Open Access   Article Go Back

Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission

T. Jaison Vimalraj1 , P. Mithun2 , K. Mathiyarasu3

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-04 , Page no. 174-178, May-2018

Online published on May 31, 2018

Copyright © T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu, “Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.04, pp.174-178, 2018.

MLA Style Citation: T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu "Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission." International Journal of Computer Sciences and Engineering 06.04 (2018): 174-178.

APA Style Citation: T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu, (2018). Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission. International Journal of Computer Sciences and Engineering, 06(04), 174-178.

BibTex Style Citation:
@article{Vimalraj_2018,
author = {T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu},
title = {Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {06},
Issue = {04},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {174-178},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=376},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=376
TI - Cryptosystem using Chaotic Shuffling Hill pad Encryption Scheme for Secure Data Transmission
T2 - International Journal of Computer Sciences and Engineering
AU - T. Jaison Vimalraj, P. Mithun, K. Mathiyarasu
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 174-178
IS - 04
VL - 06
SN - 2347-2693
ER -

           

Abstract

Maintaining privacy and security of any data, specifically for images that are transmitted through network is a major issue in today’s world. In this paper, a new three level Chaotic Shuffling Hill Pad encryption (CSHP) scheme is proposed. In first level encryption, the input image is subdivided and shuffled using chaotic algorithm. In second level, the shuffled blocks are encrypted using subset Hill algorithm with different product keys. Third level encryption is performed with the basis of Onetime pad encryption algorithm, in order to tighten the security of the image. Finally, the encrypted image is converted to text file, which is the intended cipher format. Product keys are chosen in such a way that they are invertible. The encrypted text file transmitted through insecure channel can be decrypted at the receiver’s end. The proposed method is tested with various standard images and the results are encouraging. The proposed method finds its application in Defence field.

Key-Words / Index Term

Chaotic, Cryptosystem, Encryption, Decryption

References

[1] Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image Encryption Using Advanced Hill Cipher Algorithm”, ACEEE International Journal on Signal and Image Processing Vol .1, No. 1, pp.37-41, 2010.
[2] J.S. Armand EyebeFouda, J. Yves Effa, Samrat L. Sabat, and Maaruf Ali, “A Fast chaotic block cipher for image encryption”, Commun Nonlinear Sci Numer Simulat 19 pp. 578- 588, 2014.

[3] K. Mani, M. Viswambari “Generation of Key Matrix for Hill Cipher using Magic Rectangle”, Advances in Computational Sciences and Technology ISSN 0973-6107 Vol. 10, No. 5 pp.1081-1090, 2017.
[4] Tang Z, Zhang X, “Secure image encryption without size limitation using Arnold transform and Random strategies”, Journal of Multimedia, Vol 6, No. 2, pp. 202–206, 2011.
[5] Timothy E. Lindquist, Mohamed Diarra, and Bruce R. Millard, “A Java Cryptography Service Provider Implementing One-Time Pad”, 37th Hawaii International Conference on System Sciences, pp. 1-6, 2004.

[6] Yaqeen S. Mezaal, Dalal A. Hammood, Mohammed H. Ali, “OTP Encryption Enhancement Based on Logical Operations”, IEEE ISBN: 978-1-4673-7504-7, pp.109-112, 2016.
[7] Prerna, Urooj, Meenakumari, Jitendra Nathshrivastava, “Image Encryption and Decryption using Modified Hill Cipher Technique”, International Journal of Information & Computation Technology. ISSN 0974-2239 Vol. 4, No. 17 pp. 1895-1901, 2014.
[8] Zhenjun Tang &Xianquan Zhang & Weiwei Lan, “Efficient image encryption with block shuffling and chaotic map” Multimed Tools Appl, New York, 2014.
[9] Zhang G, Liu Q, “A novel image encryption method based on total shuffling scheme” Optics Communication, pp. 2775–2780, 2011.
[10] Zhang Yong, “A Chaotic System Based Image Encryption Scheme with Identical Encryption and Decryption Algorithm” Chinese Journal of Electronics, Vol.26, No.5, Sept. 2017.