Detailed Information

Cited 1 time in webofscience Cited 1 time in scopus
Metadata Downloads

Discrete Logarithmic Factorial Problem and Einstein Crystal Model Based Public-Key Cryptosystem for Digital Content Confidentialityopen access

Authors
Hafiz, Muhammad WaseemLee, Wai-KongHwang, Seong OunKhan, MajidLatif, Asim
Issue Date
Nov-2022
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Encryption; Security; Public key; Oscillators; Crystals; Data models; Computational modeling; Information security; Monte Carlo methods; Image processing; Discrete logarithmic factors problem; Einstein crystal model; information security; image encryption; key exchange; Monte Carlo random walk; public-key cryptography
Citation
IEEE ACCESS, v.10, pp.102119 - 102134
Journal Title
IEEE ACCESS
Volume
10
Start Page
102119
End Page
102134
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/86013
DOI
10.1109/ACCESS.2022.3207781
ISSN
2169-3536
Abstract
Public-key encryption is extensively used to provide digital data confidentiality and deliver the security features, such as nonrepudiation (digital signature) and secure key exchange. Conventional public-key schemes are based on mathematical problems with inflexible constraints, and the security of digital contents relies on computational complexity. In the era of emerging technologies, most public-key image encryption schemes are susceptible to various threats. We propose a novel public-key encryption in this article with near-ring criteria and provide confidentiality to private data with the microstates of the Einstein crystal model. The virtual oscillator generated by microstates of initial oscillators for the common secrets with the public-key scheme produces unique states to encrypt digital data. The privacy-preserved structure, that mimics the data stream of digital content with the behavior of the improved Einstein crystal model, describes a system in terms of microstates to generate diffusion in the plain data with unique states of a virtual oscillator. The performance and digital forensic evaluations, such as randomness, histogram uniformity, pixels' correlation, pixels' similarity, visual strength, pixels' incongruity, key sensitivity, linear and differential attacks, noise, and occlusion attacks analyses, certify the resistivity of the proposed algorithm against potential threats and provide superior capacity in comparison to existing methodologies to hostile certain attacks.
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hwang, Seong Oun photo

Hwang, Seong Oun
College of IT Convergence (컴퓨터공학부(컴퓨터공학전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE