A Finite State Machine-Based Improved Cryptographic Technique
Mohammad Mazyad Hazzazi (),
Raja Rao Budaraju,
Zaid Bassfar,
Ashwag Albakri and
Sanjay Mishra
Additional contact information
Mohammad Mazyad Hazzazi: Department of Mathematics, College of Science, King Khalid University, Abha 61421, Saudi Arabia
Raja Rao Budaraju: Senior Member of Technical Staff, Oracle, 3990 Scottfield Street, Dublin, CA 94568, USA
Zaid Bassfar: Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
Ashwag Albakri: Department of Computer Science, College of Computer Science & Information Technology, Jazan 45142, Saudi Arabia
Sanjay Mishra: Department of USCS, Uttaranchal University, Dehradun 248007, India
Mathematics, 2023, vol. 11, issue 10, 1-25
Abstract:
With the advent of several new means of communication, safeguarding the confidentiality of messages has become more crucial. Financial institutions, virtual currencies, and government organizations are all examples of high-risk contexts where information exchanges need particular care. The importance of data security in preventing unauthorized access to data is emphasized. Several cryptographic methods for protecting the secrecy and integrity of data were compared. In this research, the proposed work includes a new Turbo Code-based encryption algorithm. The Turbo encoder’s puncturing process is controlled by a secret key, and a typical random sequence is generated to encrypt the data and fix any mistakes. Key generation utilizing pre-existing data eliminates the requirement for sending keys over a secure channel. Using recurrence relations and the Lower–Upper (LU) decomposition method, the presented study suggests a novel approach to message encryption and decryption. The resulting encrypted grayscale image has a very high level of security, with an entropy of 7.999, a variation from perfection of 0.0245, and a correlation of 0.0092 along the diagonal, 0.0009 along the horizontal, and −0.0015 along the vertical. Directly decrypted pictures have a Peak Signal-to-Noise Ratio (PSNR) of 56.22 dB, but the suggested approach only manages an embedding capacity of 0.5 bpp (bits per pixel). This may be achieved by decreasing the size of the location map by only 0.02 bpp.
Keywords: Modified Cryptographic Turbo Code; Peak Signal-to-Noise Ratio; horizontal correlation; Finite State Machine (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2227-7390/11/10/2225/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/10/2225/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:10:p:2225-:d:1142837
Access Statistics for this article
Mathematics is currently edited by Ms. Emma He
More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().