基于魔方算法和密钥分发中心的安全点对点图像共享

IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Cybernetics and Information Technologies Pub Date : 2023-09-01 DOI:10.2478/cait-2023-0029
Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov
{"title":"基于魔方算法和密钥分发中心的安全点对点图像共享","authors":"Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov","doi":"10.2478/cait-2023-0029","DOIUrl":null,"url":null,"abstract":"Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre\",\"authors\":\"Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov\",\"doi\":\"10.2478/cait-2023-0029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.\",\"PeriodicalId\":45562,\"journal\":{\"name\":\"Cybernetics and Information Technologies\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2023-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybernetics and Information Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2478/cait-2023-0029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybernetics and Information Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/cait-2023-0029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在这项工作中,我们建立了一个点对点图像加密算法的实现:“魔方算法”。该算法利用像素级置乱和基于xor的扩散,通过对称密钥实现。实证分析表明,该算法具有密钥空间大、安全性高、模糊度高、速度快等优点,有助于在不安全的信道上实现图像的安全传输。但是,基本方法的缺点是需要在客户端(在节点上)处理密钥生成,并且由于动态生成密钥,该过程非常耗时。我们的工作通过引入密钥分发中心(KDC)来分发用于传输的对称密钥、提高机密性并减少节点上的密钥生成开销来解决这些问题。提出了三种利用KDC的方法:将维度与KDC通信以生成密钥;将任何映像标准化为固定维度以标准化密钥生成;最后,使用循环迭代的单个会话密钥来模拟不同的维度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre
Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Cybernetics and Information Technologies
Cybernetics and Information Technologies COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
3.20
自引率
25.00%
发文量
35
审稿时长
12 weeks
期刊最新文献
A Review on State-of-Art Blockchain Schemes for Electronic Health Records Management Degradation Recoloring Deutan CVD Image from Block SVD Watermark Integration Approaches for Heterogeneous Big Data: A Survey Efficient DenseNet Model with Fusion of Channel and Spatial Attention for Facial Expression Recognition Hybrid Edge Detection Methods in Image Steganography for High Embedding Capacity
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1