A Novel Cipher-Based Data Encryption with Galois Field Theory
Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to “information security,” they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about “infor...
Saved in:
| Published in | Sensors (Basel, Switzerland) Vol. 23; no. 6; p. 3287 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Switzerland
MDPI AG
20.03.2023
MDPI |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1424-8220 1424-8220 |
| DOI | 10.3390/s23063287 |
Cover
| Abstract | Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to “information security,” they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about “information security,” this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient’s medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document’s authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s. |
|---|---|
| AbstractList | Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to “information security,” they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about “information security,” this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient’s medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document’s authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s. Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s.Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to "information security," they are referring to the study and use of methods that make data transfers harder to intercept. When we talk about "information security," this is what we have in mind. Using private keys to encrypt and decode messages is a part of this procedure. Because of its vital role in modern information theory, computer security, and engineering, cryptography is now considered to be a branch of both mathematics and computer science. Because of its mathematical properties, the Galois field may be used to encrypt and decode information, making it relevant to the subject of cryptography. The ability to encrypt and decode information is one such use. In this case, the data may be encoded as a Galois vector, and the scrambling process could include the application of mathematical operations that involve an inverse. While this method is unsafe when used on its own, it forms the foundation for secure symmetric algorithms like AES and DES when combined with other bit shuffling methods. A two-by-two encryption matrix is used to protect the two data streams, each of which contains 25 bits of binary information which is included in the proposed work. Each cell in the matrix represents an irreducible polynomial of degree 6. Fine-tuning the values of the bits that make up each of the two 25-bit binary data streams using the Discrete Cosine Transform (DCT) with the Advanced Encryption Standard (AES) Method yields two polynomials of degree 6. Optimization is carried out using the Black Widow Optimization technique is used to tune the key generation in the cryptographic processing. By doing so, we can produce two polynomials of the same degree, which was our original aim. Users may also use cryptography to look for signs of tampering, such as whether a hacker obtained unauthorized access to a patient's medical records and made any changes to them. Cryptography also allows people to look for signs of tampering with data. Indeed, this is another use of cryptography. It also has the added value of allowing users to check for indications of data manipulation. Users may also positively identify faraway people and objects, which is especially useful for verifying a document's authenticity since it lessens the possibility that it was fabricated. The proposed work achieves higher accuracy of 97.24%, higher throughput of 93.47%, and a minimum decryption time of 0.0047 s. |
| Audience | Academic |
| Author | Hazzazi, Mohammad Mazyad Bassfar, Zaid Joshi, Kireet Attuluri, Sasidhar |
| AuthorAffiliation | 4 Department of CSE, Graphic Era Deemed to be University, Dehradun 248002, India 1 Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia 3 Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia 2 Software Developer Applications, 671 E Royal Ln, APT 1074, Irving, TX 75039, USA |
| AuthorAffiliation_xml | – name: 1 Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia – name: 2 Software Developer Applications, 671 E Royal Ln, APT 1074, Irving, TX 75039, USA – name: 3 Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia – name: 4 Department of CSE, Graphic Era Deemed to be University, Dehradun 248002, India |
| Author_xml | – sequence: 1 givenname: Mohammad Mazyad orcidid: 0000-0002-7945-9994 surname: Hazzazi fullname: Hazzazi, Mohammad Mazyad – sequence: 2 givenname: Sasidhar surname: Attuluri fullname: Attuluri, Sasidhar – sequence: 3 givenname: Zaid orcidid: 0000-0003-1172-885X surname: Bassfar fullname: Bassfar, Zaid – sequence: 4 givenname: Kireet surname: Joshi fullname: Joshi, Kireet |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/36991997$$D View this record in MEDLINE/PubMed |
| BookMark | eNp9kk1vEzEQhi1URNvAgT-AVuJCkdL6a732AaEQ2lKpgks5r2Z3x4kjZ53am1b593VIidoKIR88Gj_zeubVHJODPvRIyHtGT4Uw9CxxQZXgunpFjpjkcqw5pwdP4kNynNKCUi6E0G_IoVDGMGOqI_JlUvwMd-iLqVvNMY6_QcKu-A4DFOd9GzerwYW-uHfDvLgEH1wqLhz6rriZY4ibt-S1BZ_w3eM9Ir8vzm-mP8bXvy6vppPrcVtSM4y1LkurNNKO2ZIzoQGwK1FYZGWOGwOVURQqVnWUWVMCqI4ZUNagREmtGJGrnW4XYFGvoltC3NQBXP0nEeKshji41mPdotJG8sY0VkljbKO5KVWpBJUN5xKz1ued1rpfweYevN8LMlpv_az3fmb46w5erZsldi32QwT_rIPnL72b17Nwl6VoaaiUWeHTo0IMt2tMQ710qUXvocewTjWvDDdU6WzLiHx8gS7COvbZ2C3FKkqpVpk63VEzyOO63ob8cZtPh0vX5sWwLucnlRRGKC51LvjwdIZ983-XIAMnO6CNIaWI9r-GnL1gWzfAdklyF87_o-IBYknNHQ |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3433499 crossref_primary_10_3390_axioms13080515 crossref_primary_10_3390_s24206537 crossref_primary_10_3390_gels10110715 crossref_primary_10_1038_s41598_024_66332_2 crossref_primary_10_1109_ACCESS_2023_3315658 crossref_primary_10_1007_s11277_024_11679_y crossref_primary_10_1109_ACCESS_2024_3354269 crossref_primary_10_3390_app14146388 crossref_primary_10_1515_bmt_2022_0336 crossref_primary_10_1007_s12083_023_01592_9 crossref_primary_10_3390_app13127168 crossref_primary_10_54392_irjmt2428 |
| Cites_doi | 10.1016/j.apm.2022.10.015 10.1063/5.0061639 10.3390/s22239444 10.1016/j.asoc.2021.107819 10.1016/j.sigpro.2013.07.020 10.1186/s13634-022-00963-3 10.32604/csse.2023.025999 10.11591/eei.v12i2.4967 10.11591/eei.v12i3.4498 10.1016/j.matcom.2022.12.025 10.1007/978-3-031-29689-5_2 10.1007/s11042-017-5590-0 10.1016/j.sigpro.2022.108781 10.1016/j.eswa.2022.118655 10.1109/MC.2022.3218363 10.1002/cpe.7430 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM ADTOC UNPAY DOA |
| DOI | 10.3390/s23063287 |
| DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) Medical Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | Publicly Available Content Database PubMed CrossRef MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: BENPR name: ProQuest Central url: http://www.proquest.com/pqcentral?accountid=15518 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_ce68942b9bf6499fb8295656304b224e 10.3390/s23063287 PMC10059044 A743936248 36991997 10_3390_s23063287 |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: King Khalid University grantid: R. G. P. 2/109/43 |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M ALIPV NPM 3V. 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI PRINS 7X8 PUEGO 5PM ADRAZ ADTOC IPNFZ RIG UNPAY |
| ID | FETCH-LOGICAL-c509t-8855f68e0d1f52138aaed5e3fe158aab9a7960a717d01f95aa6d19a6f9e4e40f3 |
| IEDL.DBID | M48 |
| ISSN | 1424-8220 |
| IngestDate | Tue Oct 14 19:07:08 EDT 2025 Sun Oct 26 04:15:59 EDT 2025 Tue Sep 30 17:15:18 EDT 2025 Fri Sep 05 11:42:27 EDT 2025 Tue Oct 07 07:15:08 EDT 2025 Mon Oct 20 16:55:55 EDT 2025 Thu Apr 03 06:54:04 EDT 2025 Thu Oct 16 04:30:13 EDT 2025 Thu Apr 24 23:12:39 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | discrete cosine transform cryptography advanced encryption standard encryption Black Widow Optimization Galois field decryption |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c509t-8855f68e0d1f52138aaed5e3fe158aab9a7960a717d01f95aa6d19a6f9e4e40f3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0002-7945-9994 0000-0003-1172-885X |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://www.mdpi.com/1424-8220/23/6/3287/pdf?version=1679315363 |
| PMID | 36991997 |
| PQID | 2791700086 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_ce68942b9bf6499fb8295656304b224e unpaywall_primary_10_3390_s23063287 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10059044 proquest_miscellaneous_2792906821 proquest_journals_2791700086 gale_infotracacademiconefile_A743936248 pubmed_primary_36991997 crossref_primary_10_3390_s23063287 crossref_citationtrail_10_3390_s23063287 |
| PublicationCentury | 2000 |
| PublicationDate | 20230320 |
| PublicationDateYYYYMMDD | 2023-03-20 |
| PublicationDate_xml | – month: 3 year: 2023 text: 20230320 day: 20 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationTitleAlternate | Sensors (Basel) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Huang (ref_6) 2020; 2020 Kumar (ref_24) 2021; 112 Yang (ref_3) 2018; 77 CHILLALI (ref_10) 2023; 41 ref_13 Zhu (ref_21) 2023; 207 Sampradeepraj (ref_16) 2023; 35 Kuppuswamy (ref_20) 2023; 12 Zhang (ref_23) 2023; 212 Shukla (ref_25) 2022; 22 Lima (ref_5) 2014; 94 ref_15 Nardo (ref_2) 2021; 31 Drusinsky (ref_14) 2023; 56 Masadeh (ref_17) 2023; 15 Li (ref_11) 2023; 2023 Lima (ref_8) 2023; 202 Mishra (ref_19) 2023; 44 Benvenuto (ref_1) 2012; 1 ref_22 Kareem (ref_9) 2023; 12 Alemami (ref_18) 2023; 13 Mohanrasu (ref_12) 2023; 115 Desoky (ref_4) 2006; 8 ref_7 |
| References_xml | – ident: ref_7 – volume: 115 start-page: 490 year: 2023 ident: ref_12 article-title: Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2022.10.015 – volume: 1 start-page: 1 year: 2012 ident: ref_1 article-title: Galois field in cryptography publication-title: Univ. Wash. – volume: 31 start-page: 091101 year: 2021 ident: ref_2 article-title: A reliable chaos-based cryptography using Galois field publication-title: Chaos Interdiscip. J. Nonlinear Sci. doi: 10.1063/5.0061639 – volume: 22 start-page: 9444 year: 2022 ident: ref_25 article-title: AES Based White Box Cryptography in Digital Signature Verification publication-title: Sensors doi: 10.3390/s22239444 – volume: 41 start-page: 1 year: 2023 ident: ref_10 article-title: Prof The “Elliptic” matrices and a new kind of cryptography publication-title: Bol. Soc. Parana. Matemática – volume: 112 start-page: 107819 year: 2021 ident: ref_24 article-title: Securing private information by data perturbation using statistical transformation with three dimensional shearing publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2021.107819 – volume: 94 start-page: 521 year: 2014 ident: ref_5 article-title: Image encryption based on the fractional Fourier transform over finite fields publication-title: Signal Process. doi: 10.1016/j.sigpro.2013.07.020 – volume: 2023 start-page: 1 year: 2023 ident: ref_11 article-title: A reconfigurable and compact subpipelined architecture for AES encryption and decryption publication-title: EURASIP J. Adv. Signal Process. doi: 10.1186/s13634-022-00963-3 – volume: 13 start-page: 1708 year: 2023 ident: ref_18 article-title: Advanced approach for encryption using advanced encryption standard with chaotic map publication-title: Int. J. Electr. Comput. Eng. – volume: 15 start-page: 56 year: 2023 ident: ref_17 article-title: A new encryption system for IoT devices using embedded key cryptosystem publication-title: Int. J. Electron. Secur. Digit. – volume: 44 start-page: 1109 year: 2023 ident: ref_19 article-title: Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN publication-title: Comput. Syst. Sci. Eng. doi: 10.32604/csse.2023.025999 – volume: 12 start-page: 1148 year: 2023 ident: ref_20 article-title: A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm publication-title: Bull. Electr. Eng. Inform. doi: 10.11591/eei.v12i2.4967 – volume: 12 start-page: 1684 year: 2023 ident: ref_9 article-title: An innovative method for enhancing advanced encryption standard algorithm based on magic square of order 6 publication-title: Bull. Electr. Eng. Inform. doi: 10.11591/eei.v12i3.4498 – volume: 207 start-page: 322 year: 2023 ident: ref_21 article-title: Secure image encryption scheme based on a new robust chaotic map and strong S-box publication-title: Math. Comput. Simul. doi: 10.1016/j.matcom.2022.12.025 – ident: ref_13 doi: 10.1007/978-3-031-29689-5_2 – volume: 77 start-page: 21803 year: 2018 ident: ref_3 article-title: A new color image encryption scheme based on logistic map over the finite field ZN publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-017-5590-0 – volume: 202 start-page: 108781 year: 2023 ident: ref_8 article-title: Light field image encryption based on steerable cosine number transform publication-title: Signal Process. doi: 10.1016/j.sigpro.2022.108781 – ident: ref_15 – volume: 212 start-page: 118655 year: 2023 ident: ref_23 article-title: The unified image cryptography algorithm based on finite group publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.118655 – ident: ref_22 – volume: 8 start-page: 285 year: 2006 ident: ref_4 article-title: Cryptography software system using galois field arithmetic publication-title: Power – volume: 56 start-page: 102 year: 2023 ident: ref_14 article-title: Encrypting for Time-and/or Location-Based Decryption publication-title: Computer doi: 10.1109/MC.2022.3218363 – volume: 35 start-page: e7430 year: 2023 ident: ref_16 article-title: Secure multicasting in wireless sensor networks using identity based cryptography publication-title: Concurr. Comput. Pract. Exp. doi: 10.1002/cpe.7430 – volume: 2020 start-page: 3965281 year: 2020 ident: ref_6 article-title: Chaotic color image encryption scheme using Deoxyribonucleic Acid (DNA) coding calculations and arithmetic over the galois field publication-title: Math. Probl. Eng. |
| SSID | ssj0023338 |
| Score | 2.4843047 |
| Snippet | Both the act of keeping information secret and the research on how to achieve it are included in the broad category of cryptography. When people refer to... |
| SourceID | doaj unpaywall pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 3287 |
| SubjectTerms | advanced encryption standard Algorithms Black Widow Optimization Galois field Communication Computer science Cryptography Data encryption Data security decryption discrete cosine transform Efficiency encryption Fourier transforms Optimization techniques |
| SummonAdditionalLinks | – databaseName: Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB6hXoAD4k3agsxDgkvUJHYc-8BhW7pUSPREpd4ixxmLlaJs1d2l6r9nJslGWR7iwi2K52DPeDzzJTOfAd7ZUHvKkilzUwoJoEgbm0pj7AmGFZ5AUZDcO_z1XJ9dqC-X-eXkqi-uCevpgXvFHXnUxqqsslXQlJ2HymSWkxCC4RWFH-TTNzF2C6YGqCUJefU8QpJA_dGKE22Zcd3cJPp0JP2_H8WTWPRrneTdTXvlbm9c00yC0PwhPBiyRzHrZ_0I7mD7GO5POAWfwMeZOF_-wEacLJgxID6mMFWLT27txGnrr2-7I0Lw51fx2TXLxUrMuYhN9E36T-Fifvrt5Cwe7kiIPYX6dWxMngdtMKnTQJFYGuewzlEGTHN6rqwrCKM4Am11kgabO6fr1DodLCpUSZDPYK9dtvgChE2lT31h6yR4ZfKs8uixoAeNDlWRR_Bhq7vSDwTifI9FUxKQYDWXo5ojeDOKXvWsGX8SOmYDjAJMdN29IPOXg_nLf5k_gvdsvpLdkSbj3dBVQEtiYqtyxoCLgrQyERxuLVwOfroqs8IyQSHhughej8PkYfzbxLW43HQyzIlvsjSC5_2GGOcsNeXX1tJazM5W2VnU7ki7-N6xeKdd369SEbwdd9XflbX_P5R1APcy8g0uocuSQ9hbX2_wJeVU6-pV5z4_AU53G9s priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lj9MwEB4t3QNwQDyXwILMQ4JLtEnsJPZhhdqlZYVEhRAr7S1yHBsqRUnpA7T_npm8aHndosQHP2Y83xfPfAZ4qVxhECUjchPCIkHhypd5Yn2DNCw1SIocp9rhD_Pk_EK8v4wvD2De18JQWmW_JzYbdVEb-kd-EqWKpOQQgb9ZfvPp1ig6Xe2v0NDd1QrFaSMxdg0OI1LGGsHhZDr_-GmgYBwZWasvxJHsn6wJgPOI8ul2olIj3v_nFr0To37Pn7y-rZb66ocuy53gNLsNtzpUycatGdyBA1vdhZs7WoP34HTM5vV3W7KzBSkJ-BMMXwV7qzeaTSuzumq2Dka_Zdk7XdaLNZtRchtri_fvw8Vs-vns3O_uTvANQoCNL2Ucu0TaoAgdRmgutbZFbLmzYYzPudIpcheNZK4IQqdirZMiVDpxygorAscfwKiqK_sQmAq5CU2qisAZIeMoN9bYFB8Sq61IYw9e93OXmU5YnO63KDMkGDTN2TDNHjwfmi5bNY2_NZrQAgwNSAC7eVGvvmSdP2XGJlKJKFe5S5C0uVxGirApD0SOqMR68IqWLyM3xc4Y3VUb4JBI8CobExHD4C2kB8f9Cmed_66zX9bmwbPhM3oeHafoytbbpg1p5cso9OCoNYihzzxB3K0UjkXumcreoPa_VIuvjbp32NQDC-HBi8Gq_j1Zj_7f-8dwI0Krp6S5KDiG0Wa1tU8QRW3yp51r_AT9vRqu priority: 102 providerName: ProQuest – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB5B9wAceD8CCwoPCS7ZJrHj2AeEusuWFRIVByotp-A4NlRUadXHouXXM5O4UbuAhMQtSqZRpjPj-SaZ-QzwQrnKIEpG5Ma5xQKFqUiWwkYGy7DcYFHkGM0OfxiJkzF_f5qd-n1Ol76tEkvxSbNI0xRWhBks7qesL_oM0X1_Xrk3Z_5VEn1CYBiygl2GPZEhGO_B3nj0cfC5mSnyP275hBgW9_0lAW66zU4Wasj6f1-St3LSxX7JK-t6rs9_6Ol0KxkNb8CXjRptD8r3g_WqPDA_LzA8_oeeN-G6B6rhoPWsW3DJ1rfh2hZ94R14PQhHszM7DY8mRE4QHWJGrMK3eqXD49oszpvVKKQ3veE7PZ1NluGQ-uXClg_gLoyHx5-OTiK_HUNkEFWsIimzzAlp4ypxmPSZ1NpWmWXOJhkel0rnaAGN9WEVJ05lWosqUVo4ZbnlsWP3oFfPavsAQpUwk5hcVbEzXGZpaayxOR4Iqy3PswBebcxTGM9VTltmTAusWciSRWfJAJ51ovOWoONPQodk406AOLWbE7PF18KHaGGskIqnpSqdwDrQlTJVBHdZzEsEOjaAl-QhBUU-PozRfoABVSIOrWJAtR3iAS4D2N84UeGXhGWR5oq4ELGEDOBpdxmDmb7Q6NrO1o0M0e_LNAngfutz3TMzgVBeKdRF7njjjlK7V-rJt4YwPGlGjDkP4HnnuH__sx7-k9QjuJoi3qN2vDTeh95qsbaPEZ-tyic-Bn8BP-0x8Q priority: 102 providerName: Unpaywall |
| Title | A Novel Cipher-Based Data Encryption with Galois Field Theory |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/36991997 https://www.proquest.com/docview/2791700086 https://www.proquest.com/docview/2792906821 https://pubmed.ncbi.nlm.nih.gov/PMC10059044 https://www.mdpi.com/1424-8220/23/6/3287/pdf?version=1679315363 https://doaj.org/article/ce68942b9bf6499fb8295656304b224e |
| UnpaywallVersion | publishedVersion |
| Volume | 23 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: HH5 dateStart: 20010101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: KQ8 dateStart: 20010101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: KQ8 dateStart: 20030101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: ABDBF dateStart: 20081201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: ADMLS dateStart: 20081201 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: GX1 dateStart: 20010101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: GX1 dateStart: 0 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: RPM dateStart: 20030101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 8FG dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVFZP databaseName: Scholars Portal Journals: Open Access customDbUrl: eissn: 1424-8220 dateEnd: 20250930 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M48 dateStart: 20030101 isFulltext: true titleUrlDefault: http://journals.scholarsportal.info providerName: Scholars Portal |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV1Lj9MwEB7tQ4LlgHgTWKrwkOASSGInsQ8r1C7trpC2WiEqlVPkODZUipKlD6D_npkkjVrYvURWMlKS8djzfYn9DcAbaXONKBmRG-cGCQqTnshi42mkYYlGUmQZ7R2-GMfnE_55Gk33YFNjs3Xg4lpqR_WkJvPi_Z-f64844E-IcSJl_7AgGM0Q-u_DISYoSRUcLnj3MyFkSMMaUaFd8yO4xWLER5IUn7ayUi3e__8UvZWj_l0_eXtVXqn1b1UUW8lpdA_utqjS7TdhcB_2TPkA7mxpDT6Ek747rn6Zwj2dkZKAN8D0lbuf1FK5w1LP1_XU4dJnWfdMFdVs4Y5ocZvbbN5_BJPR8OvpudfWTvA0QoClJ0QU2VgYPw8sZmgmlDJ5ZJg1QYTtTKoEuYtCMpf7gZWRUnEeSBVbabjhvmWP4aCsSvMUXBkwHehE5r7VXERhpo02CTZiowxPIgfebXyX6lZYnOpbFCkSDPJ42nncgVed6VWjpnGd0YA6oDMgAez6RDX_nrbjKdUmFpKHmcxsjKTNZiKUhE2ZzzNEJcaBt9R9KQUOPoxW7W4DfCUSvEr7RMQweXPhwPGmh9NN-KVhIkm4EPmeAy-7yzjy6HeKKk21qm1IK1-EgQNPmoDonnkTVw6InVDZeandK-XsR63uHdT7gTl34HUXVTc769mNt34ORyHGPq2XC_1jOFjOV-YFAqhl1oP9ZJrgUYzOenA4GI4vv_TqjxG9euDgucn4sv_tL2sbG54 |
| linkProvider | Scholars Portal |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb5wwEB6l6SHtoeq7tGnrvtReUAAbsA9RtXlsN02yp0TaGzXGNCutYLOPRvun-hs7AyzZ7euWGwIL2eN5fAPjbwDeqzwziJIRuQlhMUHhypVpZF2DaVhsMCnKOZ0dPu1HvXPxdRAONuDn8iwMlVUufWLlqLPS0DfynSBWRCWHCPzz-NKlrlH0d3XZQqNWi2O7uMKUbbp7dID7-yEIuodn-z236SrgGgyOM1fKMMwjab3MzzF2cam1zULLc-uHeJ0qHSOq15jmZJ6fq1DrKPOVjnJlhRVezvG9t-C24OhL0H7iwXWCxzHfq9mLOFfezpTgPQ-oWm8l5lWtAf4MACsR8PfqzK15MdaLKz0arYS-7n2412BW1qmV7AFs2OIh3F1hMnwEux3WL3_YEdsfEk-Bu4fBMWMHeqbZYWEmi8oxMfroy77oUTmcsi6VzrGaGuAxnN-IDJ_AZlEW9hkw5XPjm1hlXm6EDIPUWGNjvIistiIOHfi0lF1iGtpy6p4xSjB9ITEnrZgdeNsOHddcHX8btEcb0A4geu3qRjn5njTWmhgbSSWCVKV5hClhnspAEfLlnkgR81gHPtL2JeQEcDJGN2cZcElEp5V0KM1DaCCkA9vLHU4a7zBNrnXZgTftY7Rr-lmjC1vOqzHExC8D34GntUK0c-YRonqlcC1yTVXWFrX-pBheVNzhfnXaWAgH3rVa9W9hPf__7F_DVu_s9CQ5Oeofv4A7AVoAlecF3jZsziZz-xLx2ix9VRkJg283bZW_AG0FUaM |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIvE4IN4ECoSX4BI1iZ3EPlRo2-3SUlhxoNLeguPYsFKULPug2r_Gr2Mmyaa7vG69RWtrZY_n9SXjbwBeSptrzJIxc-PcIEBh0hNZbDyNMCzRCIoso7vDH4fx0Sl_P4pGW_BzdReGyipXPrF21Hml6R35bphIopKjvkC2LYv41B-8nXz3qIMUfWldtdNoVOTELM8Qvs32jvt41q_CcHD4-eDIazsMeBoD5dwTIopsLIyfBxbjGBNKmTwyzJogwudMqgQzfIWQJ_cDKyOl4jyQKrbScMN9y_B_L8HlhDFJ5YTJ6BzsMcR-DZMRDvq7M0r1WUiVe2vxr24T8GcwWIuGv1dqXl2UE7U8U0WxFgYHN-FGm7-6vUbhbsGWKW_D9TVWwzuw13OH1Q9TuAdj4izw9jFQ5m5fzZV7WOrpsnZSLr0Adt-pohrP3AGV0bkNTcBdOL0QGd6D7bIqzQNwZcB0oBOZ-1ZzEYWZNtok-BAbZXgSOfBmJbtUtxTm1EmjSBHKkJjTTswOPO-mThrejr9N2qcD6CYQ1Xb9QzX9mraWm2oTC8nDTGY2RnhoMxFKyoKZzzPMf4wDr-n4UnIIuBit2nsNuCWi1kp7BPkwTeDCgZ3VCaetp5il53rtwLNuGG2cPtyo0lSLeg6x8oswcOB-oxDdmlmMGb6UuBexoSobm9ocKcffah7xoL55zLkDLzqt-rewHv5_9U_hCtpj-uF4ePIIroVoAFSpF_o7sD2fLsxjTN3m2ZPaRlz4ctFG-QtYo1Xm |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB5B9wAceD8CCwoPCS7ZJrHj2AeEusuWFRIVByotp-A4NlRUadXHouXXM5O4UbuAhMQtSqZRpjPj-SaZ-QzwQrnKIEpG5Ma5xQKFqUiWwkYGy7DcYFHkGM0OfxiJkzF_f5qd-n1Ol76tEkvxSbNI0xRWhBks7qesL_oM0X1_Xrk3Z_5VEn1CYBiygl2GPZEhGO_B3nj0cfC5mSnyP275hBgW9_0lAW66zU4Wasj6f1-St3LSxX7JK-t6rs9_6Ol0KxkNb8CXjRptD8r3g_WqPDA_LzA8_oeeN-G6B6rhoPWsW3DJ1rfh2hZ94R14PQhHszM7DY8mRE4QHWJGrMK3eqXD49oszpvVKKQ3veE7PZ1NluGQ-uXClg_gLoyHx5-OTiK_HUNkEFWsIimzzAlp4ypxmPSZ1NpWmWXOJhkel0rnaAGN9WEVJ05lWosqUVo4ZbnlsWP3oFfPavsAQpUwk5hcVbEzXGZpaayxOR4Iqy3PswBebcxTGM9VTltmTAusWciSRWfJAJ51ovOWoONPQodk406AOLWbE7PF18KHaGGskIqnpSqdwDrQlTJVBHdZzEsEOjaAl-QhBUU-PozRfoABVSIOrWJAtR3iAS4D2N84UeGXhGWR5oq4ELGEDOBpdxmDmb7Q6NrO1o0M0e_LNAngfutz3TMzgVBeKdRF7njjjlK7V-rJt4YwPGlGjDkP4HnnuH__sx7-k9QjuJoi3qN2vDTeh95qsbaPEZ-tyic-Bn8BP-0x8Q |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Novel+Cipher-Based+Data+Encryption+with+Galois+Field+Theory&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Hazzazi%2C+Mohammad+Mazyad&rft.au=Attuluri%2C+Sasidhar&rft.au=Bassfar%2C+Zaid&rft.au=Joshi%2C+Kireet&rft.date=2023-03-20&rft.eissn=1424-8220&rft.volume=23&rft.issue=6&rft_id=info:doi/10.3390%2Fs23063287&rft_id=info%3Apmid%2F36991997&rft.externalDocID=36991997 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |