ArticlePDF Available

Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File

Authors:
  • STMIK Budi Darma
  • STMIK Budi Darma
  • STMIK Budi Darma
  • Sekolah Tinggi Ilmu Manajemen Sukma, Medan, Indonesia

Abstract and Figures

With the changing of the times, information is crucial today especially for technological developments, especially in data security systems. In maintaining data security, there is a branch of science in its development, namely cryptography. Classical cryptography as vigenere cipher is a cryptographic algorithm implementation is very simple but quite powerful in his era. Having discovered methods kasiski, vigenere cipher algorithm is very easy to be analyzed by cryptanalyst to get a key. This is due to the relationship between the cipher, plaintext, and the key cryptography. The core used is usually composed of some characters arrangement either letters or numbers that are not too long, so it is easy to remember. So as to facilitate cryptanalyst to determine the key cryptography. To that end, the key must be an array of random characters long, so that the relationship between plaintext, ciphertext and key becomes very apparent that it would be difficult to solve by cryptanalyst. Which is the key arrangement of random characters that can obtain the pixel values of an image that being converted into ASCII characters? The pixel values of 8-bit grayscale images ranging from 0-255 equal the number of characters in the ASCII table. So that all pixel values in an 8-bit grayscale image can be converted into random characters and can be used as a key for the Vigenere Cipher Algorithm.
Content may be subject to copyright.
Vigenere Cipher Algorithm with Grayscale Image
Key Generator for Secure Text File
Imam Saputra1
Departement of Computer Engineering
STMIK Budi Darma
Medan, Indonesia
Jl. Sisingamangaraja XII No. 338, Siti Rejo I, Medan Kota,
Kota Medan, Sumatera Utara, 20216
Mesran2
Departement of Computer Engineering
STMIK Budi Darma
Medan, Indonesia
Jl. Sisingamangaraja XII No. 338, Siti Rejo I, Medan Kota,
Kota Medan, Sumatera Utara, 20216
Nelly Astuti Hasibuan3
Departement of Computer Engineering
STMIK Budi Darma
Medan, Indonesia
Jl. Sisingamangaraja XII No. 338, Siti Rejo I, Medan Kota,
Kota Medan, Sumatera Utara, 20216
Robbi Rahim4
Departement of Computer Engineering
Medan Institute of Technology
Medan, Indonesia
Jl. Gedung Arca No.52 Kota Medan, Sumatera Utara,
Abstract - With the changing of the times, information is crucial
today especially for technological developments, especially in
data security systems. In maintaining data security, there is a
branch of science in its development, namely cryptography.
Classical cryptography as vigenere cipher is a cryptographic
algorithm implementation is very simple but quite powerful in
his era. Having discovered methods kasiski, vigenere cipher
algorithm is very easy to be analyzed by cryptanalyst to get a
key. This is due to the relationship between the cipher, plaintext,
and the key cryptography. The core used is usually composed of
some characters arrangement either letters or numbers that are
not too long, so it is easy to remember. So as to facilitate
cryptanalyst to determine the key cryptography. To that end,
the key must be an array of random characters long, so that the
relationship between plaintext, ciphertext and key becomes very
apparent that it would be difficult to solve by cryptanalyst.
Which is the key arrangement of random characters that can
obtain the pixel values of an image that being converted into
ASCII characters? The pixel values of 8-bit grayscale images
ranging from 0-255 equal the number of characters in the
ASCII table. So that all pixel values in an 8-bit grayscale image
can be converted into random characters and can be used as a
key for the Vigenere Cipher Algorithm.
Keywords: Vigenere Cipher, Key Generator, Grayscale Image 8
Bit I. INTRODUCTION
Computer technology needed in human life. Almost every
man needs computer assistance in their daily lives. Each
person will have an important document that is confidential
which can only be accessed by certain people. The problem of
computer security is something crucial in this information age.
There are several techniques for data security one of which is
a disguise or cryptographic techniques. Cryptography is the art
and science to protect the data by transforming it into a
specific code and is intended only for people who have the
key to change the code back to normal. In the field of
cryptography, there are three crucial concepts that encryption,
decryption, and key. Encryption is the process of transforming
information (plaintext) into a code that is not recognizable
(ciphertext) by using a key. Decryption is the process of
converting code that is not identifiable (ciphertext) into
information (plaintext) using a key, in this case, the encrypted
files in text files.
One of the famous classic cryptographic algorithms is
Vigenere Cipher Algorithm. Vigenere Cipher is a form
polyalphabetic substitution like the idea expressed Caesar but
by adding more secure locks are formed. Vigenere Cipher is
well known because it is easily implemented. This method is
strong enough to avoid a cryptanalyst who uses frequency
analysis until. Finally, someone named Frederick Kasiski to
find an efficient method to solve the Vigenere Cipher
Algorithm keys. Vigenere Cipher Algorithms have abandon
for quite easily analyzed by cryptanalyst. Especially with the
technology that exists today and the discovery of Kasiski
methods then if we want to use Vigenere Cipher Algorithms
need to be modified. The manner in which this time is to
generate a key from an 8-bit grayscale image pixel value has
been converted into a row of characters with ASCII table.
With a key which is an image, then the key can be longer and
more random characters so that the relationship between the
plaintext and ciphertext will be more apparent, so cryptanalyst
does not easily analyze it. With long locks and randomly
generated from the picture, it is not necessary to remember the
order of the key characters, quite remember where the image
is used as a key.
II. THEORY
A. Cryptography
Cryptography is a science that is used to maintain the
confidentiality of the data, by using certain methods so that
data can only read by a person who is entitled to such data, in
the maintenance of the confidentiality of data, cryptography
alters original data (plaintext) into data that is encrypted
(ciphertext). This process is called encryption process.
Cryptography can be classified into two categories, namely
[1]:
1. Shared Key Cryptography
2. Public Key Cryptography
www.ijert.org
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181http://www.ijert.org
IJERTV6IS010223 (This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
Vol. 6 Issue 01, January-2017
266
Shared Key Cryptography is also often called symmetric
key cryptography or cryptographic private key or secret key
because of the key used in the encryption and decryption
process at [2].
Fig 1. Shared Key Cryptography
Public Key Cryptography is also often called asymmetric key
cryptography uses different keys in the encryption and decryption
process. Only the private key used for encryption. Moreover, the
public key used during the decryption process.
Fig 2. Public Key Cryptography
B. Vigenere Cipher Algorithm
Vigenere Cipher Algorithm is a classical cryptographic
technique are more secure than a Caesar cipher. Vigenere
Cipher cipher alphabet included in the compound
(Polyalphabetic Substitution Cipher) with a 26 x 26 matrix
with Caesar shift cipher [3]. Vigenere Cipher is a method of
encrypting text with rows cipher based on keywords. Vigenere
cipher algorithm using a square table vigenere to perform the
encryption process. Each row in the table squares states
ciphertext letters were obtained by the caesarian cipher. Here
is a square table vigenere [4].
TABLE I. Vigenere Cipher Square Table
Encryption and decryption process vigenere cipher
algorithm can be represented mathematically [4]:
Encryption : Ci = (Pi + Ki) mod 26
Decryption : Pi¬ = (Ci + Ki) mod 26
Where C0....Cn is ciphertext, P0....Pn is plaintext and K0...Kn
is key
If vigenere cipher applied in computer application, the
code used by the ASCII table as many as 256 characters, so if
represented mathematically be:
Encryption : Ci = (Pi + Ki) mod 256
Decryption : Pi¬ = (Ci + Ki) mod 256
C. Digital Image
The image of the other terms of the picture as a
multimedia component that plays a crucial form of visual
information. The image has characteristics that are not owned
by text data, i.e., information-rich image. The image is a two-
dimensional function that represents some features such as
brightness or color of a scene and can be defined as a two-
dimensional function f (x, y) where (x, y) position of the
projected and f (x, y) defines the brightness at that point [ 5].
Digital image composed of elements called picture
elements, image elements, and pixels. Pixel is the smallest
part of an image [6]. Digital image is divided into several
types based on the depth of color a binary image, grayscale
image (8 bits), a color image (24-bit) and color images (32
bit). For a grayscale image (8 bits) then the value of a pixel is
represented by an 8-bit binary number with a minimum value
of 0 and a maximum value of 255.
Fig 3. Grayscale Image 8 bit
www.ijert.org
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181http://www.ijert.org
IJERTV6IS010223 (This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
Vol. 6 Issue 01, January-2017
267
D. ASCII
ASCII (American Standard Code for Information
Interchange) is an international standard in the code of letters
and symbols is always used by computers and other
communication tools to show the text. ASCII code has a
composition of as much as 8-bit binary number. ASCII
characters are divided into five groups according to their use,
namely consistent communication, device control,
information separator, code extension and real
communication [7].
III. RESULT & DISCUSSION
A. Key Generator
To generate a series of random keys, resulting the
relationship between plaintext and ciphertext are false, then
used an 8-bit grayscale image with a size of 5 x 5 pixels. The
pixel values of the grayscale image converted to use an ASCII
table in the form of symbols or characters that will be used to
perform the encryption and decryption process.
Fig 4. Key Generator With Grayscale Image 8 bit
If the pixel values are converted using the ASCII table
Table II
Conversion Values of Pixel Become Character
Decimal
Character
48
0
41
)
39
42
*
48
0
46
.
58
:
134
å
74
J
44
,
46
.
37
%
142
Ä
88
X
45
-
26
SUB
42
*
152
Ϋ
72
H
20
DC4
15
SI
20
DC4
44
,
26
SUB
14
SO
So after being converted into a character, then the key to
0) '* 0 .: AJ.% AX-SUB * ΫHDC4SIDC4, SUBSO key that
will be used for encryption and decryption process is the
result of the conversion of the pixel values of the 8-bit
grayscale image size of 5 x 5 pixels.
B. Encryption Process
Text data to be encrypted is NEVER underestimate
YOURSELF and keys to be used in the encryption process is
0) '* 0 .: AJ.% AX-SUB * ΫHDC4SIDC4, SUBSO. If the
plaintext is longer than the key, the key will be automatically
restarted from the beginning so that all the characters in the
encryption of plaintext completed, if the plaintext is shorter
than lock the remaining locks will not be used.
C0=(78+48) mod 256 = 126 character t
C1=(69+41) mod 256 = 110 character n
C2=(86+39) mod 256 = 125 character }
C3=(69+42) mod 256 = 111 character o
C4=(82+48) mod 256 = 130 character é
C5=(32+46) mod 256 = 78 character N
C6=(85+58) mod 256 = 143 character Å
C7=(78+134) mod 256 = 212 character È
C8=(68+74) mod 256 = 142 character Ä
C9=(69+44) mod 256 = 113 character q
C10=(82+46) mod 256 = 128 character Ç
C11=(69+37) mod 256 = 106 character j
C12=(83+142) mod 256 = 225 character ß
C13=(84+88) mod 256 = 170 character ̚
C14=(73+45) mod 256 = 118 character v
C15=(77+26) mod 256 = 103 character g
C16=(65+42) mod 256 = 109 character m
C17=(84+152) mod 256 = 236 character ẏ
C18=(69+72) mod 256 = 141 character ĺ
C19=(32+20) mod 256 = 52 character 4
C20=(89+15) mod 256 = 104 character h
C21=(79+20) mod 256 = 99 character c
C22=(85+44) mod 256 = 129 character ȕ
C23=(82+26) mod 256 = 108 character l
C24=(83+14) mod 256 = 97 character a
C25=(69+48) mod 256 = 117 character u
C26=(76+41) mod 256 = 117 character u
C27=(70+39) mod 256 = 109 character m
After performing the encryption process cipherteksnya be tn}
oéNÅÈÄqÇjß ̚vgmẏĺ4hcȕlauum
C. Decryption Process
After the plaintext is converted into ciphertext in the
encryption process, the next step is to change ciperteks back
into plaintext with the same key used during the encryption
process. Which will decrypt ciphertext is tn}
oéNÅÈÄqÇjß ̚vgmẏĺ4hcȕlauum using keys 0) '* 0 .: AJ.%
AX-SUB * ΫHDC4SIDC4, SUBSO.
P0=(126-48) mod 256 = 78 character N
P1=(110-41) mod 256 = 69 character E
P2=(125-39) mod 256 = 86 character V
P3=(111-42) mod 256 = 69 character E
P4=(130-48) mod 256 = 82 character R
P5=(78-46) mod 256 = 32 character
P6=(143-58) mod 256 = 85 character U
P7=(212-134) mod 256 = 78 character N
P8=(142-74) mod 256 = 68 character D
P9=(113-44) mod 256 = 69 character E
P10=(128-46) mod 256 = 82 character R
P11=(106-37) mod 256 = 69 character E
P12=(225-142) mod 256 = 83 character S
P13=(170-88) mod 256 = 84 character T
48
41
39
42
48
46
58
134
74
44
46
37
142
88
45
26
42
152
72
20
15
20
44
26
14
www.ijert.org
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181http://www.ijert.org
IJERTV6IS010223 (This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
Vol. 6 Issue 01, January-2017
268
P14=(118-45) mod 256 = 73 character I
P15=(103-26) mod 256 = 77 character M
P16=(109-42) mod 256 = 65 character A
P17=(236-152) mod 256 = 84 character T
P18=(141-72) mod 256 = 69 character E
P19=(52-20) mod 256 = 32 character
P20=(104-15) mod 256 = 89 character Y
P21=(99-20) mod 256 = 79 character O
P22=(129-44) mod 256 = 85 character U
P23=(108-26) mod 256 = 82 character R
P24=(97-14) mod 256 = 83 character S
P25=(117-48) mod 256 = 69 character E
P26=(117-41) mod 256 = 76 character L
P27=(109-39) mod 256 = 70 character F
After performing the decryption process tn}
oéNÅÈÄqÇjß ̚vgmẏĺ4hcȕlauum with key 0) '* 0 .: AJ.% AX-
SUB * ΫHDC4SIDC4, SUBSO then back into plaintext
NEVER underestimate YOURSELF. To be more concise can
be seen in the following table:
Table III
Result Vigenere Cipher Encryption and Decryption
Process
Plainteks
Kunci
Cipherteks
Can be seen in the relationship between plaintext to
ciphertext is very apparent that would make it harder to find a
cryptanalyst of cryptographic Vigenere Cipher Algorithms
keys such as a row of keys generated from a very random
image and key length depends on the dimensions of the
picture that is used as a key. No need to remember the key
because the key consists of random characters that are tough
to remember, just remember the image employed in the
encryption process so that the picture can also be utilized in
the decryption process as long as there are changes to the
pixel values of the image. Vigenere Cipher Algorithm key
generation is quite practical and generated keys are also very
random, so it will be difficult if analyzed by either method
kasiski cryptanalyst and the brute force method.
III. CONCLUSION
This study discusses the formation of a row of keys
vigenere cipher algorithm that is very random to secure a text
file, so it will be difficult to analyze by cryptanalyst. By using
a key generated from the 8-bit grayscale image that has been
converted into a character pixel value using ASCII table it
will produce a series of the main characters were very
random and the length determined by the size or dimensions
of the image are used as the key. In Vigenere Cipher
Algorithm, there is no limit on the duration of the key utilized
so it matches the key generation through the 8-bit grayscale
image. So it is not difficult to find images that can be used as
a key generator. The length and randomness of the key do not
need to remember, to keep in mind is the image that is used
as the key. Because if the imagery used at the time of
encryption, there are differences with the image pixel value
used at the time decryption of the ciphertext will not go back
into the original plaintext.
IV. REFERENCES
[1] G. C. Kessler, An Overview of Cryptography, 2013.
[2] Y. Rajput, D. Naik dan C. Mane, “An Improve Cryptography
Technique to Encrypt Text Using Double Encryption,” International
Journal of Computer Application, vol. 86, no. 6, pp. 24-28, 2014.
[3] W. Stallings, Cryptography and Network Security Principles and
Practice (Fifth Edition), Pearson Education, Inc, 2011.
[4] A.-A. M. Aliyu and A. Olaniyan, "Vigenere Cipher: Trends, Review
and Possible Modifications," Internasional Journal of Computer
Application, vol. 135, no. 11, pp. 46-50, 2016.
[5] S. Jayaraman, S. Esakkirajan dan T. Veerakumar, Digital Image
Processing, New Delhi: Tata McGraw-Hill Education Private Limited,
2009.
[6] R. C. Gonzales dan R. E. Woods, Digital Image Processing (Third
Edition), Pearson Education, Inc, 2009.
[7] H. Randal, Understanding the Machine, No Stark Press, Inc, 2004.
www.ijert.org
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181http://www.ijert.org
IJERTV6IS010223 (This work is licensed under a Creative Commons Attribution 4.0 International License.)
Published by :
Vol. 6 Issue 01, January-2017
269
... In front of this great security focus, many techniques for color image encryption have flooded the digital world, mostly exploiting number theory and chaos [1,2]. Others are attempting to update their policies by improving some classical techniques, such as Hill Cipher [3,4,15,22], Cesar, Vigenére [5,6], Feistel [7][8][9]16] and so on. ...
... The Skew tent map will be redefined as equation (4). ...
Article
Full-text available
This article describes a new cryptosystem that incorporates the most powerful genetic operators. With the aim of better integration in the field of color image encryption security, this technique starts with the application of an advanced Feistel scheme and ends with the implementation of deeply modified genetic operators. After vectorization of the original image, an application of the advanced Feistel scheme on blocks of random size will be launched. The output vector is transcribed in restricted ASCII code to achieve a genetic cross suitable for the encryption of color images. The output vector obtained is transcribed in restricted ASCII code to considerably improve the effects of the genetic crossing. This step increases the impact of the avalanche effect and protects the system from differential attacks. Simulations performed on a large volume of images of different sizes and formats ensure that our approach is not exposed to known attacks. Article Highlights The one Feistel rounds in our algorithm represent a large modification of a classical scheme. The main new features are:First Feistel lap and Cross-over genetic operator. Switching to ASCII code. Genetic crossover arrangement.
... The sender encrypts the information and sends it. The receiver must know the decryption method in order to be able to read the information received correctly [4]. If the third gets information about the decryption algorithm, the cryptography algorithm must be changed. ...
Article
Full-text available
The need for data security in communication is increasing with the developing technology. The best way to ensure data security is cryptography. Humanity has proposed many cryptography methods for hundreds of years. Today, there are complex cryptography algorithms, which are quite secure but require high processing power. Cryptography techniques used in the past are less secure but require less processing power. This paper proposes an improved version of Vigenère cipher, which is an old cryptography method. The cipher text generated with improved Vigenère cipher is also hidden in an image to keep it safe in transmission environment. The hiding process is carried out with steganography, another data security method. Thus, a method of communication that is both unsuspecting and secure has emerged. The cryptological security of proposed method is evaluated by measuring Avalanche effect, and the steganographic security is evaluated by SSIM and PSNR measurements.
... One of the uses of computer technologies in human lives is to protect private information from random access by unauthorized people and cryptographic techniques is one of the methods used to do this task [1,2]. ...
... Saputra et al. implement the Vigenère Cipher by utilizing a 5 x 5-pixel grayscale image as a key. This grayscale image key is transformed into ASCII characters, resulting in a character arrangement that can be processed into the Vigenère Cipher [14]. ...
Article
Full-text available
One of the popular cryptographic algorithms is the Vigenère Cipher. This algorithm is included in classical cryptographic algorithms, so its capabilities are limited to text-type data. Through this research, this research try to modify the Vigenère Cipher so that it can be used on digital image media. The improvement is performed using ASCII code as a Vigenère table and the key generated by the SHA512 hash technique with salt. The encryption and decryption process was carried out on ten jpg and ten png files and showed a 100% success rate. Speed and memory consumption tests on the encryption process by comparing it with the AES algorithm show that AES excels in speed with 409,467 Mb/s while Vigenère wins in memory consumption by utilizing only 5,0007 Kb for every Kilobytes of the processed digital image file.
... One of the uses of computer technologies in human lives is to protect private information from random access by unauthorized people and cryptographic techniques is one of the methods used to do this task [1,2]. ...
Article
Full-text available
Cryptography is a science securing of information. Encryption requires impregnable keys to encrypt or decrypt data these keys should be unpredictable and not easily to break. In this research we use genetic algorithm to generate keys for vigenere cipher. The best key is used to perform encryption. The keys created by genetic algorithm are tested for randomness by using the entropy test. The entropy calculation shows that randomness of key generated based on genetic processing is better than chosen key in the classical vigenere cipher.
... The rapid development of chaos theory in mathematics provides researchers with opportunities to further improve some classic encryption systems. In front of this great security focus, many techniques for color image encryption have flooded the digital world, mostly exploiting number theory and chaos [20,27] Others are attempting to update their policies by improving some classical techniques, such as Hill [10,24], Cesar, Vignere [12,23], Feistel [7,18]. ...
Article
Full-text available
This article traces the development trajectory of the new cryptographic system using two circuits provided by the profound improvement of the traditional Vigenere technology. This new method uses several dynamic permutation matrices attached to the advanced chaotic permutation function. Explain its structure and definition in detail. The first round will modify the first bootloader block by intervening the initial value calculated from the original image, and will be infected by all the chaotic maps used to overcome the problem of uniform color images, and then restore our new depth advanced Vigenere technology. The second round will recalculate new initialization values based on the obtained encrypted image and the generated chaotic map. The last round will focus on the introduction of the new replacement matrix, in which strong links will be implemented, strong propagation will be achieved, and encrypted blocks will be linked with subsequent transparent blocks to eliminate any differential attacks. Simulations performed on a large number of images of different sizes and formats showed encouraging results and confirmed that this method is not affected by known attacks. Article Highlights This new algorithm delivers two greatly expanded Vigenere rounds. The first loop employs two chaotic substitution matrices od size (256,256), attached to dynamic replacement functions and controlled by a decision vector. The second round encapsulates a new initialization value and two other substitution matrices f the same size, associated with diffusion functions for a better protection against differential assaults. We mention below, the most important new modifications made to our new technology New size substitution matrix (256,256) Construction Strong replacement functions definition Setting the First initialization values First Vigenere’s rotation applied Setting the second initialization values Second Vigenere’s rotation applied The abbreviations used in this document are illustrated in the following table. Notation Gt=ZtZringGt∗=SetofGtreversersAj::Line numberjof matrixAA:j:colunm numberjof matrixA\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ \left\{\begin{array}{c}{G}_t=\raisebox{1ex}{$Z$}\!\left/ \!\raisebox{-1ex}{$ tZ$}\right.\ ring\\ {}{G}_t^{\ast }= Set\ of\kern0.5em {G}_t\ reversers\\ {}A\left(j:\right): Line\ number\ j\ of\ matrix\ A\\ {}A\left(:j\right): colunm\ number\ j\ of\ matrix\ A\end{array}\right. $$\end{document}
... but also greatly improve the system integration. In addition, grayscale images are also used in fields such as cryptography [21,25], medicine [31], and industrial production [26]. ...
Article
Full-text available
The purpose of decolorization is to convert a color image into a grayscale image while maintaining the contrast and structural characteristics of the original color image as much as possible. This paper proposes a decolorization method based on contrast pyramid transform fusion. Image fusion based on contrast tower decomposition is performed on different spatial frequency bands, so it is possible to obtain a fusion effect closer to human visual characteristics. First, we extract the R, G and B channel images of the original color image and the initial grayscale image. Then, we perform Laplacian pyramid fusion of the R, G and B channel images of the original color image with the initial grayscale image to obtain three images. Finally, the three images obtained are reconstructed by contrast pyramid fusion, and our result image is obtained. The visual comparison and quantitative experimental results show that the proposed contrast pyramid fusion decolorization method is more robust, can fully maintain image details and other information, and reduce the distortion in the process of fusion and decolorization.
Article
In the current high-tech era, the growing popularity of e-healthcare has heightened the attention focused on data security against cyber-attacks. As digital medical images are transported over the public network, an intermediate degree of protection must be in place. One major technique is the implementation of encryption to safeguard medical images. This article recommends a new medical image encryption technology. This algorithm began with a simple application of advanced Vigenere technology, followed by the implementation of a deeply adapted genetic operator for color image encryption, with the intention of better integrating into the medical image encryption security sector. After vectorization of the original image, the first round of Vigenere control by two chaotic substitution tables attached to highly modified replacement functions is applied. The output vector is encoded in restricted ASCII code in order to obtain a genetic hybridization suitable for encryption of medical and color images. A strong chaining will be applied between the encrypted block and the following clear block in order to increase the impact of the avalanche effect and to protect the system against any differential attack. Simulations carried out on a large volume of images of different sizes and formats ensure that our approach is not exposed to known attacks. HIGHLIGHTS: The two rounds of our algorithm represent a large modification of a classical and a genetic operator. The main new features are ✓ First round ○ Vigenere upgrade ○ Selected simulations from the primary round ✓ Switching to reduced ASCII code ○ Two cross-over tables building process ○ Chaotic operation ASCII table ○ Output vector encryption ■ Detailed simulation study ■ Benchmarking with other recent algorithms.
Understanding the Machine
H. Randal, Understanding the Machine, No Stark Press, Inc, 2004. www.ijert.org International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181