Loading…

Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function

Due to the importance of data security at present, an encryption algorithm based on the principle of non-commutative group, hash function, and E-fractal has been proposed. Key generation depends on the array values generated by the braid group and using them as input to the SHA-3 (256) which increas...

Full description

Saved in:
Bibliographic Details
Published in:BIO web of conferences 2024-01, Vol.97, p.20
Main Authors: Kadhim, Ola N., Najjar, Fallah H., Ramadhan, Ali J.
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c2250-59f870d5e6290c729887a46ce66b5e6a8989fa601b45ec92f7a5ba616ae5b4283
container_end_page
container_issue
container_start_page 20
container_title BIO web of conferences
container_volume 97
creator Kadhim, Ola N.
Najjar, Fallah H.
Ramadhan, Ali J.
description Due to the importance of data security at present, an encryption algorithm based on the principle of non-commutative group, hash function, and E-fractal has been proposed. Key generation depends on the array values generated by the braid group and using them as input to the SHA-3 (256) which increases the strength of the key because it generates values in one direction only. The results of the hash function are determined by the Lorenz hyper-chaotic system initial values, and four image-size arrays are generated as the final image-encryption keys using the RC4 algorithm. Then the use of the E-fractal diffusion method. To bolster the security of the encryption, it is employed to disperse the pixel values., adopting the control word that increases the randomness of the data. The security analysis of the proposed encryption algorithm demonstrates that it is difficult to decipher due to the presence of the hash function in addition to its easy implementation within seconds, and the efficiency scale was calculated that showed its strength in effectively resisting attacks by others.
doi_str_mv 10.1051/bioconf/20249700020
format article
fullrecord <record><control><sourceid>doaj_cross</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_08b48a5497af483999b2e91704a1aef9</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_08b48a5497af483999b2e91704a1aef9</doaj_id><sourcerecordid>oai_doaj_org_article_08b48a5497af483999b2e91704a1aef9</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2250-59f870d5e6290c729887a46ce66b5e6a8989fa601b45ec92f7a5ba616ae5b4283</originalsourceid><addsrcrecordid>eNpNkM1KAzEUhYMoWGqfwE1eYGySSSbJUkv_oOhCuw53Mkmd0pmUZEbo2zu1Rbo6h8O93-JD6JmSF0oEnZZ1sKH1U0YY15IQwsgdGjFKZca5UPc3_RFNUtoPJ0TTnEgxQttPZ_vo8LqBncPz1sbTsatDi_tUtzs8zxYRbAeH7A2Sq_B7aLNZaJq-g67-cXgZQ3_E0FZ4BekbL_rWnr-f0IOHQ3KTa47RdjH_mq2yzcdyPXvdZJYxQTKhvZKkEq5gmljJtFISeGFdUZTDCEor7aEgtOTCWc28BFFCQQtwouRM5WO0vnCrAHtzjHUD8WQC1OZvCHFnIHa1PThDVMkViMEQeK5yrXXJnKaScKDgvB5Y-YVlY0gpOv_Po8ScRZuraHMjOv8FbHtxUQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function</title><source>Publicly Available Content (ProQuest)</source><creator>Kadhim, Ola N. ; Najjar, Fallah H. ; Ramadhan, Ali J.</creator><contributor>Aldahan, N. ; Ramadhan, A.J.</contributor><creatorcontrib>Kadhim, Ola N. ; Najjar, Fallah H. ; Ramadhan, Ali J. ; Aldahan, N. ; Ramadhan, A.J.</creatorcontrib><description>Due to the importance of data security at present, an encryption algorithm based on the principle of non-commutative group, hash function, and E-fractal has been proposed. Key generation depends on the array values generated by the braid group and using them as input to the SHA-3 (256) which increases the strength of the key because it generates values in one direction only. The results of the hash function are determined by the Lorenz hyper-chaotic system initial values, and four image-size arrays are generated as the final image-encryption keys using the RC4 algorithm. Then the use of the E-fractal diffusion method. To bolster the security of the encryption, it is employed to disperse the pixel values., adopting the control word that increases the randomness of the data. The security analysis of the proposed encryption algorithm demonstrates that it is difficult to decipher due to the presence of the hash function in addition to its easy implementation within seconds, and the efficiency scale was calculated that showed its strength in effectively resisting attacks by others.</description><identifier>ISSN: 2117-4458</identifier><identifier>EISSN: 2117-4458</identifier><identifier>DOI: 10.1051/bioconf/20249700020</identifier><language>eng</language><publisher>EDP Sciences</publisher><ispartof>BIO web of conferences, 2024-01, Vol.97, p.20</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2250-59f870d5e6290c729887a46ce66b5e6a8989fa601b45ec92f7a5ba616ae5b4283</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Aldahan, N.</contributor><contributor>Ramadhan, A.J.</contributor><creatorcontrib>Kadhim, Ola N.</creatorcontrib><creatorcontrib>Najjar, Fallah H.</creatorcontrib><creatorcontrib>Ramadhan, Ali J.</creatorcontrib><title>Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function</title><title>BIO web of conferences</title><description>Due to the importance of data security at present, an encryption algorithm based on the principle of non-commutative group, hash function, and E-fractal has been proposed. Key generation depends on the array values generated by the braid group and using them as input to the SHA-3 (256) which increases the strength of the key because it generates values in one direction only. The results of the hash function are determined by the Lorenz hyper-chaotic system initial values, and four image-size arrays are generated as the final image-encryption keys using the RC4 algorithm. Then the use of the E-fractal diffusion method. To bolster the security of the encryption, it is employed to disperse the pixel values., adopting the control word that increases the randomness of the data. The security analysis of the proposed encryption algorithm demonstrates that it is difficult to decipher due to the presence of the hash function in addition to its easy implementation within seconds, and the efficiency scale was calculated that showed its strength in effectively resisting attacks by others.</description><issn>2117-4458</issn><issn>2117-4458</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNpNkM1KAzEUhYMoWGqfwE1eYGySSSbJUkv_oOhCuw53Mkmd0pmUZEbo2zu1Rbo6h8O93-JD6JmSF0oEnZZ1sKH1U0YY15IQwsgdGjFKZca5UPc3_RFNUtoPJ0TTnEgxQttPZ_vo8LqBncPz1sbTsatDi_tUtzs8zxYRbAeH7A2Sq_B7aLNZaJq-g67-cXgZQ3_E0FZ4BekbL_rWnr-f0IOHQ3KTa47RdjH_mq2yzcdyPXvdZJYxQTKhvZKkEq5gmljJtFISeGFdUZTDCEor7aEgtOTCWc28BFFCQQtwouRM5WO0vnCrAHtzjHUD8WQC1OZvCHFnIHa1PThDVMkViMEQeK5yrXXJnKaScKDgvB5Y-YVlY0gpOv_Po8ScRZuraHMjOv8FbHtxUQ</recordid><startdate>20240101</startdate><enddate>20240101</enddate><creator>Kadhim, Ola N.</creator><creator>Najjar, Fallah H.</creator><creator>Ramadhan, Ali J.</creator><general>EDP Sciences</general><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>20240101</creationdate><title>Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function</title><author>Kadhim, Ola N. ; Najjar, Fallah H. ; Ramadhan, Ali J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2250-59f870d5e6290c729887a46ce66b5e6a8989fa601b45ec92f7a5ba616ae5b4283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kadhim, Ola N.</creatorcontrib><creatorcontrib>Najjar, Fallah H.</creatorcontrib><creatorcontrib>Ramadhan, Ali J.</creatorcontrib><collection>CrossRef</collection><collection>Open Access: DOAJ - Directory of Open Access Journals</collection><jtitle>BIO web of conferences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kadhim, Ola N.</au><au>Najjar, Fallah H.</au><au>Ramadhan, Ali J.</au><au>Aldahan, N.</au><au>Ramadhan, A.J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function</atitle><jtitle>BIO web of conferences</jtitle><date>2024-01-01</date><risdate>2024</risdate><volume>97</volume><spage>20</spage><pages>20-</pages><issn>2117-4458</issn><eissn>2117-4458</eissn><abstract>Due to the importance of data security at present, an encryption algorithm based on the principle of non-commutative group, hash function, and E-fractal has been proposed. Key generation depends on the array values generated by the braid group and using them as input to the SHA-3 (256) which increases the strength of the key because it generates values in one direction only. The results of the hash function are determined by the Lorenz hyper-chaotic system initial values, and four image-size arrays are generated as the final image-encryption keys using the RC4 algorithm. Then the use of the E-fractal diffusion method. To bolster the security of the encryption, it is employed to disperse the pixel values., adopting the control word that increases the randomness of the data. The security analysis of the proposed encryption algorithm demonstrates that it is difficult to decipher due to the presence of the hash function in addition to its easy implementation within seconds, and the efficiency scale was calculated that showed its strength in effectively resisting attacks by others.</abstract><pub>EDP Sciences</pub><doi>10.1051/bioconf/20249700020</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2117-4458
ispartof BIO web of conferences, 2024-01, Vol.97, p.20
issn 2117-4458
2117-4458
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_08b48a5497af483999b2e91704a1aef9
source Publicly Available Content (ProQuest)
title Secure Image Encryption using E-Fractal-Based Non-Commutative Group and Hash Function
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T03%3A06%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-doaj_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20Image%20Encryption%20using%20E-Fractal-Based%20Non-Commutative%20Group%20and%20Hash%20Function&rft.jtitle=BIO%20web%20of%20conferences&rft.au=Kadhim,%20Ola%20N.&rft.date=2024-01-01&rft.volume=97&rft.spage=20&rft.pages=20-&rft.issn=2117-4458&rft.eissn=2117-4458&rft_id=info:doi/10.1051/bioconf/20249700020&rft_dat=%3Cdoaj_cross%3Eoai_doaj_org_article_08b48a5497af483999b2e91704a1aef9%3C/doaj_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2250-59f870d5e6290c729887a46ce66b5e6a8989fa601b45ec92f7a5ba616ae5b4283%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true