skip to main content

A Combination of SHA-256 and DES for Visual Data Protection

1Department of Informatics Engineering , Indonesia

2Faculty of Computer Science , Iraq

Received: 23 Apr 2025; Revised: 11 May 2025; Accepted: 19 May 2025; Available online: 27 May 2025; Published: 31 May 2025.
Editor(s): Prajanto Adi
Open Access Copyright (c) 2025 The authors. Published by Department of Informatics Universitas, Diponegoro
Creative Commons License This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Citation Format:
Abstract

This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly encrypted. The MSE and PSNR values approximate 105 and 48, indicating that the decryption image quality closely resembles the original due to these relatively high values, which are considered excellent. The SSIM value of 1 which indicates no difference in structure, luminance, or contrast between images. Entropy and N.C values approach 8 and 0.92, respectively, suggesting pixel complexity within image with favorable pixel distribution. This technique prove effective for protecting confidential images and digital documents.

Fulltext View|Download
Keywords: DES; SHA; Histogram; SSIM; Entropy;

Article Metrics:

  1. C. Song, “Investigating Data Encryption Technology’s Use to Improve Security for Computer Network Communication,” in ACM International Conference Proceeding Series, Changde, Hunan China, 2023, pp. 663–667. doi: 10.1145/3640115.3640223
  2. S. Banerjee, “Exploring Cryptographic Algorithms : Techniques , Applications , and Innovations,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 4, no. 1, pp. 607–620, 2024, doi: 10.48175/IJARSCT-18097
  3. H. Dyomova, “Study of Cryptographic Security of Computer Networks,” Comput. Technol. Educ. Sci. Prod., no. 57, pp. 15–19, 2024, doi: 10.36910/6775-2524-0560-2024-57-02
  4. U. H. Shaikh, M. M. Abbas, S. A. Lahad, M. Razi, and M. Shaikh, “A Comparative Survey of Symmetric and Asymmetric Key Cryptography Algorithms,” in 2nd International Multidisciplinary Conference on Emerging Trends in Engineering Technology-2024 (2nd IMCEET-2024), 2024, pp. 257–262
  5. D. Ramakrishna and M. A. Shaik, “A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges,” IEEE Access, vol. 13, pp. 11576–11593, 2024, doi: 10.1109/ACCESS.2024.3518533
  6. R. Vaughn and M. Borowczak, “Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants,” Cryptography, vol. 8, no. 3, p. 40, 2024, doi: 10.3390/cryptography8030040
  7. A. Biryukov and C. De Cannière, “Data Encryption Standard (DES),” Encycl. Cryptogr. Secur. Privacy, Third Ed., pp. 555–562, 2025, doi: 10.1007/978-3-030-71522-9_568
  8. O. A. Manankova, M. Z. Yakubova, and A. S. Baikenov, “Cryptanalysis the SHA-256 Hash Function Using Rainbow Tables,” Indones. J. Electr. Eng. Informatics, vol. 10, no. 4, pp. 930–944, 2022, doi: 10.52549/ijeei.v10i4.4247
  9. S. M. S. Eldin et al., “Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps with Induced DNA Sequences,” IEEE Access, vol. 11, no. September, pp. 101694–101709, 2023, doi: 10.1109/ACCESS.2023.3298545.
  10. M. Hamza, M. Baig, H. Burhan, U. Haq, and W. Habib, “A Comparative Analysis of AES , RSA , and 3DES Encryption Standards based on Speed and Performance,” Manag. Sci. Adv., vol. 1, no. 1, pp. 20–30, 2024, doi: 10.31181/msa1120244
  11. M. Bouam, C. Bouillaguet, C. Delaplace, and C. Noûs, “Computational records with aging hardware: Controlling half the output of SHA-256,” Parallel Comput., vol. 106, 2021, doi: 10.1016/j.parco.2021.102804
  12. B. S. Rawal, S. N. Aleti, and S. Reddy, “Optimization of SHA 256 with Finetune Pipeline and Parallel Processing with Split Techniques,” Math. Stat. Eng. Appl., vol. 71, no. 3s, pp. 460–472, 2022
  13. S. K. Bhatti, K. M. Aamir, and M. Deriche, “A Scalable DES Based Hashing Algorithm,” in 2023 24th International Arab Conference on Information Technology (ACIT), Ajman, United Arab Emirates, 2023, pp. 1–5. doi: 10.1109/ACIT58888.2023.10453719
  14. J. Si and L. Wang, “Design and implementation of a security system algorithm based on the combination of improved AES and SHA-512,” in Fifth International Conference on Computer Communication and Network Security (CCNS 2024), 2024, pp. 468–473. doi: 10.1117/12.3038065
  15. M. Issad, N. Anane, N. Guenfoud, and M. Debyeche, “HW/SW Co-Design of the Secure Hash Function SHA-256,” in 2024 3rd International Conference on Advanced Electrical Engineering (ICAEE), Sidi-Bel-Abbes, Algeria, 2024, pp. 1–5. doi: 10.1109/ICAEE61760.2024.10783285
  16. M. R. Naufal, C. A. Sari, E. H. Rachmawanto, L. B. Handoko, F. O. Isinkaye, and W. S. T. Al-Dayyeni, “An Evaluation of Number of Pixels Change Rate (NPCR) in Symetric Cryptography Based on Data Encryption Standard (DES),” in 2023 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 2023, pp. 490–495. doi: 10.1109/iSemantic59612.2023.10295300
  17. T. H. Tran, H. L. Pham, and Y. Nakashima, “A High-Performance Multimem SHA-256 Accelerator for Society 5.0,” IEEE Access, vol. 9, pp. 39182–39192, 2021, doi: 10.1109/ACCESS.2021.3063485
  18. N. Gadhiya, S. Tailor, and S. Degadwala, “A Review on Different Level Data Encryption through a Compression Techniques,” in 2024 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 2024, pp. 1378–1381. doi: 10.1109/ICICT60155.2024.10544803
  19. N. Gadhiya, S. Tailor, and S. Degadwala, “Novel Approach for Data Encryption with Multilevel Compressive,” in 2024 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 2024, pp. 1368–1372. doi: 10.1109/ICICT60155.2024.10544502
  20. S. Arshad and M. Khan, “New extension of data encryption standard over 128-bit key for digital images,” Neural Comput. Appl., vol. 33, pp. 13845–13858, 2021, doi: 10.1007/s00521-021-06023-5
  21. C. A. Sari, D. Wahyu Utomo, W. S. Sari, D. Sinaga, and M. Doheir, “An Enhancement of DES, AES Based on Imperceptibility Along with LSB,” in 2022 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 2022, pp. 150–155. doi: 10.1109/iSemantic55962.2022.9920444
  22. A. Bima, C. Irawan, D. A. W. Laksana, A. D. Krismawan, and F. O. Isinkaye, “A text security evaluation based on advanced encryption standard algorithm,” J. Soft Comput. Explor., vol. 4, no. 4, pp. 250–261, 2023, doi: 10.52465/joscex.v4i4.274
  23. N. C. Nelakuditi, N. K. Namburi, J. Sayyad, D. V. Rudraraju, R. Govindan, and P. V. Rao, “Secure File Operations: Using Advanced Encryption Standard for Strong Data Protection,” Int. J. Saf. Secur. Eng., vol. 14, no. 3, pp. 1007–1014, 2024, doi: 10.18280/ijsse.140330
  24. O. Reyad, H. M. Mansour, M. Heshmat, and E. A. Zanaty, “Key-Based Enhancement of Data Encryption Standard for Text Security,” in 2021 National Computing Colleges Conference (NCCC), Taif, Saudi Arabia, 2021, pp. 1–6. doi: 10.1109/NCCC49330.2021.9428818
  25. B. Santhosh, V. Kushmitha, S. Bhat, S. Mondal, and V. Joshitha, “Cryptographic Image Security Using AES-XOR Approach,” in 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL), Bhimdatta, Nepal, 2025, pp. 13–19. doi: 10.1109/ICSADL65848.2025.10933284
  26. D. Ramakrishna and M. Ali Shaik, “A Comprehensive Analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges,” IEEE Access, vol. 13, pp. 11576–11593, 2025, doi: 10.1109/ACCESS.2024.3518533
  27. A. Sevin, “Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices,” Mathematics, vol. 13, no. 5, p. 734, Feb. 2025, doi: 10.3390/math13050734
  28. E. H. Rachmawanto, L. Budi Handoko, C. Umam, C. Jatmoko, and R. R. Ali, “Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication,” in 2022 International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 2022, pp. 71–76. doi: 10.1109/iSemantic55962.2022.9920438
  29. N. Bhatt, “Comparative Analysis of Hybrid Cryptosystems for Secure Image Encryption,” in 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), IEEE, Sep. 2024, pp. 1–7. doi: 10.1109/PKIA62599.2024.10728982
  30. P. Kuppuswamy, S. Q. Y. A. K. Al-Maliki, R. John, M. Haseebuddin, and A. A. S. Meeran, “A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm,” Bull. Electr. Eng. Informatics, vol. 12, no. 2, pp. 1148–1158, Apr. 2023, doi: 10.11591/eei.v12i2.4967
  31. V. Govindarajan, “A Novel System for Managing Encrypted Data Using Searchable Encryption Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 16, no. 3, pp. 22–34, 2025, doi: 10.14569/IJACSA.2025.0160303
  32. L. Zhang and L. Wang, “A hybrid encryption approach for efficient and secure data transmission in IoT devices,” J. Eng. Appl. Sci., vol. 71, no. 1, pp. 1–18, 2024, doi: 10.1186/s44147-024-00459-x
  33. S. Kaganurmath, N. Cholli, and M. R. Anala, “Post-Quantum Lightweight Key Sharing Protocol for Secure MQTT-Based IoT Networks,” vol. 10, pp. 532–545, 2025, doi: 10.21203/rs.3.rs-6382308/v1

Last update:

No citation recorded.

Last update: 2025-05-30 00:12:17

No citation recorded.