A Novel Cipher-Based Data Encryption with Galois Field Theory

Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to “information security,” they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about “infor...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 23; no. 6; p. 3287
Main Authors Hazzazi, Mohammad Mazyad, Attuluri, Sasidhar, Bassfar, Zaid, Joshi, Kireet
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 20.03.2023
MDPI
Subjects
Online AccessGet full text
ISSN1424-8220
1424-8220
DOI10.3390/s23063287

Cover

Abstract Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to “information security,” they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about “information security,” this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient’s medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document’s authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.
AbstractList Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to “information security,” they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about “information security,” this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient’s medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document’s authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.
Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.
Audience Academic
Author Hazzazi, Mohammad Mazyad
Bassfar, Zaid
Joshi, Kireet
Attuluri, Sasidhar
AuthorAffiliation 4 Department of CSE, Graphic Era Deemed to be University, Dehradun 248002, India
1 Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia
3 Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
2 Software Developer Applications, 671 E Royal Ln, APT 1074, Irving, TX 75039, USA
AuthorAffiliation_xml – name: 1 Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia
– name: 2 Software Developer Applications, 671 E Royal Ln, APT 1074, Irving, TX 75039, USA
– name: 3 Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
– name: 4 Department of CSE, Graphic Era Deemed to be University, Dehradun 248002, India
Author_xml – sequence: 1
  givenname: Mohammad Mazyad
  orcidid: 0000-0002-7945-9994
  surname: Hazzazi
  fullname: Hazzazi, Mohammad Mazyad
– sequence: 2
  givenname: Sasidhar
  surname: Attuluri
  fullname: Attuluri, Sasidhar
– sequence: 3
  givenname: Zaid
  orcidid: 0000-0003-1172-885X
  surname: Bassfar
  fullname: Bassfar, Zaid
– sequence: 4
  givenname: Kireet
  surname: Joshi
  fullname: Joshi, Kireet
BackLink https://www.ncbi.nlm.nih.gov/pubmed/36991997$$D View this record in MEDLINE/PubMed
BookMark eNp9kk1vEzEQhi1URNvAgT-AVuJCkdL6a732AaEQ2lKpgks5r2Z3x4kjZ53am1b593VIidoKIR88Gj_zeubVHJODPvRIyHtGT4Uw9CxxQZXgunpFjpjkcqw5pwdP4kNynNKCUi6E0G_IoVDGMGOqI_JlUvwMd-iLqVvNMY6_QcKu-A4DFOd9GzerwYW-uHfDvLgEH1wqLhz6rriZY4ibt-S1BZ_w3eM9Ir8vzm-mP8bXvy6vppPrcVtSM4y1LkurNNKO2ZIzoQGwK1FYZGWOGwOVURQqVnWUWVMCqI4ZUNagREmtGJGrnW4XYFGvoltC3NQBXP0nEeKshji41mPdotJG8sY0VkljbKO5KVWpBJUN5xKz1ued1rpfweYevN8LMlpv_az3fmb46w5erZsldi32QwT_rIPnL72b17Nwl6VoaaiUWeHTo0IMt2tMQ710qUXvocewTjWvDDdU6WzLiHx8gS7COvbZ2C3FKkqpVpk63VEzyOO63ob8cZtPh0vX5sWwLucnlRRGKC51LvjwdIZ983-XIAMnO6CNIaWI9r-GnL1gWzfAdklyF87_o-IBYknNHQ
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3433499
crossref_primary_10_3390_axioms13080515
crossref_primary_10_3390_s24206537
crossref_primary_10_3390_gels10110715
crossref_primary_10_1038_s41598_024_66332_2
crossref_primary_10_1109_ACCESS_2023_3315658
crossref_primary_10_1007_s11277_024_11679_y
crossref_primary_10_1109_ACCESS_2024_3354269
crossref_primary_10_3390_app14146388
crossref_primary_10_1515_bmt_2022_0336
crossref_primary_10_1007_s12083_023_01592_9
crossref_primary_10_3390_app13127168
crossref_primary_10_54392_irjmt2428
Cites_doi 10.1016/j.apm.2022.10.015
10.1063/5.0061639
10.3390/s22239444
10.1016/j.asoc.2021.107819
10.1016/j.sigpro.2013.07.020
10.1186/s13634-022-00963-3
10.32604/csse.2023.025999
10.11591/eei.v12i2.4967
10.11591/eei.v12i3.4498
10.1016/j.matcom.2022.12.025
10.1007/978-3-031-29689-5_2
10.1007/s11042-017-5590-0
10.1016/j.sigpro.2022.108781
10.1016/j.eswa.2022.118655
10.1109/MC.2022.3218363
10.1002/cpe.7430
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.3390/s23063287
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
Medical Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList Publicly Available Content Database
PubMed


CrossRef

MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: BENPR
  name: ProQuest Central
  url: http://www.proquest.com/pqcentral?accountid=15518
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_ce68942b9bf6499fb8295656304b224e
10.3390/s23063287
PMC10059044
A743936248
36991997
10_3390_s23063287
Genre Journal Article
GrantInformation_xml – fundername: King Khalid University
  grantid: R. G. P. 2/109/43
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
ALIPV
NPM
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
PRINS
7X8
PUEGO
5PM
ADRAZ
ADTOC
IPNFZ
RIG
UNPAY
ID FETCH-LOGICAL-c509t-8855f68e0d1f52138aaed5e3fe158aab9a7960a717d01f95aa6d19a6f9e4e40f3
IEDL.DBID M48
ISSN 1424-8220
IngestDate Tue Oct 14 19:07:08 EDT 2025
Sun Oct 26 04:15:59 EDT 2025
Tue Sep 30 17:15:18 EDT 2025
Fri Sep 05 11:42:27 EDT 2025
Tue Oct 07 07:15:08 EDT 2025
Mon Oct 20 16:55:55 EDT 2025
Thu Apr 03 06:54:04 EDT 2025
Thu Oct 16 04:30:13 EDT 2025
Thu Apr 24 23:12:39 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords discrete cosine transform
cryptography
advanced encryption standard
encryption
Black Widow Optimization Galois field
decryption
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c509t-8855f68e0d1f52138aaed5e3fe158aab9a7960a717d01f95aa6d19a6f9e4e40f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-7945-9994
0000-0003-1172-885X
OpenAccessLink https://proxy.k.utb.cz/login?url=https://www.mdpi.com/1424-8220/23/6/3287/pdf?version=1679315363
PMID 36991997
PQID 2791700086
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_ce68942b9bf6499fb8295656304b224e
unpaywall_primary_10_3390_s23063287
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10059044
proquest_miscellaneous_2792906821
proquest_journals_2791700086
gale_infotracacademiconefile_A743936248
pubmed_primary_36991997
crossref_primary_10_3390_s23063287
crossref_citationtrail_10_3390_s23063287
PublicationCentury 2000
PublicationDate 20230320
PublicationDateYYYYMMDD 2023-03-20
PublicationDate_xml – month: 3
  year: 2023
  text: 20230320
  day: 20
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Huang (ref_6) 2020; 2020
Kumar (ref_24) 2021; 112
Yang (ref_3) 2018; 77
CHILLALI (ref_10) 2023; 41
ref_13
Zhu (ref_21) 2023; 207
Sampradeepraj (ref_16) 2023; 35
Kuppuswamy (ref_20) 2023; 12
Zhang (ref_23) 2023; 212
Shukla (ref_25) 2022; 22
Lima (ref_5) 2014; 94
ref_15
Nardo (ref_2) 2021; 31
Drusinsky (ref_14) 2023; 56
Masadeh (ref_17) 2023; 15
Li (ref_11) 2023; 2023
Lima (ref_8) 2023; 202
Mishra (ref_19) 2023; 44
Benvenuto (ref_1) 2012; 1
ref_22
Kareem (ref_9) 2023; 12
Alemami (ref_18) 2023; 13
Mohanrasu (ref_12) 2023; 115
Desoky (ref_4) 2006; 8
ref_7
References_xml – ident: ref_7
– volume: 115
  start-page: 490
  year: 2023
  ident: ref_12
  article-title: Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2022.10.015
– volume: 1
  start-page: 1
  year: 2012
  ident: ref_1
  article-title: Galois field in cryptography
  publication-title: Univ. Wash.
– volume: 31
  start-page: 091101
  year: 2021
  ident: ref_2
  article-title: A reliable chaos-based cryptography using Galois field
  publication-title: Chaos Interdiscip. J. Nonlinear Sci.
  doi: 10.1063/5.0061639
– volume: 22
  start-page: 9444
  year: 2022
  ident: ref_25
  article-title: AES Based White Box Cryptography in Digital Signature Verification
  publication-title: Sensors
  doi: 10.3390/s22239444
– volume: 41
  start-page: 1
  year: 2023
  ident: ref_10
  article-title: Prof The “Elliptic” matrices and a new kind of cryptography
  publication-title: Bol. Soc. Parana. Matemática
– volume: 112
  start-page: 107819
  year: 2021
  ident: ref_24
  article-title: Securing private information by data perturbation using statistical transformation with three dimensional shearing
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2021.107819
– volume: 94
  start-page: 521
  year: 2014
  ident: ref_5
  article-title: Image encryption based on the fractional Fourier transform over finite fields
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2013.07.020
– volume: 2023
  start-page: 1
  year: 2023
  ident: ref_11
  article-title: A reconfigurable and compact subpipelined architecture for AES encryption and decryption
  publication-title: EURASIP J. Adv. Signal Process.
  doi: 10.1186/s13634-022-00963-3
– volume: 13
  start-page: 1708
  year: 2023
  ident: ref_18
  article-title: Advanced approach for encryption using advanced encryption standard with chaotic map
  publication-title: Int. J. Electr. Comput. Eng.
– volume: 15
  start-page: 56
  year: 2023
  ident: ref_17
  article-title: A new encryption system for IoT devices using embedded key cryptosystem
  publication-title: Int. J. Electron. Secur. Digit.
– volume: 44
  start-page: 1109
  year: 2023
  ident: ref_19
  article-title: Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN
  publication-title: Comput. Syst. Sci. Eng.
  doi: 10.32604/csse.2023.025999
– volume: 12
  start-page: 1148
  year: 2023
  ident: ref_20
  article-title: A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm
  publication-title: Bull. Electr. Eng. Inform.
  doi: 10.11591/eei.v12i2.4967
– volume: 12
  start-page: 1684
  year: 2023
  ident: ref_9
  article-title: An innovative method for enhancing advanced encryption standard algorithm based on magic square of order 6
  publication-title: Bull. Electr. Eng. Inform.
  doi: 10.11591/eei.v12i3.4498
– volume: 207
  start-page: 322
  year: 2023
  ident: ref_21
  article-title: Secure image encryption scheme based on a new robust chaotic map and strong S-box
  publication-title: Math. Comput. Simul.
  doi: 10.1016/j.matcom.2022.12.025
– ident: ref_13
  doi: 10.1007/978-3-031-29689-5_2
– volume: 77
  start-page: 21803
  year: 2018
  ident: ref_3
  article-title: A new color image encryption scheme based on logistic map over the finite field ZN
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-017-5590-0
– volume: 202
  start-page: 108781
  year: 2023
  ident: ref_8
  article-title: Light field image encryption based on steerable cosine number transform
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2022.108781
– ident: ref_15
– volume: 212
  start-page: 118655
  year: 2023
  ident: ref_23
  article-title: The unified image cryptography algorithm based on finite group
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2022.118655
– ident: ref_22
– volume: 8
  start-page: 285
  year: 2006
  ident: ref_4
  article-title: Cryptography software system using galois field arithmetic
  publication-title: Power
– volume: 56
  start-page: 102
  year: 2023
  ident: ref_14
  article-title: Encrypting for Time-and/or Location-Based Decryption
  publication-title: Computer
  doi: 10.1109/MC.2022.3218363
– volume: 35
  start-page: e7430
  year: 2023
  ident: ref_16
  article-title: Secure multicasting in wireless sensor networks using identity based cryptography
  publication-title: Concurr. Comput. Pract. Exp.
  doi: 10.1002/cpe.7430
– volume: 2020
  start-page: 3965281
  year: 2020
  ident: ref_6
  article-title: Chaotic color image encryption scheme using Deoxyribonucleic Acid (DNA) coding calculations and arithmetic over the galois field
  publication-title: Math. Probl. Eng.
SSID ssj0023338
Score 2.4843047
Snippet Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to...
SourceID doaj
unpaywall
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 3287
SubjectTerms advanced encryption standard
Algorithms
Black Widow Optimization Galois field
Communication
Computer science
Cryptography
Data encryption
Data security
decryption
discrete cosine transform
Efficiency
encryption
Fourier transforms
Optimization techniques
SummonAdditionalLinks – databaseName: Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6hXoAD4k3agsxDgkvUJHYc-8BhW7pUSPREpd4ixxmLlaJs1d2l6r9nJslGWR7iwi2K52DPeDzzJTOfAd7ZUHvKkilzUwoJoEgbm0pj7AmGFZ5AUZDcO_z1XJ9dqC-X-eXkqi-uCevpgXvFHXnUxqqsslXQlJ2HymSWkxCC4RWFH-TTNzF2C6YGqCUJefU8QpJA_dGKE22Zcd3cJPp0JP2_H8WTWPRrneTdTXvlbm9c00yC0PwhPBiyRzHrZ_0I7mD7GO5POAWfwMeZOF_-wEacLJgxID6mMFWLT27txGnrr2-7I0Lw51fx2TXLxUrMuYhN9E36T-Fifvrt5Cwe7kiIPYX6dWxMngdtMKnTQJFYGuewzlEGTHN6rqwrCKM4Am11kgabO6fr1DodLCpUSZDPYK9dtvgChE2lT31h6yR4ZfKs8uixoAeNDlWRR_Bhq7vSDwTifI9FUxKQYDWXo5ojeDOKXvWsGX8SOmYDjAJMdN29IPOXg_nLf5k_gvdsvpLdkSbj3dBVQEtiYqtyxoCLgrQyERxuLVwOfroqs8IyQSHhughej8PkYfzbxLW43HQyzIlvsjSC5_2GGOcsNeXX1tJazM5W2VnU7ki7-N6xeKdd369SEbwdd9XflbX_P5R1APcy8g0uocuSQ9hbX2_wJeVU6-pV5z4_AU53G9s
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lj9MwEB4t3QNwQDyXwILMQ4JLtEnsJPZhhdqlZYVEhRAr7S1yHBsqRUnpA7T_npm8aHndosQHP2Y83xfPfAZ4qVxhECUjchPCIkHhypd5Yn2DNCw1SIocp9rhD_Pk_EK8v4wvD2De18JQWmW_JzYbdVEb-kd-EqWKpOQQgb9ZfvPp1ig6Xe2v0NDd1QrFaSMxdg0OI1LGGsHhZDr_-GmgYBwZWasvxJHsn6wJgPOI8ul2olIj3v_nFr0To37Pn7y-rZb66ocuy53gNLsNtzpUycatGdyBA1vdhZs7WoP34HTM5vV3W7KzBSkJ-BMMXwV7qzeaTSuzumq2Dka_Zdk7XdaLNZtRchtri_fvw8Vs-vns3O_uTvANQoCNL2Ucu0TaoAgdRmgutbZFbLmzYYzPudIpcheNZK4IQqdirZMiVDpxygorAscfwKiqK_sQmAq5CU2qisAZIeMoN9bYFB8Sq61IYw9e93OXmU5YnO63KDMkGDTN2TDNHjwfmi5bNY2_NZrQAgwNSAC7eVGvvmSdP2XGJlKJKFe5S5C0uVxGirApD0SOqMR68IqWLyM3xc4Y3VUb4JBI8CobExHD4C2kB8f9Cmed_66zX9bmwbPhM3oeHafoytbbpg1p5cso9OCoNYihzzxB3K0UjkXumcreoPa_VIuvjbp32NQDC-HBi8Gq_j1Zj_7f-8dwI0Krp6S5KDiG0Wa1tU8QRW3yp51r_AT9vRqu
  priority: 102
  providerName: ProQuest
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB5B9wAceD8CCwoPCS7ZJrHj2AeEusuWFRIVByotp-A4NlRUadXHouXXM5O4UbuAhMQtSqZRpjPj-SaZ-QzwQrnKIEpG5Ma5xQKFqUiWwkYGy7DcYFHkGM0OfxiJkzF_f5qd-n1Ol76tEkvxSbNI0xRWhBks7qesL_oM0X1_Xrk3Z_5VEn1CYBiygl2GPZEhGO_B3nj0cfC5mSnyP275hBgW9_0lAW66zU4Wasj6f1-St3LSxX7JK-t6rs9_6Ol0KxkNb8CXjRptD8r3g_WqPDA_LzA8_oeeN-G6B6rhoPWsW3DJ1rfh2hZ94R14PQhHszM7DY8mRE4QHWJGrMK3eqXD49oszpvVKKQ3veE7PZ1NluGQ-uXClg_gLoyHx5-OTiK_HUNkEFWsIimzzAlp4ypxmPSZ1NpWmWXOJhkel0rnaAGN9WEVJ05lWosqUVo4ZbnlsWP3oFfPavsAQpUwk5hcVbEzXGZpaayxOR4Iqy3PswBebcxTGM9VTltmTAusWciSRWfJAJ51ovOWoONPQodk406AOLWbE7PF18KHaGGskIqnpSqdwDrQlTJVBHdZzEsEOjaAl-QhBUU-PozRfoABVSIOrWJAtR3iAS4D2N84UeGXhGWR5oq4ELGEDOBpdxmDmb7Q6NrO1o0M0e_LNAngfutz3TMzgVBeKdRF7njjjlK7V-rJt4YwPGlGjDkP4HnnuH__sx7-k9QjuJoi3qN2vDTeh95qsbaPEZ-tyic-Bn8BP-0x8Q
  priority: 102
  providerName: Unpaywall
Title A Novel Cipher-Based Data Encryption with Galois Field Theory
URI https://www.ncbi.nlm.nih.gov/pubmed/36991997
https://www.proquest.com/docview/2791700086
https://www.proquest.com/docview/2792906821
https://pubmed.ncbi.nlm.nih.gov/PMC10059044
https://www.mdpi.com/1424-8220/23/6/3287/pdf?version=1679315363
https://doaj.org/article/ce68942b9bf6499fb8295656304b224e
UnpaywallVersion publishedVersion
Volume 23
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVFSB
  databaseName: Free Full-Text Journals in Chemistry
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: HH5
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://abc-chemistry.org/
  providerName: ABC ChemistRy
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: KQ8
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: KQ8
  dateStart: 20030101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: ABDBF
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: ADMLS
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: GX1
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: GX1
  dateStart: 0
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: RPM
  dateStart: 20030101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 8FG
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVFZP
  databaseName: Scholars Portal Journals: Open Access
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 20250930
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M48
  dateStart: 20030101
  isFulltext: true
  titleUrlDefault: http://journals.scholarsportal.info
  providerName: Scholars Portal
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1Lj9MwEB7tQ4LlgHgTWKrwkOASSGInsQ8r1C7trpC2WiEqlVPkODZUipKlD6D_npkkjVrYvURWMlKS8djzfYn9DcAbaXONKBmRG-cGCQqTnshi42mkYYlGUmQZ7R2-GMfnE_55Gk33YFNjs3Xg4lpqR_WkJvPi_Z-f64844E-IcSJl_7AgGM0Q-u_DISYoSRUcLnj3MyFkSMMaUaFd8yO4xWLER5IUn7ayUi3e__8UvZWj_l0_eXtVXqn1b1UUW8lpdA_utqjS7TdhcB_2TPkA7mxpDT6Ek747rn6Zwj2dkZKAN8D0lbuf1FK5w1LP1_XU4dJnWfdMFdVs4Y5ocZvbbN5_BJPR8OvpudfWTvA0QoClJ0QU2VgYPw8sZmgmlDJ5ZJg1QYTtTKoEuYtCMpf7gZWRUnEeSBVbabjhvmWP4aCsSvMUXBkwHehE5r7VXERhpo02CTZiowxPIgfebXyX6lZYnOpbFCkSDPJ42nncgVed6VWjpnGd0YA6oDMgAez6RDX_nrbjKdUmFpKHmcxsjKTNZiKUhE2ZzzNEJcaBt9R9KQUOPoxW7W4DfCUSvEr7RMQweXPhwPGmh9NN-KVhIkm4EPmeAy-7yzjy6HeKKk21qm1IK1-EgQNPmoDonnkTVw6InVDZeandK-XsR63uHdT7gTl34HUXVTc769mNt34ORyHGPq2XC_1jOFjOV-YFAqhl1oP9ZJrgUYzOenA4GI4vv_TqjxG9euDgucn4sv_tL2sbG54
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb5wwEB6l6SHtoeq7tGnrvtReUAAbsA9RtXlsN02yp0TaGzXGNCutYLOPRvun-hs7AyzZ7euWGwIL2eN5fAPjbwDeqzwziJIRuQlhMUHhypVpZF2DaVhsMCnKOZ0dPu1HvXPxdRAONuDn8iwMlVUufWLlqLPS0DfynSBWRCWHCPzz-NKlrlH0d3XZQqNWi2O7uMKUbbp7dID7-yEIuodn-z236SrgGgyOM1fKMMwjab3MzzF2cam1zULLc-uHeJ0qHSOq15jmZJ6fq1DrKPOVjnJlhRVezvG9t-C24OhL0H7iwXWCxzHfq9mLOFfezpTgPQ-oWm8l5lWtAf4MACsR8PfqzK15MdaLKz0arYS-7n2412BW1qmV7AFs2OIh3F1hMnwEux3WL3_YEdsfEk-Bu4fBMWMHeqbZYWEmi8oxMfroy77oUTmcsi6VzrGaGuAxnN-IDJ_AZlEW9hkw5XPjm1hlXm6EDIPUWGNjvIistiIOHfi0lF1iGtpy6p4xSjB9ITEnrZgdeNsOHddcHX8btEcb0A4geu3qRjn5njTWmhgbSSWCVKV5hClhnspAEfLlnkgR81gHPtL2JeQEcDJGN2cZcElEp5V0KM1DaCCkA9vLHU4a7zBNrnXZgTftY7Rr-lmjC1vOqzHExC8D34GntUK0c-YRonqlcC1yTVXWFrX-pBheVNzhfnXaWAgH3rVa9W9hPf__7F_DVu_s9CQ5Oeofv4A7AVoAlecF3jZsziZz-xLx2ix9VRkJg283bZW_AG0FUaM
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIvE4IN4ECoSX4BI1iZ3EPlRo2-3SUlhxoNLeguPYsFKULPug2r_Gr2Mmyaa7vG69RWtrZY_n9SXjbwBeSptrzJIxc-PcIEBh0hNZbDyNMCzRCIoso7vDH4fx0Sl_P4pGW_BzdReGyipXPrF21Hml6R35bphIopKjvkC2LYv41B-8nXz3qIMUfWldtdNoVOTELM8Qvs32jvt41q_CcHD4-eDIazsMeBoD5dwTIopsLIyfBxbjGBNKmTwyzJogwudMqgQzfIWQJ_cDKyOl4jyQKrbScMN9y_B_L8HlhDFJ5YTJ6BzsMcR-DZMRDvq7M0r1WUiVe2vxr24T8GcwWIuGv1dqXl2UE7U8U0WxFgYHN-FGm7-6vUbhbsGWKW_D9TVWwzuw13OH1Q9TuAdj4izw9jFQ5m5fzZV7WOrpsnZSLr0Adt-pohrP3AGV0bkNTcBdOL0QGd6D7bIqzQNwZcB0oBOZ-1ZzEYWZNtok-BAbZXgSOfBmJbtUtxTm1EmjSBHKkJjTTswOPO-mThrejr9N2qcD6CYQ1Xb9QzX9mraWm2oTC8nDTGY2RnhoMxFKyoKZzzPMf4wDr-n4UnIIuBit2nsNuCWi1kp7BPkwTeDCgZ3VCaetp5il53rtwLNuGG2cPtyo0lSLeg6x8oswcOB-oxDdmlmMGb6UuBexoSobm9ocKcffah7xoL55zLkDLzqt-rewHv5_9U_hCtpj-uF4ePIIroVoAFSpF_o7sD2fLsxjTN3m2ZPaRlz4ctFG-QtYo1Xm
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB5B9wAceD8CCwoPCS7ZJrHj2AeEusuWFRIVByotp-A4NlRUadXHouXXM5O4UbuAhMQtSqZRpjPj-SaZ-QzwQrnKIEpG5Ma5xQKFqUiWwkYGy7DcYFHkGM0OfxiJkzF_f5qd-n1Ol76tEkvxSbNI0xRWhBks7qesL_oM0X1_Xrk3Z_5VEn1CYBiygl2GPZEhGO_B3nj0cfC5mSnyP275hBgW9_0lAW66zU4Wasj6f1-St3LSxX7JK-t6rs9_6Ol0KxkNb8CXjRptD8r3g_WqPDA_LzA8_oeeN-G6B6rhoPWsW3DJ1rfh2hZ94R14PQhHszM7DY8mRE4QHWJGrMK3eqXD49oszpvVKKQ3veE7PZ1NluGQ-uXClg_gLoyHx5-OTiK_HUNkEFWsIimzzAlp4ypxmPSZ1NpWmWXOJhkel0rnaAGN9WEVJ05lWosqUVo4ZbnlsWP3oFfPavsAQpUwk5hcVbEzXGZpaayxOR4Iqy3PswBebcxTGM9VTltmTAusWciSRWfJAJ51ovOWoONPQodk406AOLWbE7PF18KHaGGskIqnpSqdwDrQlTJVBHdZzEsEOjaAl-QhBUU-PozRfoABVSIOrWJAtR3iAS4D2N84UeGXhGWR5oq4ELGEDOBpdxmDmb7Q6NrO1o0M0e_LNAngfutz3TMzgVBeKdRF7njjjlK7V-rJt4YwPGlGjDkP4HnnuH__sx7-k9QjuJoi3qN2vDTeh95qsbaPEZ-tyic-Bn8BP-0x8Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Cipher-Based+Data+Encryption+with+Galois+Field+Theory&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Hazzazi%2C+Mohammad+Mazyad&rft.au=Attuluri%2C+Sasidhar&rft.au=Bassfar%2C+Zaid&rft.au=Joshi%2C+Kireet&rft.date=2023-03-20&rft.eissn=1424-8220&rft.volume=23&rft.issue=6&rft_id=info:doi/10.3390%2Fs23063287&rft_id=info%3Apmid%2F36991997&rft.externalDocID=36991997
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon