Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

View through CrossRef
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Title: Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Description:
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given.
Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint.
The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored.
Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks.
Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint.
Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm.
So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.

Related Results

Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
The SPN (Substitution-Permutation Network) block cipher is one of the fundamental and important structures in the field of symmetric encryption, widely used in modern encryption al...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption...
Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
Triple Encryption of Images based on RC4, Zigzag, and Elliptic Curve Algorithms for Enhanced Security
The security of digital images is of paramount importance in today's digital world. Encryption is a technique used to secure digital images from unauthorized access. The encryption...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
The influence of micro influencers and digital marketing on product purchasing decisions at tiktok shop in bengkulu city
The influence of micro influencers and digital marketing on product purchasing decisions at tiktok shop in bengkulu city
THE INFLUENCE OF MICRO-INFLUENCERS AND DIGITAL MARKETING ON PURCHASE DECISIONS OF TIKTOK SHOP CUSTOMERS IN BENGKULU CITY Andhes Tiani Putri, Meylaty F   12Faculty Of Economic E...

Back to Top