Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application

This article presents a cryptographic encryption standard whose model is based on Serpent presented by Eli Biham, Ross Anderson, and Lars Knudsen. The modification lies in the design of the Cipher, we have used power associative (PA) loop and group of permutations. The proposed mathematical structur...

Full description

Bibliographic Details
Main Authors: Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10080958/
_version_ 1797855312687923200
author Sadam Hussain
Muhammad Asif
Tariq Shah
Abid Mahboob
Sayed M. Eldin
author_facet Sadam Hussain
Muhammad Asif
Tariq Shah
Abid Mahboob
Sayed M. Eldin
author_sort Sadam Hussain
collection DOAJ
description This article presents a cryptographic encryption standard whose model is based on Serpent presented by Eli Biham, Ross Anderson, and Lars Knudsen. The modification lies in the design of the Cipher, we have used power associative (PA) loop and group of permutations. The proposed mathematical structure is superior to Galois Field (GF) in terms of complexity and has the ability to create arbitrary randomness due to a larger key space. The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. This validates the resistance to cryptanalytic attacks, particularly those targeting mathematical structures. This cryptographic scheme’s full description of encryption and decryption is measured and rigorously assessed to support its multimedia applications. The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.
first_indexed 2024-04-09T20:21:40Z
format Article
id doaj.art-14f9022a1afc42308b6ec5b3ed44721a
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-04-09T20:21:40Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-14f9022a1afc42308b6ec5b3ed44721a2023-03-30T23:01:05ZengIEEEIEEE Access2169-35362023-01-0111296982971010.1109/ACCESS.2023.326156810080958Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption ApplicationSadam Hussain0https://orcid.org/0000-0001-6474-0452Muhammad Asif1https://orcid.org/0000-0001-5684-4737Tariq Shah2https://orcid.org/0000-0002-6587-1638Abid Mahboob3Sayed M. Eldin4Department of Mathematics, Government Graduate College, Qila Didar Singh, Gujranwala, PakistanDepartment of Mathematics, University of Management and Technology, Sialkot Campus, Sialkot, PakistanDepartment of Mathematics, Quaid-i-Azam University, Islamabad, PakistanDepartment of Mathematics, Division of Science and Technology, University of Education, Lahore, PakistanCenter of Research, Faculty of Engineering, Future University in Egypt, New Cairo, EgyptThis article presents a cryptographic encryption standard whose model is based on Serpent presented by Eli Biham, Ross Anderson, and Lars Knudsen. The modification lies in the design of the Cipher, we have used power associative (PA) loop and group of permutations. The proposed mathematical structure is superior to Galois Field (GF) in terms of complexity and has the ability to create arbitrary randomness due to a larger key space. The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. This validates the resistance to cryptanalytic attacks, particularly those targeting mathematical structures. This cryptographic scheme’s full description of encryption and decryption is measured and rigorously assessed to support its multimedia applications. The observed speed of this technique, which uses a key of 256 bits and a block size of 128 bits, is comparable to three-key triple-DES.https://ieeexplore.ieee.org/document/10080958/Non-associativitypower associative loopS-boxesimage encryption
spellingShingle Sadam Hussain
Muhammad Asif
Tariq Shah
Abid Mahboob
Sayed M. Eldin
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
IEEE Access
Non-associativity
power associative loop
S-boxes
image encryption
title Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
title_full Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
title_fullStr Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
title_full_unstemmed Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
title_short Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
title_sort redesigning the serpent algorithm by pa loop and its image encryption application
topic Non-associativity
power associative loop
S-boxes
image encryption
url https://ieeexplore.ieee.org/document/10080958/
work_keys_str_mv AT sadamhussain redesigningtheserpentalgorithmbypaloopanditsimageencryptionapplication
AT muhammadasif redesigningtheserpentalgorithmbypaloopanditsimageencryptionapplication
AT tariqshah redesigningtheserpentalgorithmbypaloopanditsimageencryptionapplication
AT abidmahboob redesigningtheserpentalgorithmbypaloopanditsimageencryptionapplication
AT sayedmeldin redesigningtheserpentalgorithmbypaloopanditsimageencryptionapplication