Basel J. A. Ali","doi":"10.5267/j.ijdns.2023.1.008","DOIUrl":null,"url":null,"abstract":"It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size. The suggested approach will use a sophisticated private key with a convoluted structure. The private key will have 5 components with a double data type to prevent guessing or hacking. The confidential data will produce two secret keys, the first of which will be taken from the image key. These keys will be vulnerable to slight changes in private key information. To maximize the approach's efficiency, the suggested method will deal with lengthy messages by splitting them into chunks. On the other hand, the chaotic logistic map model will be used to create the second key. The suggested technique will be implemented, and several sorts of analysis (sensitivity, quality, security, and speed analysis) will be undertaken to demonstrate the benefits of the proposed method. The quality metrics MSE, PSNR, and CC will be computed to validate the suggested method's quality. To illustrate the efficiency of the proposed technique, encryption and decryption times will be measured, and cryptography throughputs will be determined. Various PKs will be tried throughout the decryption process to demonstrate how sensitive the produced outputs are to changes in the private key. The suggested approach will be tested, and the results will be compared to the results of existing methods to demonstrate the improvement offered by the proposed method.","PeriodicalId":36543,"journal":{"name":"International Journal of Data and Network Science","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Data and Network Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5267/j.ijdns.2023.1.008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 4

Abstract

It is critical to safeguard confidential data, especially secret and private messages. This study introduces a novel data cryptography approach. The new approach will be capable of encrypting and decrypting any communication size. The suggested approach will use a sophisticated private key with a convoluted structure. The private key will have 5 components with a double data type to prevent guessing or hacking. The confidential data will produce two secret keys, the first of which will be taken from the image key. These keys will be vulnerable to slight changes in private key information. To maximize the approach's efficiency, the suggested method will deal with lengthy messages by splitting them into chunks. On the other hand, the chaotic logistic map model will be used to create the second key. The suggested technique will be implemented, and several sorts of analysis (sensitivity, quality, security, and speed analysis) will be undertaken to demonstrate the benefits of the proposed method. The quality metrics MSE, PSNR, and CC will be computed to validate the suggested method's quality. To illustrate the efficiency of the proposed technique, encryption and decryption times will be measured, and cryptography throughputs will be determined. Various PKs will be tried throughout the decryption process to demonstrate how sensitive the produced outputs are to changes in the private key. The suggested approach will be tested, and the results will be compared to the results of existing methods to demonstrate the improvement offered by the proposed method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用混沌密钥和图像密钥加密提高传输文本信息的安全性
保护机密数据,特别是秘密和私人信息至关重要。本文介绍了一种新的数据加密方法。这种新方法将能够加密和解密任何规模的通信。建议的方法将使用具有复杂结构的复杂私钥。私钥将有5个组件,具有双重数据类型,以防止猜测或黑客攻击。机密数据将产生两个密钥,其中第一个密钥将取自图像密钥。私钥信息稍有变化,这些密钥就很容易受到攻击。为了使该方法的效率最大化,建议的方法将通过将长消息分成块来处理它们。另一方面,混沌逻辑映射模型将用于创建第二个键。将实施建议的技术,并进行几种分析(灵敏度、质量、安全性和速度分析),以证明所建议方法的好处。将计算质量度量MSE、PSNR和CC来验证建议方法的质量。为了说明所提出技术的效率,将测量加密和解密时间,并确定加密吞吐量。在整个解密过程中,将尝试各种pkk,以演示生成的输出对私钥的更改有多敏感。将测试建议的方法,并将结果与现有方法的结果进行比较,以证明建议方法所提供的改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
5.80
自引率
0.00%
发文量
163
审稿时长
8 weeks
期刊最新文献
Assessing cognitive flexibility: Quantitative insights into the impact of adaptive learning technologies in special education Evaluation of factors affecting university students' satisfaction with e-learning systems used dur-ing Covid-19 crisis: A field study in Jordanian higher education institutions The effect of quality, security and privacy factors on trust and intention to use e-government services The influence of social media marketing activities on customer loyalty: A study of e-commerce industry Exploring the critical success factors of s-commerce in social media platforms: The case of Jordan
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1