Back to Search Start Over

A Finite State Machine-Based Improved Cryptographic Technique

Authors :
Mohammad Mazyad Hazzazi
Raja Rao Budaraju
Zaid Bassfar
Ashwag Albakri
Sanjay Mishra
Source :
Mathematics, Vol 11, Iss 10, p 2225 (2023)
Publication Year :
2023
Publisher :
MDPI AG, 2023.

Abstract

With the advent of several new means of communication, safeguarding the confidentiality of messages has become more crucial. Financial institutions, virtual currencies, and government organizations are all examples of high-risk contexts where information exchanges need particular care. The importance of data security in preventing unauthorized access to data is emphasized. Several cryptographic methods for protecting the secrecy and integrity of data were compared. In this research, the proposed work includes a new Turbo Code-based encryption algorithm. The Turbo encoder’s puncturing process is controlled by a secret key, and a typical random sequence is generated to encrypt the data and fix any mistakes. Key generation utilizing pre-existing data eliminates the requirement for sending keys over a secure channel. Using recurrence relations and the Lower–Upper (LU) decomposition method, the presented study suggests a novel approach to message encryption and decryption. The resulting encrypted grayscale image has a very high level of security, with an entropy of 7.999, a variation from perfection of 0.0245, and a correlation of 0.0092 along the diagonal, 0.0009 along the horizontal, and −0.0015 along the vertical. Directly decrypted pictures have a Peak Signal-to-Noise Ratio (PSNR) of 56.22 dB, but the suggested approach only manages an embedding capacity of 0.5 bpp (bits per pixel). This may be achieved by decreasing the size of the location map by only 0.02 bpp.

Details

Language :
English
ISSN :
11102225 and 22277390
Volume :
11
Issue :
10
Database :
Directory of Open Access Journals
Journal :
Mathematics
Publication Type :
Academic Journal
Accession number :
edsdoj.7f93bddf7e6343dab7abbbff051ea756
Document Type :
article
Full Text :
https://doi.org/10.3390/math11102225