Secure Image Encryption with CAST-128 Algorithm 🔒
Explore how the CAST-128 encryption algorithm enhances image security through adaptive key techniques, based on recent research by Tariq and Falih (2019).

Anis Natasha
396 views • Jun 5, 2021

About this video
Reference
1-Tariq, E. ., & Falih, E. . (2019). Image Encryption and decryption using CAST-128 with proposed adaptive key . Mustansiriyah Journal for Sciences and Education, 20(5), 89-100. Retrieved from http://edumag.uomustansiriyah.edu.iq/index.php/mjse/article/view/675
2.Kadhim, F.A., Abdul-Majeed, G.H. and Ali, R.S., 2017, March. Enhancement CAST block algorithm to encrypt big data. In 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT) (pp. 80-85). IEEE.
3.Heys, H.M. and Tavares, S.E., 1994, September. On the security of the CAST encryption algorithm. In Canadian Conference on Electrical and Computer Engineering (pp. 332-335).
4.Adams, C.M., 1997. Constructing symmetric ciphers using the CAST design procedure. Designs, Codes and cryptography, 12(3), pp.283-316.
5.Adams, C., Heys, H.M., Tavares, S.E. and Wiener, M., 1999, May. An analysis of the CAST-256 cipher. In Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411) (Vol. 1, pp. 361-366). IEEE.
6.Zhao, J.Y., Wang, M.Q. and Wen, L., 2014. Improved linear cryptanalysis of CAST-256. Journal of Computer Science and Technology, 29(6), pp.1134-1139.
7.Pestunov, A., 2008, July. Differential cryptanalysis of 24-round CAST-256. In 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (pp. 46-49). IEEE.
8.Adams, C., 1998. CAST-256. AES submission.
9.Adams, C. (1999). The CAST-256 encryption algorithm.
10.Ni, B., Ito, G., Dong, X., & Iwata, T. (2019, December). Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256. In International Conference on Cryptology in India (pp. 433-455). Springer, Cham.
11.Syafie,M.(2017, April 17) Encryption and CAST explained
[Video].Youtube.(69) Encryption and CAST explained - YouTube
12. Tingyuan Nie; Yangseng Li; Chuanwang Song, (2010). Performance Evaluation For CAST.
13. J Res Natl Inst Stand Technol, (1999). Status Report on the First Round of The Development of The Advanced Encyption Standard.
1-Tariq, E. ., & Falih, E. . (2019). Image Encryption and decryption using CAST-128 with proposed adaptive key . Mustansiriyah Journal for Sciences and Education, 20(5), 89-100. Retrieved from http://edumag.uomustansiriyah.edu.iq/index.php/mjse/article/view/675
2.Kadhim, F.A., Abdul-Majeed, G.H. and Ali, R.S., 2017, March. Enhancement CAST block algorithm to encrypt big data. In 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT) (pp. 80-85). IEEE.
3.Heys, H.M. and Tavares, S.E., 1994, September. On the security of the CAST encryption algorithm. In Canadian Conference on Electrical and Computer Engineering (pp. 332-335).
4.Adams, C.M., 1997. Constructing symmetric ciphers using the CAST design procedure. Designs, Codes and cryptography, 12(3), pp.283-316.
5.Adams, C., Heys, H.M., Tavares, S.E. and Wiener, M., 1999, May. An analysis of the CAST-256 cipher. In Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411) (Vol. 1, pp. 361-366). IEEE.
6.Zhao, J.Y., Wang, M.Q. and Wen, L., 2014. Improved linear cryptanalysis of CAST-256. Journal of Computer Science and Technology, 29(6), pp.1134-1139.
7.Pestunov, A., 2008, July. Differential cryptanalysis of 24-round CAST-256. In 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (pp. 46-49). IEEE.
8.Adams, C., 1998. CAST-256. AES submission.
9.Adams, C. (1999). The CAST-256 encryption algorithm.
10.Ni, B., Ito, G., Dong, X., & Iwata, T. (2019, December). Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256. In International Conference on Cryptology in India (pp. 433-455). Springer, Cham.
11.Syafie,M.(2017, April 17) Encryption and CAST explained
[Video].Youtube.(69) Encryption and CAST explained - YouTube
12. Tingyuan Nie; Yangseng Li; Chuanwang Song, (2010). Performance Evaluation For CAST.
13. J Res Natl Inst Stand Technol, (1999). Status Report on the First Round of The Development of The Advanced Encyption Standard.
Video Information
Views
396
Likes
8
Duration
8:21
Published
Jun 5, 2021