Loading

Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image Security
Thoti. Sasikala1, Kanusu. Srinivasa Rao2, Buduri. Reddaiah3, Bodi. Susheel Kumar4

1Thoti. Sasikala, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

2Kanusu. Srinivasa Rao, Associate Professor, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

3Buduri. Reddaiah, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

4Bodi. Susheel Kumar, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India. 

Manuscript received on 30 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024 | PP: 34-38 | Volume-13 Issue-4, April 2024 | Retrieval Number: 100.1/ijeat.D444113040424 | DOI: 10.35940/ijeat.D4441.13040424

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Every business platform uses online services and is increasing. Wired and wireless networks are becoming increasingly popular every day. With this, sensitive data is carried over the internet daily. Due to the rapid growth of networks, information security has become increasingly important. Hence, there is a significant risk of data being misinterpreted or manipulated by unauthorised parties. Therefore, there is a need to provide security for the data, and cryptography is the science that helps in providing this security. The encryption algorithm plays a crucial role in information security. This paper provides a brief description of a new hybrid system designed to enhance security. In this work, in addition to traditional operations, Lattice permutation is employed in the encryption process. For key generation, Chaos Logistic Mapping is used, which exhibits greater resistance to key breaking by unauthorised persons. Services like online transactions may be protected mainly with this type of newly proposed hybrid system.

Keywords: Lattice Permutation, Logistic Map, Encryption, Decryption, Chaotic Key Generation.
Scope of the Article: Cryptography