Open Access Open Access  Restricted Access Subscription Access

Encryption Mechanism under Prevalent Invasion

Yashika Tanwar, Himanshi Tanwar, Shailender Gupta


The digital and computerized era is fast approaching which has increased the amount of data exchanged over the internet. The information transmitted can be accessed by an unauthorized user who can manipulate the data. This fact reveals the need for security mechanisms resulting in various cryptographic algorithms having enhanced protection mechanisms which fulfill the increased demand for security in cyber-attacks and data exploitation. The main goal of these strategies is to keep information private. To combat the problems like data theft, different encryption methods such as traditional, chaotic, and quantum-based encryption approaches have been developed and in need for a long time. The enhanced features of chaotic and quantum-based techniques made them an obvious choice because the data communication is either in the form of videos or images which have less randomness than text-based data. The traditional techniques fail to work on high randomness. In this paper, analyzes are carried out on various experiments based on brute-force attack, geometric attack analysis, bit error rate, chi-square, and anti-occlusion.


Brute-force attack, chaos-based mechanisms, geometric attack analysis, quantum chaosbased mechanisms

Full Text:



Matsui M. The first experimental cryptanalysis of the data encryption standard. In: Desmedt YG (eds) Advances in Cryptology — CRYPTO ’94. CRYPTO 1994. Lecture Notes in Computer Science, vol 839. Springer, Berlin, Heidelberg DOI: 10.1007/3-540-48658-5_1.

Malik A, Jadav S, Gupta S. Assessment of diverse image encryption mechanisms under prevalent invasion. Multimed Tools Appl. 2021; 80(14): 21521–21559. DOI: 10.1007/s11042-021-10670-0.

Kohli R. Cryptography on system-chip design using VLSI. Germany: Lambert Academic Publication House; 2013.

Bansal R, Gupta S, Sharma G. An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl. 2017; 76(15): 16529–16562. DOI: 10.1007/s11042-016-3926-9.

Kester QA. A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. arXiv preprint arXiv:1307.7786. 2013.

Mitsuru Matsui. The first experimental cryptanalysis of the data encryption standard. Annual International Cryptology Conference. 1994;94:1-11.

Matthews R. On the derivation of a “chaotic” encryption algorithm. Cryptologia. 1989; 13(1): 29–42. DOI: 10.1080/0161-118991863745.

Mousa A, Hamad A. Evaluation of the RC4 algorithm for data encryption. IJCSA. 2006; 3(2): 44–56.

Barker E, Mouha N. Recommendation for the triple data encryption algorithm (TDEA) block cipher (no. NIST special publication (SP) 800-67 rev. 2 (draft)). National Institute of Standards and Technology; 2017.

Mousa A, Hamad A. Evaluation of the RC4 algorithm for data encryption. IJCSA. 2006; 3(2): 44–56.

Basu S. International Data encryption algorithm (Idea)-a typical illustration. J Glob Res Comput Sci. 2011; 2(7): 116–118.

Schneier B. The blowfish encryption algorithm. Dr Dobbs J Softw Tool Prof Programmer. 1994; 19(4): 38–43.

Rivest RL. The RC5 encryption algorithm. Dr. Dobb’s Journal. In: Stallings W, (editor) Practical cryptography for data internetworks. IEEE Computer Society Press; 1996.

Mousa A, Hamad A. Evaluation of the RC4 algorithm for data encryption. IJCSA. 2006; 3(2): 44–56.

Ahmed HEDH, Kalash HM, Allah OF. Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images. In: International Conference on Electrical Engineering. Vol. 2007. IEEE Publications; 2007. pp. 1–7.

Mandal S, Das S, Nath A. Data hiding and retrieval using visual cryptography. Int J Innov Res Advan Eng. 2014; 1: 102–110.

Chavan PV, Atique D. Design and implementation of hierarchical visual cryptography with expansion less shares. arXiv preprint arXiv:1402.2745. 2014.

Rashi K, Manoj K. Optimized on system analysis using AES and X-tea. Int J Adv Res Comput Sci Softw Eng. 2013; 3(2).

Rayarikar R, Upadhyay S, Pimpale P. SMS encryption using AES algorithm on android. Int J Comput Appl. 2012; 50(19): 12–17. DOI: 10.5120/7909-1038.

François M, Grosges T, Barchiesi D, Erra R. A new image encryption scheme based on a chaotic function. Signal Process Image Commun. 2012; 27(3): 249–259. DOI: 10.1016/j.image.2011.11.003.

Sam IS, Devaraj P, Bhuvaneswaran RS. A novel image cipher based on mixed transformed logistic maps. Multimed Tools Appl. 2012; 56(2): 315–330. DOI: 10.1007/s11042-010-0652-6.

Shatheesh Sam IS, Devaraj P, Bhuvaneswaran RS. An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn. 2012; 69(4): 1995–2007. DOI: 10.1007/s11071-012-0402-6.

Ye G, Pan C, Huang X, Zhao Z, He J. A chaotic image encryption algorithm based on information entropy. Int J Bifürcation Chaos. 2018; 28(1). DOI: 10.1142/S0218127418500104.

Abd El-Latif AA, Li L, Wang N, Han Q, Niu X. A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 2013; 93(11): 2986–3000. DOI: 10.1016/j.sigpro.2013.03.031.

Akhshani A, Akhavan A, Lim S-C, Hassan Z. An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul. 2012; 17(12): 4653–4561. DOI: 10.1016/j.cnsns.2012.05.033.

Liu H, Jin C. A novel color image encryption algorithm based on quantum chaos sequence. 3D Res. 2017; 8(1): 4. DOI: 10.1007/s13319-016-0114-7.



  • There are currently no refbacks.

Copyright (c) 2021 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517