Double-Layer Encryption using Chemical Periodic Table and a Pseudo-random Number Generator

Authors

  • Jose Paredes-Malaga
  • Roxana Flores-Quispe
  • Yuber Velazco-Paredes

Keywords:

Double-Layer encryption, Periodic Table, Color-Based Cryptography, Encryption, Decryption, Pseudo-Random numbers

Abstract

 

The global coronavirus pandemic has led to an increase in information transmission. Many public and private institutions have adopted remote work, ranging from educational institutions to those dealing with national security, making it necessary to have information protection mechanisms. For example, in 2022, the Guacamaya hacker group exposed over 283,000 emails stolen from the Peruvian army and Joint Command of the Armed Forces. On the other hand, in recent years, encryption using scientific knowledge from fields such as physics, chemistry, and biology has been studied due to its high complexity to generate new ways to encrypt information. For that reason, this research proposes a new method based on the properties of chemical elements in the periodic table and color cryptography, which incorporates two levels of security: a pseudo-random number generator and character substitution by atomic number. The security level of the system has been demonstrated by the extensive key size and comparative analysis, which aligns with cryptographic principles, providing robust protection against unauthorized access.

References

Y. Velazco-Paredes, et al., “Relevance feedback through the generation of trees for image retrieval based on multitexton histogram,” Proceedings of the 2011 IEEE 30th International Conference of the Chilean Computer Science Society, November 2011, pp. 1-7, https://doi.org/10.1109/SCCC.2011.1.

K. D. Patel et al., “Image encryption using different techniques: A review,” International Journal of Emerging Technology and Advanced Engineering, vol. 1, no. 1, pp. 30–34, 2011. https://api.semanticscholar.org/CorpusID:16076104.

M. Ruelas Quenaya, A.A. Villa-Herrera, S. F. Chambi Ytusaca, J. E. Yauri Ituccayasi, Y. Velazco-Paredes, R. Flores-Quispe, “Image encryption using an image pattern based on advanced encryption standard,” Proceedings of the 2021 IEEE Colombian Conference on Communications and Computing (COLCOM), Cali, Colombia, 2021, pp. 1-6. https://doi.org/10.1109/COLCOM52710.2021.9486298.

A. Saini, A. Tsokanos, & R. Kirner, “Quantum randomness in cryptography – A survey of cryptosystems, RNG-based ciphers, and QRNGs,” Information, vol. 13, issue 8, 358, 2022. https://doi.org/10.3390/info13080358.

M. Peyravian, S. M. Matyas, A. Roginsky, & N. Zunic, “Generating user-based cryptographic keys and random numbers,” Computers & Security, vol. 18, issue 7, pp. 619–626. https://doi.org/10.1016/S0167-4048(99)82040-9.

J. Ezhilarasi, et al., “Efficiency and area reduction for a PRNG framework based on Well method,” International Journal for Scientific Research and Development, vol. 3, issue 2, pp. 2476-2482, 2015. https://api.semanticscholar.org/CorpusID:55679202.

W. Stallings, Cryptography and Network Security: Principles and Practice, eighth edition, Global edition, Pearson, 2023, Ch.1, Ch.2, Ch.7. [Online]. Available at: https://books.google.com.pe/books?id=zjbZzgEACAAJ.

R. Ito, et al., “Encryption and data insertion technique using region division and histogram manipulation,” Proceedings of the 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2018, pp. 1118-1121. https://doi.org/10.23919/APSIPA.2018.8659671.

D. Sharma, R. Prasad, G. Bedi, A. Dad, “Colour based cryptography,” International Journal of Engineering Research & Technology (IJERT), vol. 5, 2018. https://api.semanticscholar.org/CorpusID:155649006.

P. Johar, S. Easo, K. K. Johar, “A Novel Approach to Substitution ‘Play Color Cipher’”, International Journal of Next Generation Computer Applications, vol. 4, issue 1, 2017. https://ijngca.com/CurrentIssues.html.

R. Babu Kallam, S. Udaya Kumar, A. Vinaya Babu, “A new framework for scalable secure block cipher generation using color substitution and permutation on characters, numbers, images and diagrams,” International Journal of Computer Applications, vol. 20, issue 5, pp. 37-42, 2011. https://doi.org/10.5120/2427-3259.

A. Sinha, & A. Bhadani, “Double layer cryptography using multiplicative cipher and chemical periodic table,” Indian Journal of Data Communication and Networking (IJDCN), vol. 1, issue 2, 2021. https://doi.org/10.35940/ijdcn.B5008.041221.

J. Clair, “Encoding matter with regiospecific 12 C/ 13 C isotopic labels,” Chemical Communications, issue 21, 2018. https://doi.org/10.1039/C8CC00080H.

S. Jain, & V. Bhatnagar, “A novel DNA sequence dictionary method for securing data in DNA using spiral approach and framework of DNA cryptography,” Proceedings of the 2014 International Conference on Advances in Engineering & Technology Research (ICAETR-2014), Unnao, India, 2014, pp. 1-5. https://doi.org/10.1109/ICAETR.2014.7012924.

S. Arunpandian, S.S. Dhenakaran, “A novel key and image concealing with static-dynamic pattern using modified periodic table”, Journal of Information Security and Applications, vol. 63, 2021. https://doi.org/10.1016/j.jisa.2021.103019.

M. Yamuna, V. K. P. K., “Chemical formula encryption using 7-bit periodic table,” International Journal of PharmTech Research, vol. 6, no. 3, pp 990-995, 2014. https://sphinxsai.com/2014/phvolpt3/2/(990-995)Jul-Aug14.pdf.

R. Hammad, et al., “Implementation of combined steganography and cryptography Vigenere cipher, Caesar cipher, and converting periodic tables for securing secret message,” Journal of Physics: Conference Series, vol. 2279, no. 1, p. 012006, 2022. https://doi.org/10.1088/1742-6596/2279/1/012006.

X.-Y. Wang, Y.-Q. Zhang, X.-M. Bao, “A colour image encryption scheme using permutation-substitution based on chaos,” Entropy, vol. 17, issue 6, pp. 3877-3897, 2015. https://doi.org/10.3390/e17063877.

M. Naik, et al., “Color cryptography using substitution method,” International Research Journal of Engineering and Technology (IRJET), vol. 03, issue 3, pp. 941-944, 2016. https://api.semanticscholar.org/CorpusID:267830148.

S. Akre and A. Sonawane, “Color cipher scheme based ATM pin generation and verification,” Proceedings of the 2020 Fourth International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, 2020, pp. 1-4. https://doi.org/10.1109/ICISC47916.2020.9171058.

S. Arunpandian, and S. S. Dhenakaran, “A novel key and image concealing with static-dynamic pattern using modified periodic table,” Journal of Information Security and Applications, vol. 63, p. 103019, 2021. https://doi.org/10.1016/j.jisa.2021.103019.

E. Cole, R. L. Krutz, & J. W. Conley, Network Security Bible (2nd ed). Indianapolis, IN: Wiley, 2009, Ch.5. [Online]. Available at: https://www.google.com.pe/books/edition/Network_Security_Bible_2Nd_Ed/bSN0CgAAQBAJ?hl=qu.

C. Shannon, A Mathematical Theory of Cryptography, 1945, 92 p. https://evervault.com/papers/shannon.

A. Verma, and G. Anjali, “Design and development of algorithm using chemical cryptography,” Procedia Computer Science, vol. 58, pp. 643-48, 2015. https://doi.org/10.1016/j.procs.2015.08.083.

K. Ravindra Babu, et al., “A block cipher generation using color substitution,” International Journal of Computer Applications, vol. 1, no. 28, pp. 30-32, 2010. https://doi.org/10.5120/515-832.

P. P. Zin, et al., “CryptoChem for encoding and storing information using chemical structures,” Chemistry, 2020. https://doi.org/10.26434/chemrxiv.12921593.v1.

S. Ostapov, B. Diakonenko, M. Fylypiuk, K. Hazdiuk, L. Shumyliak, O. Tarnovetska, “Symmetrical cryptosystems based on cellular automata,” International Journal of Computing, vol. 22, issue 1, pp. 15–20, 2023. https://doi.org/10.47839/ijc.22.1.2874.

L. E. Bassham, et al. “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” NIST, 16 Sept. 2010. https://doi.org/10.6028/NIST.SP.800-22r1a.

NIST Statistical Test Suite. [Online]. Available at: https://csrc.nist.gov/projects/random-bitgeneration/documentation-and-software.

D. P. Duplys, D. R. Schmitz, TLS Cryptography In-Depth: Explore the Intricacies of Modern Cryptography and the Inner Workings of TLS. 2024, Alemania: Packt Publishing.

Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, CRC Press, USA, 2025.

Downloads

Published

2025-10-02

How to Cite

Paredes-Malaga, J., Flores-Quispe, R., & Velazco-Paredes, Y. (2025). Double-Layer Encryption using Chemical Periodic Table and a Pseudo-random Number Generator. International Journal of Computing, 24(3), 443-451. Retrieved from https://computingonline.net/computing/article/view/4181

Issue

Section

Articles