{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T03:10:20Z","timestamp":1763867420766,"version":"3.41.2"},"reference-count":43,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T00:00:00Z","timestamp":1736726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>This paper introduces a new encryption method aimed at improving the cryptography process through the use of splitting radix Fourier Transform technique called Split-Radix Fast Fourier Transforms (SRFFT). The proposed method is based on splitting the FFT radix-2 and radix-4 algorithms to achieve improved information assurance by SRFFT two phases. The first phase applies direct computation of SRFFT algorithm on input plaintext to produce a ciphertext and the second phase applies the reversing SRFFT algorithm to decipher. Several types of cryptoanalysis attacks such as brute-forcing, autocorrelation and dictionary attacks are comparatively evaluated and the end result of SRFFT evaluation indicates that SRFFT is preferable in many practical encryption applications since SRFFT complexity increases with the range of split-radix computations thus eliminating the potential chances of cryptanalysis attacks.<\/jats:p>","DOI":"10.3389\/fcomp.2024.1479592","type":"journal-article","created":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T06:11:01Z","timestamp":1736748661000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm"],"prefix":"10.3389","volume":"6","author":[{"given":"Abdulle Hassan","family":"Mohamud","sequence":"first","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2025,1,13]]},"reference":[{"key":"B1","first-page":"308","article-title":"Robust encryption","volume":"2018","author":"Abdalla","year":"2018","journal-title":"J Cryptol"},{"key":"B2","doi-asserted-by":"publisher","first-page":"e042008","DOI":"10.1088\/1742-6596\/1294\/4\/042008","article-title":"McLaurin series as a new technique to improve encryption process","volume":"1294","author":"Al-din Abed","year":"2019","journal-title":"J Phys Conf Ser."},{"key":"B3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s00145-024-09492-8","article-title":"The COLM authenticated encryption scheme","volume":"37","author":"Andreeva","year":"2024","journal-title":"J Cryptol."},{"key":"B4","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11071-016-3046-0","article-title":"Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption","volume":"87","author":"Belazi","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"B5","first-page":"668","author":"Cash","year":"2015","journal-title":"Leakage-Abuse Attacks Against Searchable Encryption"},{"key":"B6","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/s10207-020-00524-5","article-title":"Password-authenticated searchable encryption","volume":"20","author":"Chen","year":"2021","journal-title":"Int J Inform Secur."},{"key":"B7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-14712-8_3","volume":"3","author":"Chillotti","year":"2019"},{"key":"B8","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","article-title":"An algorithm for the machine computation of complex Fourier series","volume":"19","author":"Cooley","year":"1965","journal-title":"Math. Comput."},{"key":"B9","first-page":"103","article-title":"Numerical analysis of parallel modular exponentiation for RSA using interconnection networks","volume-title":"ScienceAsia","author":"Damrudi","year":"2013"},{"key":"B10","first-page":"116","volume-title":"Digital Signal Processing, 2nd edn","author":"Diniz","year":"2010"},{"key":"B11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00145-021-09398-9","article-title":"Lightweight authenticated encryption and hashing","volume":"34","author":"Dobraunig","year":"2020","journal-title":"J Cryptol"},{"key":"B12","doi-asserted-by":"publisher","first-page":"e202200727","DOI":"10.1002\/ange.202200727","article-title":"ATP-induced emergent circularly polarized luminescence and encryption","volume":"61","author":"Fan","year":"2022","journal-title":"J Cryptol"},{"key":"B13","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","article-title":"fast and efficient multiple images encryption based on single-channel encryption and chaotic system","volume":"7","author":"Gao","year":"2022","journal-title":"Nonlinear Dyn."},{"key":"B14","doi-asserted-by":"publisher","first-page":"19129","DOI":"10.1007\/s11042-023-16163-6","article-title":"Image encryption-compression method via encryption based sparse decomposition","volume":"6","author":"Ghafari","year":"2024","journal-title":"Multimed Tools Appl."},{"key":"B15","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1007\/s12652-019-01493-x","article-title":"An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps","volume":"11","author":"Gupta","year":"2020","journal-title":"J Ambient Intell Humaniz Comput."},{"key":"B16","doi-asserted-by":"publisher","first-page":"6902","DOI":"10.1002\/ange.201800119","article-title":"Reversible response of luminescent terbium(III)-nanocellulose hydrogels to anions for latent fingerprint detection and encryption","volume":"130","author":"Hai","year":"2018","journal-title":"Stimuli-Responsive Mater"},{"key":"B17","doi-asserted-by":"publisher","first-page":"114","DOI":"10.29304\/jqcm.2021.13.3.851","article-title":"Cryptography model based on the principles of the geometric series","volume":"13","author":"Hatem Majeed","year":"2021","journal-title":"J Al-Qadisiyah Comput Sci Math."},{"key":"B18","doi-asserted-by":"publisher","first-page":"18763","DOI":"10.1021\/jacs.0c09904","article-title":"Highly emissive perylene diimide-based metallacages and their host\u2013guest chemistry for information encryption","volume":"4","author":"Hou","year":"2020","journal-title":"J Am Chem Soc."},{"key":"B19","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/ISCAS45731.2020.9180524","article-title":"Enhancing security of double random phase encryption schemes based on discrete fractional Fourier transforms","volume":"2020","author":"Hsue","year":"2020","journal-title":"2020 IEEE Int Symp Circuit Syst."},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.cs\/0306032","author":"Hughes","year":"2002","journal-title":"Length-Based Attacks for Certain Group Based Encryption Rewriting Systems"},{"key":"B21","doi-asserted-by":"publisher","first-page":"10551","DOI":"10.1007\/s11042-023-15674-6","article-title":"Image encryption using Queen","volume":"83","author":"Iqbal","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"B22","first-page":"965","volume-title":"Dynamic Searchable Symmetric Encryption. CCS'12, October 16\u201318","author":"Kamara","year":"2012"},{"key":"B23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","article-title":"comprehensive review on image encryption techniques","volume":"27","author":"Kaur","year":"2020","journal-title":"Archiv Comput Methods Eng."},{"key":"B24","first-page":"113","volume-title":"Can Homomorphic Encryption Be Practical? CCSW'11, October 21","author":"Lauter","year":"2011"},{"key":"B25","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","article-title":"An image encryption scheme based on chaotic tent map","volume":"87","author":"Li","year":"2017","journal-title":"Nonlinear Dyn"},{"key":"B26","doi-asserted-by":"publisher","first-page":"2428","DOI":"10.1002\/ange.202011553","article-title":"pH-responsive torpedo-like persistent luminescence nanoparticles for autofluorescence-free biosensing and high-level information encryption","volume":"133","author":"Li","year":"2020","journal-title":"Angewandte Chemie"},{"key":"B27","first-page":"400","article-title":"A review of encryption and decryption of text using the AES algorithm","volume":"10","author":"Manikandaprabhu","year":"2024","journal-title":"Int J Sci Res Eng Trends."},{"key":"B28","doi-asserted-by":"publisher","first-page":"131","DOI":"10.5121\/ijcis.2012.2312","article-title":"Image encryption using Fibonacci-Lucas transformation","volume":"2","author":"Mishra","year":"2012","journal-title":"Int J Cryptogr Inform Secur."},{"first-page":"36","year":"2020","author":"Noaman","key":"B29"},{"first-page":"3","year":"2022","author":"Oleksandr","key":"B30"},{"key":"B31","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11071-018-4056-x","article-title":"Brief review on application of nonlinear dynamics in image encryption","volume":"92","author":"\u00d6zkaynak","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"B32","first-page":"518","volume-title":"Digital Signal Processing, 4th edn","author":"Proakis","year":"2008"},{"key":"B33","first-page":"965","volume-title":"Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. CCS'18, October 15\u201319","author":"Sakzad","year":"2018"},{"key":"B34","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1007\/s11045-018-0589-x","article-title":"Chaos based efficient selective image encryption","volume":"18","author":"Sher","year":"2019","journal-title":"Multidim Syst Sign Process."},{"key":"B35","doi-asserted-by":"publisher","first-page":"e202214695","DOI":"10.1002\/anie.202214695","article-title":"Dendritic quaternary-encoded oligourethanes for data encryption","volume":"62","author":"Shi","year":"2023","journal-title":"Angew Chem Int Ed"},{"key":"B36","doi-asserted-by":"publisher","first-page":"23791","DOI":"10.1002\/anie.202109532","article-title":"Energy migration control of multimodal emissions in an Er3+-doped nanostructure for information encryption and deep-learning decoding","volume":"60","author":"Song","year":"2021","journal-title":"Angew Chem Int Ed Engl"},{"key":"B37","doi-asserted-by":"publisher","first-page":"2","DOI":"10.21203\/rs.3.rs-3565782\/v1","article-title":"Robust approach to secure data encryption: AES RSA hybrid with Kernel key protection","volume":"1","author":"Srivastava","year":"2023","journal-title":"Res Sq"},{"key":"B38","first-page":"103","volume-title":"Cryptography Network Security Principles and Practice, Global Edition, 7th edn","author":"Stallings","year":"2018"},{"key":"B39","first-page":"92","volume-title":"Digital Signal Processing Fundamentals and Applications, 1st edn","author":"Tan","year":"2008"},{"key":"B40","doi-asserted-by":"publisher","first-page":"35871","DOI":"10.1021\/acsami.9b10870","article-title":"Advanced dynamic photoluminescent material for dynamic anticounterfeiting and encryption","volume":"2019","author":"Wang","year":"2019","journal-title":"ACS Appl Mater Interfaces."},{"key":"B41","doi-asserted-by":"publisher","first-page":"10551","DOI":"10.1002\/smll.202206709","article-title":"Multiple stimuli-response polychromatic carbon dots for advanced information encryption and safety","volume":"19","author":"Wu","year":"2023","journal-title":"Small"},{"key":"B42","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","article-title":"An efficient pixel-level chaotic image encryption algorithm","volume":"94","author":"Ye","year":"2018","journal-title":"Nonlinear Dyn."},{"key":"B43","doi-asserted-by":"publisher","first-page":"23373","DOI":"10.1002\/anie.202110088","article-title":"Crystalline-phase-recognition-induced domino phase transition and luminescence switching for advanced information encryption","volume":"60","author":"Zhang","year":"2021","journal-title":"Mol Recogn Hot Pap"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1479592\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T06:11:08Z","timestamp":1736748668000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2024.1479592\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,13]]},"references-count":43,"alternative-id":["10.3389\/fcomp.2024.1479592"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2024.1479592","relation":{},"ISSN":["2624-9898"],"issn-type":[{"type":"electronic","value":"2624-9898"}],"subject":[],"published":{"date-parts":[[2025,1,13]]},"article-number":"1479592"}}