SEI Vol. 3, No. 2

,

July 2021,

pp.79

-91

91 encoding

of the

full

bits.

Furt

hermore,

the

encoding

clock and

the am

ount

of data

to

be

encrypted are

decreased

to

50 %

as

newton

decreases.

Encrypting

the

2

2

most

significant

bits

rather

of enc

rypting

total

bits

is sufficient t

o

continue high

encoding

choice,

as

well

as

reduces

the

fourth dimension and

the

data

to

be

encrypted.

The proposed method acting

resists triiodothyronine

he statistical

analysis ; however,

far shape

to

find a

method resistan

metric ton to

the differential analysis for both color and gray

scale images is recommended. 5.

References

[ 1 ]

A. H.

Zahid,

E.

Al

-Solami,

and

M.

Ahmad,

“ A N

ovel

Modular

Approach

Based

Substitution-Box design for Image Encryption, ”

IEEE Access

, vol. 8, p

p. 150326-150340, 20

20

. [ 2 ]

S. Hussain, S.

S. Jamal,

T

. Shan,

and I. Hussain,

“ A

Power A

ssociative Loop

Str

ucture

for the construction of

Non-Linear

Components of

Block

Cipher, ”

IEEE Access

,

vol.

8,

pp. 123492-123506

,

2020. [ 3 ]

R. B

hanot,

and

R.

Hans

“A

Review

and Com

parative

Analysis

of

Various

Encryption

Algorithms,”

International Journal of Security and Its Appl

ications

, vol. 9, no. 4,

pp. 289‒306, 2015.

[ 4 ]

S.

W.

Jang,

“ Comparative

Analysis

of

AES,

Blowfish,

T

wofish

and

Threefish

Encryption

Algorithms, ”

Analysis of Applied Mathematics

, v

ol. 10, pp. 5-24, 2017. [ 5 ]

K.

M. Mhaidat, M.

A. Altahat, and

O. D.

Al-Khaleel, “ High-Throughput Hardware

Implementation of Threefish

Block

Cipher

on

FPGA, ”

iodine

north

International

Conference

on

Information

and

Communication

Systems.

, Irbid, Jordan, 2013.

[ 6 ]

N. At, J. Beuchat, and I. San, “ pack Implementation of Threefish and Skein on FPGA, ” in

5th IFIP

International Conference on New Technolog

ies, Mobility and Security

, IEEE Press, 2012.

[ 7 ] L. P. Oommen, and Anas A. S., “ Skein and Thre

efish Implementation on FPGA

, ”

International Journal

of Science and Research ( IJSR )

, vol. 4, no. 5, pp.1493-

1496, 201

5.

[ 8 ]

P.

Gayathri,

K.

Sateesh,

and

C.

Navya,

“ High-Throughput

Hardware

Implementation

of

Three

Fish Block Cipher Encryption and Decryption on FPGA, ”

International Journal of VLSI System Design and

communication Systems,

vol. 3, no. 8, pp. 1325-1329, 2015.

[ 9 ]

J

.

J. Singh.

T, and

E. Baburaj,

“ A Novel

Method f

or

Secured

T

ransaction

of Images

and Text

on cloud, ”

International Journal of Advanced Computer Science and Applications,

vol. 9, no.

11, pp. 506- 511, 2018. [ 10 ]

P.

T.

Akkasaligar,

and

S.

Biradar,

“ S

elective

checkup

double

encoding

using

DNA

cryptography, ” Information Security Journal : A Global Per

spective

, vol. 29, no. 2, pp. 91-101, 2020.

[ 11 ]

L. Liu, L. Zhang, D.

Jiang, Y. Guan,

and Z. Zhang, “ A

Simultaneous Scrambling and Diffusion

Color effigy

Encryption

Algorithm

Based

on

Hopfield

Chaotic

Neural

Network, ”

IEEE

Access

,

vol.

7,

pp. 185796 – 185810, 2019. [ 12 ] Q. Lu, C. Zhu, and

X. Deng, “

An effective image Encryption Scheme Based on the

LSS Chaotic Map and Single S-Box, ”

IEEE Access,

vol. 8, pp.25664-25678, 2020.

[ 13 ]

R.

I. Abdelfattah,

H.

Mohamed,

and

M. E.

Nasr,

Secure

Image

Encryption Scheme

Based

on

deoxyribonucleic acid and

New

Multi

Chaotic

Map, ”

in

4

th

international

Conference

on

Advanced Technology

and

Applied

Sciences

, Cairo, Egypt, 2019.

Leave a Reply

Your email address will not be published.