Hybrid Encryption Algorithms over Wireless Communication Channels

£46.99

Hybrid Encryption Algorithms over Wireless Communication Channels

Electrical engineering WAP (wireless) technology Information technology: general topics Computer networking and communications Computer architecture and logic design Image processing

Author: Mai Helmy Shaheen

Dinosaur mascot

Language: English

Published by: CRC Press

Published on: 4th March 2021

Format: LCP-protected ePub

Size: 32 Mb

ISBN: 9781000326048


Introduction

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, “Hybrid Encryption Algorithms over Wireless Communication Channels”, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik’s cube is used afterwards in order to maximize the number of permutations.

Importance of Secure Transmission

Transmission of images and videos is vital in today’s communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality.

Additional Resources

Complete simulation experiments with MATLAB® codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Show moreShow less