SEI Vol. 3, No. 2
,
July 2021,
pp.79
-91
91 encoding
of the
full
bits.
Furt
hermore,
the
encoding
clock and
the am
ount
of data
to
be
encrypted are
decreased
to
50 %
as
newton
decreases.
Encrypting
the
2
2
most
significant
bits
rather
of enc
rypting
total
bits
is sufficient t
o
continue high
encoding
choice,
as
well
as
reduces
the
fourth dimension and
the
data
to
be
encrypted.
The proposed method acting
resists triiodothyronine
he statistical
analysis ; however,
far shape
to
find a
method resistan
metric ton to
the differential analysis for both color and gray
scale images is recommended. 5.
References
[ 1 ]
A. H.
Zahid,
E.
Al
-Solami,
and
M.
Ahmad,
“ A N
ovel
Modular
Approach
Based
Substitution-Box design for Image Encryption, ”
IEEE Access
, vol. 8, p
p. 150326-150340, 20
20
. [ 2 ]
S. Hussain, S.
S. Jamal,
T
. Shan,
and I. Hussain,
“ A
Power A
ssociative Loop
Str
ucture
for the construction of
Non-Linear
Components of
Block
Cipher, ”
IEEE Access
,
vol.
8,
pp. 123492-123506
,
2020. [ 3 ]
R. B
hanot,
and
R.
Hans
“A
Review
and Com
parative
Analysis
of
Various
Encryption
Algorithms,”
International Journal of Security and Its Appl
ications
, vol. 9, no. 4,
pp. 289‒306, 2015.
[ 4 ]
S.
W.
Jang,
“ Comparative
Analysis
of
AES,
Blowfish,
T
wofish
and
Threefish
Encryption
Algorithms, ”
Analysis of Applied Mathematics
, v
ol. 10, pp. 5-24, 2017. [ 5 ]
Read more: Dual_EC_DRBG – Wikipedia
K.
M. Mhaidat, M.
A. Altahat, and
O. D.
Al-Khaleel, “ High-Throughput Hardware
Implementation of Threefish
Block
Cipher
on
FPGA, ”
iodine
north
International
Conference
on
Information
and
Communication
Systems.
, Irbid, Jordan, 2013.
[ 6 ]
N. At, J. Beuchat, and I. San, “ pack Implementation of Threefish and Skein on FPGA, ” in
5th IFIP
International Conference on New Technolog
ies, Mobility and Security
, IEEE Press, 2012.
[ 7 ] L. P. Oommen, and Anas A. S., “ Skein and Thre
efish Implementation on FPGA
, ”
International Journal
of Science and Research ( IJSR )
, vol. 4, no. 5, pp.1493-
1496, 201
5.
[ 8 ]
P.
Gayathri,
K.
Sateesh,
and
C.
Navya,
“ High-Throughput
Hardware
Implementation
of
Three
Fish Block Cipher Encryption and Decryption on FPGA, ”
International Journal of VLSI System Design and
communication Systems,
vol. 3, no. 8, pp. 1325-1329, 2015.
[ 9 ]
J
.
J. Singh.
T, and
E. Baburaj,
“ A Novel
Method f
or
Secured
T
ransaction
of Images
and Text
on cloud, ”
International Journal of Advanced Computer Science and Applications,
vol. 9, no.
11, pp. 506- 511, 2018. [ 10 ]
P.
T.
Akkasaligar,
and
S.
Biradar,
“ S
elective
checkup
double
encoding
using
DNA
cryptography, ” Information Security Journal : A Global Per
spective
, vol. 29, no. 2, pp. 91-101, 2020.
[ 11 ]
L. Liu, L. Zhang, D.
Jiang, Y. Guan,
and Z. Zhang, “ A
Simultaneous Scrambling and Diffusion
Color effigy
Encryption
Algorithm
Based
on
Hopfield
Chaotic
Neural
Network, ”
IEEE
Access
,
vol.
7,
pp. 185796 – 185810, 2019. [ 12 ] Q. Lu, C. Zhu, and
X. Deng, “
An effective image Encryption Scheme Based on the
LSS Chaotic Map and Single S-Box, ”
IEEE Access,
vol. 8, pp.25664-25678, 2020.
[ 13 ]
R.
I. Abdelfattah,
H.
Mohamed,
and
M. E.
Nasr,
“
Secure
Image
Encryption Scheme
Based
on
deoxyribonucleic acid and
New
Multi
Chaotic
Map, ”
in
4
th
international
Conference
on
Advanced Technology
and
Applied
Sciences
, Cairo, Egypt, 2019.