Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security
Thoti. Sasikala1, Kanusu. Srinivasa Rao2, Buduri. Reddaiah3, Bodi. Susheel Kumar4
1Thoti. Sasikala, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
2Kanusu. Srinivasa Rao, Associate Professor, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
3Buduri. Reddaiah, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
4Bodi. Susheel Kumar, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
Manuscript received on 30 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024 | PP: 34-38 | Volume-13 Issue-4, April 2024 | Retrieval Number: 100.1/ijeat.D444113040424 | DOI: 10.35940/ijeat.D4441.13040424
Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Every platform of business uses online services and are increasing. Wired and wireless networks are becoming popular day by day. With this the sensitive data is carried over internet on daily basis. Due to rapid growth of networks, information security becomes more important. Hence, there is every chance of misleading the data by unauthorized parties. So, there is need to provide security for the data and cryptography is the science that helps in providing security. Encryption algorithm plays a crucial role in information security. This paper briefly describes a new hybrid system to enhance security. In this work along with traditional operations Lattice permutation is used in encryption process. For key generation Chaos Logistic Mapping is used that shows more resistance while breaking key by unauthorized persons. Services like online transactions may be largely protected with this type of newly proposed hybrid systems.
Keywords: Lattice Permutation, Logistic Map, Encryption, Decryption, Chaotic Key Generation.
Scope of the Article: Cryptography