A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra

Mahmud Yunus; Mohamad Ilham Dwi Firmansyah; Kistosil Fahim Subiono

Kybernetika (2024)

  • Volume: 60, Issue: 5, page 576-602
  • ISSN: 0023-5954

Abstract

top
We propose a cryptographic algorithm utilizing integer wavelet transform via a lifting scheme. In this research, we construct some predict and update operators within the lifting scheme of wavelet transforms employing operations in min-max-plus algebra, termed as lifting scheme integer wavelet transform over min-max-plus algebra (MMPLS-IWavelet). The analysis and synthesis process on MMPLS-IWavelet is implemented for both encryption and decryption processes. The encryption key comprises a sequence of positive integers, where the first element specifies MMPLS-IWavelet type and subsequent elements indicate the levels of each executed transformation. The decryption key involves three components: the original encryption key, a binary encoding of the analyzed signal, and a sequence of non-negative integer representing the length of coefficient signals from the approximation and detail signals. We present a rigorous analysis confirming the correctness of the proposed cryptographic scheme, and evaluate its performance based on various metrics such as correlation value between plaintext and ciphertext, encryption quality, computation time, key sensitivity, entropy analysis, and key space analysis. We also analyze the computational costs of the encryption and decryption processes. The experimental results demonstrate that the proposed algorithms empirically yield satisfactory performance, exhibiting a near zero correlation between plaintext and ciphertext for most of test data, high encryption quality (over 80 percent), substantial key sensitivity, the large key space, and greater randomness in ciphertext compare to plaintext. The algorithm is efficient in terms of computational time and has linear complexity with respect to the number of input characters. The vast key space makes it highly impractical for brute-force approaches to find the decryption key directly.

How to cite

top

Yunus, Mahmud, Firmansyah, Mohamad Ilham Dwi, and Subiono, Kistosil Fahim. "A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra." Kybernetika 60.5 (2024): 576-602. <http://eudml.org/doc/299803>.

@article{Yunus2024,
abstract = {We propose a cryptographic algorithm utilizing integer wavelet transform via a lifting scheme. In this research, we construct some predict and update operators within the lifting scheme of wavelet transforms employing operations in min-max-plus algebra, termed as lifting scheme integer wavelet transform over min-max-plus algebra (MMPLS-IWavelet). The analysis and synthesis process on MMPLS-IWavelet is implemented for both encryption and decryption processes. The encryption key comprises a sequence of positive integers, where the first element specifies MMPLS-IWavelet type and subsequent elements indicate the levels of each executed transformation. The decryption key involves three components: the original encryption key, a binary encoding of the analyzed signal, and a sequence of non-negative integer representing the length of coefficient signals from the approximation and detail signals. We present a rigorous analysis confirming the correctness of the proposed cryptographic scheme, and evaluate its performance based on various metrics such as correlation value between plaintext and ciphertext, encryption quality, computation time, key sensitivity, entropy analysis, and key space analysis. We also analyze the computational costs of the encryption and decryption processes. The experimental results demonstrate that the proposed algorithms empirically yield satisfactory performance, exhibiting a near zero correlation between plaintext and ciphertext for most of test data, high encryption quality (over 80 percent), substantial key sensitivity, the large key space, and greater randomness in ciphertext compare to plaintext. The algorithm is efficient in terms of computational time and has linear complexity with respect to the number of input characters. The vast key space makes it highly impractical for brute-force approaches to find the decryption key directly.},
author = {Yunus, Mahmud, Firmansyah, Mohamad Ilham Dwi, Subiono, Kistosil Fahim},
journal = {Kybernetika},
keywords = {cryptography; lifting scheme; min-max-plus algebra; wavelet},
language = {eng},
number = {5},
pages = {576-602},
publisher = {Institute of Information Theory and Automation AS CR},
title = {A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra},
url = {http://eudml.org/doc/299803},
volume = {60},
year = {2024},
}

TY - JOUR
AU - Yunus, Mahmud
AU - Firmansyah, Mohamad Ilham Dwi
AU - Subiono, Kistosil Fahim
TI - A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra
JO - Kybernetika
PY - 2024
PB - Institute of Information Theory and Automation AS CR
VL - 60
IS - 5
SP - 576
EP - 602
AB - We propose a cryptographic algorithm utilizing integer wavelet transform via a lifting scheme. In this research, we construct some predict and update operators within the lifting scheme of wavelet transforms employing operations in min-max-plus algebra, termed as lifting scheme integer wavelet transform over min-max-plus algebra (MMPLS-IWavelet). The analysis and synthesis process on MMPLS-IWavelet is implemented for both encryption and decryption processes. The encryption key comprises a sequence of positive integers, where the first element specifies MMPLS-IWavelet type and subsequent elements indicate the levels of each executed transformation. The decryption key involves three components: the original encryption key, a binary encoding of the analyzed signal, and a sequence of non-negative integer representing the length of coefficient signals from the approximation and detail signals. We present a rigorous analysis confirming the correctness of the proposed cryptographic scheme, and evaluate its performance based on various metrics such as correlation value between plaintext and ciphertext, encryption quality, computation time, key sensitivity, entropy analysis, and key space analysis. We also analyze the computational costs of the encryption and decryption processes. The experimental results demonstrate that the proposed algorithms empirically yield satisfactory performance, exhibiting a near zero correlation between plaintext and ciphertext for most of test data, high encryption quality (over 80 percent), substantial key sensitivity, the large key space, and greater randomness in ciphertext compare to plaintext. The algorithm is efficient in terms of computational time and has linear complexity with respect to the number of input characters. The vast key space makes it highly impractical for brute-force approaches to find the decryption key directly.
LA - eng
KW - cryptography; lifting scheme; min-max-plus algebra; wavelet
UR - http://eudml.org/doc/299803
ER -

References

top
  1. Arul, J., Venkatesulu, M., Encryption quality and performance analysis of GKSBC algorithm., J. Inform. Engrg. Appl. 2(10) (2012). 
  2. Cahyono, J., Subiono, Adzkiya., D., Davvas, B., , J. King Saud University-Computer Inform. Sci. 34 (2020), 2, 627-635. DOI
  3. Durcheva, M., , ACM Commun. Comput. Algebra 49 (2015), 1, 9. DOI
  4. Fahim, K., Yunus, M., Max-plus algebra-based wavelet transforms and their applications in compressed image., Int. J. Tomography Simul. 30 (2017), 1, 118-126. 
  5. Fujinoki, K., Ashizawa, K., , Signal Process. J. Pre-proof (2023), 118-126. DOI
  6. Gafsi, M., Abbassi, N., Amdouni, Rim, A., Hajjaji, M. A., Mohamed, A., Mtibaa, A., , In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET), IEEE 2022, pp. 324-329. DOI
  7. Gon, A., Mukherjee, A., , Circuits Systems Signal Process. 42 (2022), 1, 580-600. DOI
  8. Goswami, D., Rahman, N., Biswas, J., Koul, A., Tamang, L. R., Bhattacharjee, A. K., A discrete wavelet transform based cryptographic algorithm., Int. J. Computer Sci. Network Security 11 (2011), 4, 178-182. 
  9. Grigoriev, D., Shpilrain, V., , Commun. Algebra 42 (2014), 6, 2624-2632. MR3169729DOI
  10. Heijmans, H. J., Goutsias, J., , IEEE Trans. Image Process. 9 (2000), 11, 1897-1913. MR1818452DOI
  11. Hellman, M., , IEEE Trans. Inform. Theory 22 (1976), 6, 644-654. MR0437208DOI
  12. Kistosil, F., Adzkiya, D., Subiono, , Kybernetika 54 (2018), 2, 243-267. MR3807713DOI
  13. Klees, R., Haagmans, R., , Springer, Berlin 1996. DOI
  14. Mallat, S., , Elsevier, New York 2009. MR2479996DOI
  15. Merdekawati, D. A., Subiono, , J.f Physics: Conference Series 1341 (2019), 4, 042015. DOI
  16. Naseer, R., Nasim, M., Sohaib, M., Younis, J., Mehmood, A., Alam, M., Massoud, Y., , Integration 87 (2022), 253-259. DOI
  17. Nobuhara, H., Trieu, D. B. K., Maruyama, T., Bede, B., , Inform. Sci. 180 (2010), 12, 3232-3247. MR2659043DOI
  18. Parthasarathy, M. B., Srinivasan, B., , Indian Jo.Sci. Technol. 269 (2014), 21-34. DOI
  19. Rivest, R. L., Shamir, A., Adleman, L., , Commun. ACM 21 (1978), 2, 120-126. MR0700103DOI
  20. Salehi, S. A., Dhruba, D. D., , In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, pp. 422-427. DOI
  21. Silverman, J. H., Pipher, J., Hoffstein, J., , Kybernetika, Springer, New York 2008. MR2433856DOI
  22. Sweldens, W., , SIAM J. Math. Anal. 29 (1998), 2, 511-546. MR1616507DOI
  23. Sweldens, W., ZAMM-Zeitschrift fur Angewandte Mathematik und Mechanik., SIAM J. Math. Anal. 76 (1996), 2, 41-44. 
  24. Sweldens, W., , Wavelet Appl. Signal Image Process. III 2569 (1995), 68-79. DOI
  25. Swenson, C., Modern Cryptanalysis: Techniques for Advanced Code Breaking., John Wiley and Sons, Indianapolis 2008. 
  26. Szczesna, A., Switonski, A., Slupik, J., Zghidi, J. H., Josinski, H., Wojciechowski, K., , Inform. Sci. 575 (2021), 732-746. MR4310996DOI
  27. Tao, Y., Wang, C., , Automatica 119 (2020), 109104. MR4116117DOI
  28. Tedmori, S., Al-Najdawi, N., , Inform. Sci. 269 (2014), 21-34. MR3180798DOI
  29. Ukasha, A., , In: International Conference on Engineering and MIS (ICEMIS), 2022, pp. 1-7. DOI
  30. Walpole, R., Introduction to Statistics., New York 1974. 
  31. Zarkar, S., Vaidya, S., Bharambe, A., Tadvi, A., Chavan, T., Secure server verification by using encryption algorithm and visual cryptography., Int. J. Sci. Res. (IJSR) (2014), 310-313. 
  32. Zhang, H., Tao, Y., Yuegang., Zhang, Z., , Systems Control Lett. 96 (2016), 88-94. MR3547660DOI

NotesEmbed ?

top

You must be logged in to post comments.

To embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.

Only the controls for the widget will be shown in your chosen language. Notes will be shown in their authored language.

Tells the widget how many notes to show per page. You can cycle through additional notes using the next and previous controls.

    
                

Note: Best practice suggests putting the JavaScript code just before the closing </body> tag.