Showing 1 - 20 results of 84 for search '"confusion and diffusion"', query time: 0.21s Refine Results
  1. 1
  2. 2
  3. 3

    Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System by Magfirawaty Magfirawaty, Ariska Allamanda, Malika Ayunasari, Muhammad Nadhif Zulfikar

    Published 2024-05-01
    “…The encryption process consists of two main processes: confusion and diffusion. The confusion process is randomizing the position of the original image pixels. …”
    Get full text
    Article
  4. 4
  5. 5

    Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits by Hussien, Hassan Mansour, Muda, Zaiton, Md. Yasin, Sharifah

    Published 2017
    “…Authors of AES accepted that the key expansion function of Rijndael is comparatively weak. Confusion and diffusion are two properties of the operation a secure cipher. …”
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Key Transformation Approach for Rijndael Security by Sulong, Mek Rahmah

    Published 2008
    “…This method improves the security of Rijndael Key Scheduling by increasing the bit confusion and diffusion of the Rijndael Subkey. The new method has shown positive results in terms of the bit confusion and diffusion of Subkey and it has increased bit confusion and diffusion compared to the Subkey of the original Rijndael Key Schedule.…”
    Get full text
    Thesis
  8. 8

    Key transformation approach for Rijndael security. by Muda, Zaiton, Mahmod, Ramlan, Sulong, Mek Rahmah

    Published 2010
    “…Thus, a new transformation method which is called Shiftrow is proposed into the 128-bit Rijndael Key Schedule based upon information principles (bit confusion and diffusion properties). The new method has shown positive results in terms of the bit confusion and diffusion of subkey and it has increased bit confusion and diffusion compared to the subkey of the original Rijndael key schedule.…”
    Get full text
    Article
  9. 9

    Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption by Edy Winarno, Kristiawan Nugroho, Prajanto Wahyu Adi, De Rosal Ignatius Moses Setiadi

    Published 2023-10-01
    “…This paper introduces an enhanced image encryption technique that relies on 3D confusion and diffusion patterns, aiming to achieve maximum performance in terms of confusion and diffusion. …”
    Get full text
    Article
  10. 10

    Image Security Based on Three-Dimensional Chaotic System and Random Dynamic Selection by Bo Ran, Tianshuo Zhang, Lihong Wang, Sheng Liu, Xiaoyi Zhou

    Published 2022-07-01
    “…In step two, one of the sequences is used to dynamically select confusion and diffusion methods, where confusion and diffusion have three algorithms, respectively, and will produce 3<sup>2n</sup> (<i>n</i> > 100) combinations for encryption. …”
    Get full text
    Article
  11. 11

    Z-Crypt: Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network by Abdullah Alaklabi, Arslan Munir, Muhammad Asfand Hafeez, Muazzam A. Khan Khattak

    Published 2024-01-01
    “…The CLM-generated matrices introduce confusion and diffusion, while SPN creates a dissociation of the cipher from the plaintext. …”
    Get full text
    Article
  12. 12

    Systematic literature review: Trend analysis on the design of lightweight block cipher by Abdul Alif Zakaria, A.H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud

    Published 2023-05-01
    “…Most importantly, an algorithm must be provided with confusion and diffusion properties in the design to ensure sufficient security.…”
    Get full text
    Article
  13. 13

    A Chaos Based Joint Image Compression and Encryption Scheme by Subhashini K., Nandhini K.

    Published 2023-01-01
    “…Encryption includes two processes confusion and diffusion and compression is performed using the DWT method. …”
    Get full text
    Article
  14. 14

    DNA-PRESENT: An Improved Security and Low-Latency, Lightweight Cryptographic Solution for IoT by Maria Imdad, Adnan Fazil, Sofia Najwa Binti Ramli, Jihyoung Ryu, Hairulnizam Bin Mahdin, Zahid Manzoor

    Published 2024-12-01
    “…This research addresses and seeks to overcome this shortcoming of slow confusion and diffusion using the Deoxyribonucleic Acid (DNA) replication process and shift-aided operations, leading to the DNA-PRESENT block cipher. …”
    Get full text
    Article
  15. 15

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…It can be applied in designing a new block cipher that fulfils Shanon’s confusion and diffusion properties. The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. …”
    Get full text
    Thesis
  16. 16

    The vulnerability analysis and the security evaluation of block ciphers by Rezaeipour, Davood, Md. Said, Mohamad Rushdan

    Published 2010
    “…The attainment of these properties causes the strength of confusion and diffusion properties in block ciphers. In this paper, we describe the computational efficiency of these properties for doing of security evaluation on the different classes of block ciphers. …”
    Get full text
    Article
  17. 17

    Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method by Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, Sajjad Shaukat Jamal, Abid Mehmood, Shehzad Ashraf Chaudhry

    Published 2023-01-01
    “…This article proposes a novel encryption scheme incorporating both confusion and diffusion for encrypting both grey-scale and color images. …”
    Get full text
    Article
  18. 18

    A novel hyperchaotic system with fast and slow attractors by Shaofu Wang

    Published 2022-10-01
    “…In the image encryption part, an algorithm is suggested to provide confusion and diffusion operations on the image. The results show that, by employing the hyperchaotic system, the original image information can be completely hidden after being encrypted and can be decrypted efficiently.…”
    Get full text
    Article
  19. 19

    Some statistical simulation results over the 128-bit block cipher CLEFIA by Rezaeipour, Davood, Md. Said, Mohamad Rushdan

    Published 2009
    “…The attainment of some properties such as completeness, strict avalanche criterion and randomness cause the invigoration of confusion and diffusion properties in block ciphers. In this paper, we evaluate CLEFIA by considering these three important properties. …”
    Get full text
    Article
  20. 20

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The thesis identifies the similarity elements, and highlights the essential computation elements, namely the DNA-strands, DNA-bases, Central dogma process that can be applied in symmetric block cipher that fulfills Shannon’s confusion and diffusion properties. The DNAB utilizes the DNA-based key-dependent components to enhance the security of cipher, and reduce the number of cipher-iterated rounds. …”
    Get full text
    Thesis