Encryption schemes with hyper-complex number systems and their hardware-oriented implementation

dc.contributor.authorDoukhnitch, Evgueni I.
dc.contributor.authorChefranov, Alexander G.
dc.contributor.authorMahmoud, Ahmed Y.
dc.date.accessioned2026-02-06T17:59:07Z
dc.date.issued2013
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractQuaternion Encryption Scheme (QES) is shown to be susceptible to the Known Plaintext-Ciphertext Attack (KPCA) due to improper choice of frame size and the procedure of secret quaternion updating. In this chapter, the authors propose a modification of the QES (M-QES) that is resistant to the KPCA. The M-QES is based on adjusting the frame size and the quaternion update procedure. An approach for effective hardware implementation of the proposed algorithm, HW-QES, is discussed. The HW-QES uses addition and shift operations. Extension of quaternion approach to another hyper-complex number systems, octonions, is used for designing a new hardware-oriented encryption algorithm, HW-OES. Experimental results show that the proposed M-QES and HW-QES are six-eight times more effective in the encryption quality of signals than the original QES. Additionally, M-QES and HW-OES are shown to be significantly more effective in the encryption quality of images than the original QES and wellknown AES. The results show that the performance of the HW-QES is only 10% worse than that of QES. © 2013, IGI Global.
dc.identifier.doi10.4018/978-1-4666-4030-6.ch005
dc.identifier.endpage132
dc.identifier.isbn9781466640313
dc.identifier.isbn9781466640306
dc.identifier.isbn1466640308
dc.identifier.scopus2-s2.0-84944754728
dc.identifier.scopusqualityN/A
dc.identifier.startpage110
dc.identifier.urihttps://doi.org/10.4018/978-1-4666-4030-6.ch005
dc.identifier.urihttps://search.trdizin.gov.tr/tr/yayin/detay/
dc.identifier.urihttps://hdl.handle.net/11129/7921
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherIGI Global
dc.relation.publicationcategoryKitap Bölümü - Uluslararası
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_Scopus_20260204
dc.subjectHardware
dc.subjectNumbering systems
dc.subjectSecurity of data
dc.subjectCipher text attacks
dc.subjectEncryption algorithms
dc.subjectEncryption quality
dc.subjectEncryption schemes
dc.subjectFrame size
dc.subjectHardware implementations
dc.subjectHypercomplex number
dc.subjectShift operations
dc.subjectCryptography
dc.titleEncryption schemes with hyper-complex number systems and their hardware-oriented implementation
dc.typeBook Chapter

Files