A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra
Mahmud Yunus; Mohamad Ilham Dwi Firmansyah; Kistosil Fahim Subiono
Kybernetika (2024)
- Volume: 60, Issue: 5, page 576-602
- ISSN: 0023-5954
Access Full Article
topAbstract
topHow to cite
topYunus, Mahmud, Firmansyah, Mohamad Ilham Dwi, and Subiono, Kistosil Fahim. "A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra." Kybernetika 60.5 (2024): 576-602. <http://eudml.org/doc/299803>.
@article{Yunus2024,
abstract = {We propose a cryptographic algorithm utilizing integer wavelet transform via a lifting scheme. In this research, we construct some predict and update operators within the lifting scheme of wavelet transforms employing operations in min-max-plus algebra, termed as lifting scheme integer wavelet transform over min-max-plus algebra (MMPLS-IWavelet). The analysis and synthesis process on MMPLS-IWavelet is implemented for both encryption and decryption processes. The encryption key comprises a sequence of positive integers, where the first element specifies MMPLS-IWavelet type and subsequent elements indicate the levels of each executed transformation. The decryption key involves three components: the original encryption key, a binary encoding of the analyzed signal, and a sequence of non-negative integer representing the length of coefficient signals from the approximation and detail signals. We present a rigorous analysis confirming the correctness of the proposed cryptographic scheme, and evaluate its performance based on various metrics such as correlation value between plaintext and ciphertext, encryption quality, computation time, key sensitivity, entropy analysis, and key space analysis. We also analyze the computational costs of the encryption and decryption processes. The experimental results demonstrate that the proposed algorithms empirically yield satisfactory performance, exhibiting a near zero correlation between plaintext and ciphertext for most of test data, high encryption quality (over 80 percent), substantial key sensitivity, the large key space, and greater randomness in ciphertext compare to plaintext. The algorithm is efficient in terms of computational time and has linear complexity with respect to the number of input characters. The vast key space makes it highly impractical for brute-force approaches to find the decryption key directly.},
author = {Yunus, Mahmud, Firmansyah, Mohamad Ilham Dwi, Subiono, Kistosil Fahim},
journal = {Kybernetika},
keywords = {cryptography; lifting scheme; min-max-plus algebra; wavelet},
language = {eng},
number = {5},
pages = {576-602},
publisher = {Institute of Information Theory and Automation AS CR},
title = {A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra},
url = {http://eudml.org/doc/299803},
volume = {60},
year = {2024},
}
TY - JOUR
AU - Yunus, Mahmud
AU - Firmansyah, Mohamad Ilham Dwi
AU - Subiono, Kistosil Fahim
TI - A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra
JO - Kybernetika
PY - 2024
PB - Institute of Information Theory and Automation AS CR
VL - 60
IS - 5
SP - 576
EP - 602
AB - We propose a cryptographic algorithm utilizing integer wavelet transform via a lifting scheme. In this research, we construct some predict and update operators within the lifting scheme of wavelet transforms employing operations in min-max-plus algebra, termed as lifting scheme integer wavelet transform over min-max-plus algebra (MMPLS-IWavelet). The analysis and synthesis process on MMPLS-IWavelet is implemented for both encryption and decryption processes. The encryption key comprises a sequence of positive integers, where the first element specifies MMPLS-IWavelet type and subsequent elements indicate the levels of each executed transformation. The decryption key involves three components: the original encryption key, a binary encoding of the analyzed signal, and a sequence of non-negative integer representing the length of coefficient signals from the approximation and detail signals. We present a rigorous analysis confirming the correctness of the proposed cryptographic scheme, and evaluate its performance based on various metrics such as correlation value between plaintext and ciphertext, encryption quality, computation time, key sensitivity, entropy analysis, and key space analysis. We also analyze the computational costs of the encryption and decryption processes. The experimental results demonstrate that the proposed algorithms empirically yield satisfactory performance, exhibiting a near zero correlation between plaintext and ciphertext for most of test data, high encryption quality (over 80 percent), substantial key sensitivity, the large key space, and greater randomness in ciphertext compare to plaintext. The algorithm is efficient in terms of computational time and has linear complexity with respect to the number of input characters. The vast key space makes it highly impractical for brute-force approaches to find the decryption key directly.
LA - eng
KW - cryptography; lifting scheme; min-max-plus algebra; wavelet
UR - http://eudml.org/doc/299803
ER -
References
top- Arul, J., Venkatesulu, M., Encryption quality and performance analysis of GKSBC algorithm., J. Inform. Engrg. Appl. 2(10) (2012).
- Cahyono, J., Subiono, Adzkiya., D., Davvas, B., , J. King Saud University-Computer Inform. Sci. 34 (2020), 2, 627-635. DOI
- Durcheva, M., , ACM Commun. Comput. Algebra 49 (2015), 1, 9. DOI
- Fahim, K., Yunus, M., Max-plus algebra-based wavelet transforms and their applications in compressed image., Int. J. Tomography Simul. 30 (2017), 1, 118-126.
- Fujinoki, K., Ashizawa, K., , Signal Process. J. Pre-proof (2023), 118-126. DOI
- Gafsi, M., Abbassi, N., Amdouni, Rim, A., Hajjaji, M. A., Mohamed, A., Mtibaa, A., , In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET), IEEE 2022, pp. 324-329. DOI
- Gon, A., Mukherjee, A., , Circuits Systems Signal Process. 42 (2022), 1, 580-600. DOI
- Goswami, D., Rahman, N., Biswas, J., Koul, A., Tamang, L. R., Bhattacharjee, A. K., A discrete wavelet transform based cryptographic algorithm., Int. J. Computer Sci. Network Security 11 (2011), 4, 178-182.
- Grigoriev, D., Shpilrain, V., , Commun. Algebra 42 (2014), 6, 2624-2632. MR3169729DOI
- Heijmans, H. J., Goutsias, J., , IEEE Trans. Image Process. 9 (2000), 11, 1897-1913. MR1818452DOI
- Hellman, M., , IEEE Trans. Inform. Theory 22 (1976), 6, 644-654. MR0437208DOI
- Kistosil, F., Adzkiya, D., Subiono, , Kybernetika 54 (2018), 2, 243-267. MR3807713DOI
- Klees, R., Haagmans, R., , Springer, Berlin 1996. DOI
- Mallat, S., , Elsevier, New York 2009. MR2479996DOI
- Merdekawati, D. A., Subiono, , J.f Physics: Conference Series 1341 (2019), 4, 042015. DOI
- Naseer, R., Nasim, M., Sohaib, M., Younis, J., Mehmood, A., Alam, M., Massoud, Y., , Integration 87 (2022), 253-259. DOI
- Nobuhara, H., Trieu, D. B. K., Maruyama, T., Bede, B., , Inform. Sci. 180 (2010), 12, 3232-3247. MR2659043DOI
- Parthasarathy, M. B., Srinivasan, B., , Indian Jo.Sci. Technol. 269 (2014), 21-34. DOI
- Rivest, R. L., Shamir, A., Adleman, L., , Commun. ACM 21 (1978), 2, 120-126. MR0700103DOI
- Salehi, S. A., Dhruba, D. D., , In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, pp. 422-427. DOI
- Silverman, J. H., Pipher, J., Hoffstein, J., , Kybernetika, Springer, New York 2008. MR2433856DOI
- Sweldens, W., , SIAM J. Math. Anal. 29 (1998), 2, 511-546. MR1616507DOI
- Sweldens, W., ZAMM-Zeitschrift fur Angewandte Mathematik und Mechanik., SIAM J. Math. Anal. 76 (1996), 2, 41-44.
- Sweldens, W., , Wavelet Appl. Signal Image Process. III 2569 (1995), 68-79. DOI
- Swenson, C., Modern Cryptanalysis: Techniques for Advanced Code Breaking., John Wiley and Sons, Indianapolis 2008.
- Szczesna, A., Switonski, A., Slupik, J., Zghidi, J. H., Josinski, H., Wojciechowski, K., , Inform. Sci. 575 (2021), 732-746. MR4310996DOI
- Tao, Y., Wang, C., , Automatica 119 (2020), 109104. MR4116117DOI
- Tedmori, S., Al-Najdawi, N., , Inform. Sci. 269 (2014), 21-34. MR3180798DOI
- Ukasha, A., , In: International Conference on Engineering and MIS (ICEMIS), 2022, pp. 1-7. DOI
- Walpole, R., Introduction to Statistics., New York 1974.
- Zarkar, S., Vaidya, S., Bharambe, A., Tadvi, A., Chavan, T., Secure server verification by using encryption algorithm and visual cryptography., Int. J. Sci. Res. (IJSR) (2014), 310-313.
- Zhang, H., Tao, Y., Yuegang., Zhang, Z., , Systems Control Lett. 96 (2016), 88-94. MR3547660DOI
NotesEmbed ?
topTo embed these notes on your page include the following JavaScript code on your page where you want the notes to appear.