A Novel Cipher-Based Data Encryption with Galois Field Theory

advanced encryption standard cryptography decryption Chemical technology Black Widow Optimization Galois field encryption; decryption; Black Widow Optimization Galois field; advanced encryption standard; discrete cosine transform; cryptography TP1-1185 discrete cosine transform encryption Article
DOI: 10.3390/s23063287 Publication Date: 2023-03-21T06:36:22Z
ABSTRACT
Both the act of keeping information secret and research on how to achieve it are included in broad category cryptography. When people refer “information security,” they referring study use methods that make data transfers harder intercept. we talk about this is what have mind. Using private keys encrypt decode messages a part procedure. Because its vital role modern theory, computer security, engineering, cryptography now considered be branch both mathematics science. mathematical properties, Galois field may used information, making relevant subject The ability one such use. In case, encoded as vector, scrambling process could include application operations involve an inverse. While method unsafe when own, forms foundation for secure symmetric algorithms like AES DES combined with other bit shuffling methods. A two-by-two encryption matrix protect two streams, each which contains 25 bits binary proposed work. Each cell represents irreducible polynomial degree 6. Fine-tuning values up 25-bit streams using Discrete Cosine Transform (DCT) Advanced Encryption Standard (AES) Method yields polynomials Optimization carried out Black Widow technique tune key generation cryptographic processing. By doing so, can produce same degree, was our original aim. Users also look signs tampering, whether hacker obtained unauthorized access patient’s medical records made any changes them. Cryptography allows tampering data. Indeed, another It has added value allowing users check indications manipulation. positively identify faraway objects, especially useful verifying document’s authenticity since lessens possibility fabricated. work achieves higher accuracy 97.24%, throughput 93.47%, minimum decryption time 0.0047 s.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (25)
CITATIONS (14)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....