Javascript must be enabled to continue!
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
View through CrossRef
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, providing a new mathematical measure for encryption efficiency, which we will call the
encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated
among its several design parameters such as word size, number of rounds, and secret key length and
the optimal choices for the best values of such design parameters are given. Also, the security analysis
of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security
estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks
are explored. Experiments are made to test the security of RC6 block cipher for digital images against
all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is
highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests
are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So,
RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Title: Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Description:
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, providing a new mathematical measure for encryption efficiency, which we will call the
encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated
among its several design parameters such as word size, number of rounds, and secret key length and
the optimal choices for the best values of such design parameters are given.
Also, the security analysis
of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint.
The security
estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks
are explored.
Experiments are made to test the security of RC6 block cipher for digital images against
all aforementioned types of attacks.
Experiments and results verify and prove that RC6 block cipher is
highly secure for real-time image encryption from cryptographic viewpoint.
Thorough experimental tests
are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm.
So,
RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Related Results
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
The SPN (Substitution-Permutation Network) block cipher is one of the fundamental and important structures in the field of symmetric encryption, widely used in modern encryption al...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption...
Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
The security of digital images is of paramount importance in today's digital world. Encryption is a technique used to secure digital images from unauthorized access. The encryption...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
The influence of micro influencers and digital marketing on product purchasing decisions at tiktok shop in bengkulu city
The influence of micro influencers and digital marketing on product purchasing decisions at tiktok shop in bengkulu city
THE INFLUENCE OF MICRO-INFLUENCERS AND DIGITAL MARKETING ON PURCHASE DECISIONS OF TIKTOK SHOP CUSTOMERS IN BENGKULU CITY
Andhes Tiani Putri, Meylaty F
12Faculty Of Economic
E...

