Main Article Content
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and the second is achieved by applying the "RSA ". CAST-128 utilizes a pair of sub-keys for each round as a quantum of five bits that was utilized as a key of rotation for each round and a quantum of 32 (bits) was utilized as a key of masking into a round . The proposed adaptive 128-bits key can be extracted from the main diagonal of each frame before encryption. RSA is a public-key cryptographic technique which can be known as (asymmetric) cryptography. An asymmetry of a key depends on factoring a product of two big prime values. A comparison was applied on several videos and the results showed that CAST-128 method proved the highest degree of entropy even if the frames have lots of distorted data or unclear image pixels. For example, the entropy value of a sample of a girl video is 2581.921 when using CAST-128, while it is 2271.329 when using the RSA; also the entropy value of a sample of a scooter video is 2569.814 when using the CAST-128, while it is 2282.844 when using RSA.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Babatunde A., Jimoh, R., Abikoye O., Isiaka B. Survey of Video Encryption Algorithms. Int. J Inform Comm Tech. 2017; 5(1):65-80.
Ghodke M., Mali N. FPGA Based network security using cryptography. Int J Eng Tech. 2016; 3(3):469-471.
Bhoopal R., Shaik A. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. Heal C Tech Let. 2016 Sep 22; 3(3):177–183.
Zhang Y. The unified image encryption algorithm based on chaos and cubic S-Box, J Comp Math Data Sci. (CMDS).2018;450:361-377.
Mohit K, Akshat A, Ankit G. A Review on Various Digital Image Encryption Techniques and Security Criteria. Int J Comp Appl. 2014 July 22; 96(13):19-26.
Noor A, Mokhtar M. Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure. Baghdad Sci J.2020; 17(4):1320-1327. https://doi.org/n 10.21123/ bsj.2020 .17.4.1320.
Shaikh A, Kaul V. Enhanced Security Algorithm using Hybrid Encryption and ECC, IOSR J Comp Eng. 2014 Jun;16(3) 80-85.
Kritika A, Manisha S, Sanjay B. Analysis of Cryptographic Algorithms for Network Security, Int J Comp Appl Tech Res. 2014; 3(2) : 130-135.
Karolin M, Meyyappan T. Image Encryption and Decryption using RSA Algorithm with Share Creation Techniques , Int J Eng Adv Tech. 2019; 9(2): 2797-2800.
Ibrahem M, Hamood L. Video Encryption Based on Chaotic System and Stream Cipher, Iraq. J Inform Comm. Tech. 2018; 1(2): 33-40.
Malladar R, Kunte S. Selective Video Encryption Based on Entropy Measure, Integrated Intelligent Computing, Communication and Security. Springer Nature Singapore Pte Ltd, 2019: 603-612.
Cheng S, Wang L, Ao N, Han Q. A Selective Video Encryption Scheme Based on Coding Characteristics, Symmetry. 2020; 12(3): 332.
Vivek P. Bharat M. Performance Comparison of Various Cryptographic Algorithms Along with Energy Consumption in Wireless Sensor Network. Int J Sci Tech Res. 2020; 9(3): 77-86.
Abdel-karim S, Hassan A, Naglaa F. Modifications on RSA Cryptosystem Using Genetic Optimization. Int J Res Appl Sci.2014; 19(2): 150 -155.
Shailaja S, Dr .Krishnamurthy G. Comparison of Blowfish and Cast-128 Algorithms Using Encryption Quality, Key Sensitivity and Correlation Coefficient Analysis. Amer J Eng Res. .2014; 3(7): 161-166.
Enas T, Ekhlas F. Image encryption and decryption using CAST-128 with proposed adaptive key, Coll Educ J. 2019; 5: 89-100.
Zhao J., Wang M., Wen L. Improved Linear Cryptanalysis of CAST-256. J Comp Sci. Tech. 2014;29(6): 1134-1139.
Rekha C, Krishnamurthy G. An Optimized Key Scheduling Algorithm for CAST -128 using dynamic substitution S-box. Int J Recent Tech Eng. 2019 Sept.; 8(3): 2585-2590.
Thippanna G. A Re-Examine on Assorted Digital Image Encryption Algorithm’s Technique. Bios Biomet J. 2018 Jan. 17; 4(2): 1-8. https://doi.org/10.19080/BBOAJ. 2017.04.55563.
Zoran H, Druga G, Varadin C. Comparative Analysis of Cryptographic Algorithms, Int J Digit Tech Econ. 2016 Dec. 15; 1(2):127-134.
Ahmad S, Shamma M, Alkhatib A. RSA Algorithm with a New Approach Encryption and Decryption Message Text by ASCII. Int J Crypt Info Sec. 2015 Dec; 5(3): 23-32.
Shankar K. An Optimal RSA Encryption Algorithm for Secret Images. Int J Pure Appl Math. 2018; 118(20): 2491-2499.
Priyadarshini P, Prashant N, Narayan D, Meena S, A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish . Int J Conf Info Sec Priv. 2016; 78(2016): 617-624.
Sahu J, Singh V, Sahu V, Chopra A. An Enhanced Version of RSA to Increase the Security. J Net Comm Eng Tech. 2017; 7(4):1-4.
Khadeeja G, Saif M, Majid J. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES. Baghdad Sci J. 2021; 18(2): 417-429. https://doi.org/ 10.21123/ bsj.2021.18.2.0417