Implementation Of The Arnold Catmap On A Combination Of Symmetric And Asymmetric Cryptography

Authors

  • F. Riza Fakultas Ilmu Komputer dan Teknologi Informasi, Teknologi Informasi, Universitas Muhammadiyah Sumatera Utara, Medan, Indonesia
  • Martiano Fakultas Ilmu Komputer dan Teknologi Informasi, Teknologi Informasi, Universitas Muhammadiyah Sumatera Utara, Medan, Indonesia
  • Farid Akbar Siregar Fakultas Ilmu Komputer dan Teknologi Informasi, Teknologi Informasi, Universitas Muhammadiyah Sumatera Utara, Medan, Indonesia

DOI:

10.33395/sinkron.v9i1.13175

Keywords:

AES, RSA, Arnold Map, Digital Image

Abstract

The escalating need for robust data security has propelled cyber security practitioners into a perpetual quest for innovative solutions. This endeavor involves the strategic amalgamation of cryptographic algorithms with meticulously customized alterations to specific algorithmic processes. In this pursuit of heightened data protection, the Arnold Cat Map emerges as a pivotal tool, a mathematical transformation that gracefully elucidates the intricate movement of points within a two-dimensional plane. This movement occurs in a systematic and repetitive manner, rendering it an indispensable asset in the domains of cryptography and image scrambling. The Arnold Cat Map operates by meticulously relocating each point within the two-dimensional plane to a fresh coordinate, all the while adhering to an intricately structured pattern. The result is a formidable "mixing" effect that enhances data security. When applied theoretically to widely employed encryption methods like Advanced Encryption Standard (AES) for symmetric encryption and the Rivest-Shamir-Adleman (RSA) algorithm for asymmetric encryption, the Arnold Cat Map exhibits the potential to significantly augment the randomness of the encrypted output. This augmentation of randomness, in turn, fortifies the security of digital assets and communications, making them more resilient against adversarial attacks. By introducing this innovative concept into the realm of cryptography, cyber security practitioners endeavor to fortify data security, offering a higher degree of confidence in the protection of sensitive information and digital assets against a backdrop of ever-evolving cyber threats.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Abdelfatah, R. I., 2019. Secure image transmission using chaotic-enhanced elliptic curve cryptography. IEEE Access, Volume 8, pp. 3875-3890.

Azanuddin, A., Yakub, S. & Prayudha, J., 2022. Implementasi Keamanan Citra Menggunakan Algoritma AES-128 Dengan Aplikasi Client-Server. Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika), 7(1), pp. 51-61.

Chidambaram, N., Raj, P., Thenmozhi, K. & Amirtharajan, R., 2020. Advanced framework for highly secure and cloud‐based storage of colour images. IET Image Processing, 14(13), pp. 3143-3153.

Jiao, K. et al., 2020. Image encryption scheme based on a generalized Arnold map and RSA algorithm. Security and Communication Networks, Volume 2020, pp. 1-14.

Liang, H. et al., 2021. A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography. Applied Sciences, 11(12), p. 5691.

Lin, R. & Li, S., 2021. An image encryption scheme based on lorenz hyperchaotic system and RSA algorithm. Security and Communication Networks, Volume 2021, pp. 1-18.

Man, Z. et al., 2021. Double image encryption algorithm based on neural network and chaos. Chaos, Solitons & Fractals, Volume 152, p. 111318.

Parida, P. et al., 2021. Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access, Volume 9, pp. 76191-76204.

Purnama, I. N., 2019. Implementasi Algoritma Enkripsi Rc5 Untuk Mengamankan Gambar Pada Perangkat Android. Jurnal Informatika dan Rekayasa Elektronik, 2(2), pp. 1-9.

Riadi, I., Fadlil, A. & Tsani, F. A., 2022. Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher. JISKA (Jurnal Informatika Sunan Kalijaga), 7(1), pp. 33-45.

Sujjada, A. & Juniar, E., 2021. Implementasi Algoritma Hill Cipher Untuk Proses Enkripsi Data Menggunakan Media Citra Digital. Jurnal RESTIKOM: Riset Teknik Informatika dan Komputer, 3(1), pp. 1-17.

Downloads


Crossmark Updates

How to Cite

Riza, F., Martiano, M., & Siregar, F. A. . (2024). Implementation Of The Arnold Catmap On A Combination Of Symmetric And Asymmetric Cryptography. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(1), 165-173. https://doi.org/10.33395/sinkron.v9i1.13175