Extention and cryptanalysis of golden cryptography
There are some symmetric cryptosystems which use matrices in the encryption and decryption of initial data and the golden cryptosystem (GC) is one of the cryptosystems. It uses a kind of matrices that is normally called the golden matrices,which is a generalization of the Fibonacci Q-matrices for co...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2015
|
Online Access: | http://psasir.upm.edu.my/id/eprint/57133/1/FSKTM%202015%2018RR.pdf http://psasir.upm.edu.my/id/eprint/57133/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.57133 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.571332017-08-23T09:02:48Z http://psasir.upm.edu.my/id/eprint/57133/ Extention and cryptanalysis of golden cryptography Sharabyan, Mohammad Tahghighi There are some symmetric cryptosystems which use matrices in the encryption and decryption of initial data and the golden cryptosystem (GC) is one of the cryptosystems. It uses a kind of matrices that is normally called the golden matrices,which is a generalization of the Fibonacci Q-matrices for continuous domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack. On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. This is because image data usually have special features such as bulk capacity, high redundancy, and high correlation among pixels that impose special requirements on the encryption technique used. The problems of golden matrix mentioned are the motivation for the proposal of more secured GC. In this thesis, the mathematical technique was used to check the security of twoextend versions of GC; the GC using k-Fibonacci number (KGC) and GC using Hadamard product (HGC). Utilizing chosen-plaintext attack for both extended versions (the golden cryptosystem using k-Fibonacci number and Hadamard product) are proven not secured. Then a new extension to the original GC using discrete logarithm problem and hash function (GCHDLP) was proposed and the tests have shown that these versions of GC can resist the four basic attacks; the chosen plaintext attack, known-plaintext attack, the ciphertext-only attack, and chosen-ciphertext attack. Finally, the experimental results, using several images (Lena, Nike, Micky, and Damavand) and three measuring factors were evaluated. These measuring factors were the maximum deviation measure (M1), the correlation coe±cient measure (M2), and the irregular deviation measure (M3). The proposed method GCHDLP can encrypt identical plaintext blocks to totally di®erent ciphertext blocks, whereas the original GC cipher cannot do so. Thus, the proposed method has advantages.in hiding data patterns over original GC. 2015-08 Thesis NonPeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/57133/1/FSKTM%202015%2018RR.pdf Sharabyan, Mohammad Tahghighi (2015) Extention and cryptanalysis of golden cryptography. PhD thesis, Universiti Putra Malaysia. |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
There are some symmetric cryptosystems which use matrices in the encryption and decryption of initial data and the golden cryptosystem (GC) is one of the cryptosystems. It uses a kind of matrices that is normally called the golden matrices,which is a generalization of the Fibonacci Q-matrices for continuous domain. The GC, like other matrix cryptosystems, cannot resist against chosen-plaintext attack. On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. This is because image data usually have special features such as bulk capacity, high redundancy, and high correlation among pixels that impose special requirements on the encryption technique used. The problems of golden matrix mentioned are the motivation for the proposal of more secured GC. In this thesis, the mathematical technique was used to check the security of twoextend versions of GC; the GC using k-Fibonacci number (KGC) and GC using Hadamard product (HGC). Utilizing chosen-plaintext attack for both extended versions (the golden cryptosystem using k-Fibonacci number and Hadamard product) are proven not secured. Then a new extension to the original GC using discrete logarithm problem and hash function (GCHDLP) was proposed and the tests have shown that these versions of GC can resist the four basic attacks; the chosen plaintext attack, known-plaintext attack, the ciphertext-only attack, and chosen-ciphertext attack. Finally, the experimental results, using several images (Lena, Nike, Micky, and Damavand) and three measuring factors were evaluated. These measuring factors were the maximum deviation measure (M1), the correlation coe±cient measure (M2), and the irregular deviation measure (M3). The proposed method GCHDLP can encrypt identical plaintext blocks to totally di®erent ciphertext blocks, whereas the original GC cipher cannot do so. Thus, the proposed method has advantages.in hiding data patterns over original GC. |
format |
Thesis |
author |
Sharabyan, Mohammad Tahghighi |
spellingShingle |
Sharabyan, Mohammad Tahghighi Extention and cryptanalysis of golden cryptography |
author_facet |
Sharabyan, Mohammad Tahghighi |
author_sort |
Sharabyan, Mohammad Tahghighi |
title |
Extention and cryptanalysis of golden cryptography |
title_short |
Extention and cryptanalysis of golden cryptography |
title_full |
Extention and cryptanalysis of golden cryptography |
title_fullStr |
Extention and cryptanalysis of golden cryptography |
title_full_unstemmed |
Extention and cryptanalysis of golden cryptography |
title_sort |
extention and cryptanalysis of golden cryptography |
publishDate |
2015 |
url |
http://psasir.upm.edu.my/id/eprint/57133/1/FSKTM%202015%2018RR.pdf http://psasir.upm.edu.my/id/eprint/57133/ |
_version_ |
1643836395074093056 |
score |
13.211869 |