{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:26:16Z","timestamp":1775276776282,"version":"3.50.1"},"reference-count":48,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T00:00:00Z","timestamp":1737504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Mersenne prime numbers, expressed in the form (2n \u2212 1), have long captivated researchers due to their unique properties. The presented work aims to develop a symmetric cryptographic algorithm using a novel technique based on the logical properties of Mersenne primes. Existing encryption algorithms exhibit certain challenges, such as scalability and design complexity. The proposed novel modular multiplicative inverse property over Mersenne primes simplifies the encryption\/decryption process. The simplification is achieved by computing the multiplicative inverse using cyclic bit shift operation. The proposed image encryption\/decryption scheme involves a series of exor, complement, bit shift, and modular multiplicative inversion operations. The image is segmented into blocks of 521 bits. Each of these blocks is encrypted using a 521-bit key, ensuring high entropy and low predictability. The inclusion of cyclic bit shifting and XOR operations in the encryption\/decryption process enhances the diffusion properties and resistance against attacks. This approach was experimentally proven to secure the image data while preserving the image structure. The experimental results demonstrate significant improvements in security metrics, including key sensitivity and correlation coefficients, confirming the technique\u2019s effectiveness against cryptographic attacks. Overall, this method offers a scalable and secure solution for encrypting high-resolution digital images without compromising computational efficiency.<\/jats:p>","DOI":"10.3390\/sym17020166","type":"journal-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T11:09:02Z","timestamp":1737544142000},"page":"166","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Technique for Image Encryption Using the Modular Multiplicative Inverse Property of Mersenne Primes"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3599-9971","authenticated-orcid":false,"given":"Shanooja M.","family":"A.","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Federal Institute of Science and Technology (FISAT), APJ Abdul Kalam Technological University (KTU), Angamaly 683577, India"}]},{"given":"Anil Kumar M.","family":"N.","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Federal Institute of Science and Technology (FISAT), APJ Abdul Kalam Technological University (KTU), Angamaly 683577, India"}]}],"member":"1968","published-online":{"date-parts":[[2025,1,22]]},"reference":[{"key":"ref_1","unstructured":"(2022, April 01). Great Internet Mersenne Prime Search (GIMPS). Available online: https:\/\/www.mersenne.org."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s40324-014-0019-4","article-title":"On generalized Mersenne prime","volume":"66","author":"Hoque","year":"2014","journal-title":"SeMA J."},{"key":"ref_3","unstructured":"Kraft, J., and Washington, L. (2018). An Introduction to Number Theory with Cryptography, CRC Press."},{"key":"ref_4","unstructured":"Wojciechowski, J. (2022, March 22). Mersenne Primes, an Introduction and Overview, 2003, Academia.edu. Available online: https:\/\/www.academia.edu\/9995980\/Mersenne_Primes_An_Introduction_and_Overview."},{"key":"ref_5","unstructured":"(2023). Digital Signature Standard (DSS), Federal Information Processing Standards 186-5 (Standard No. FIPS 186-5)."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TCSI.2018.2878598","article-title":"High-speed ECC processor over NIST prime fields applied with Toom\u2013Cook multiplication","volume":"66","author":"Ding","year":"2018","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Alrimeih, H., and Rakhmatov, D. (2014, January 18\u201320). Pipelined modular multiplier supporting multiple standard prime fields. Proceedings of the 2014 IEEE 25th International Conference on Application-Specific Systems, Architectures and Processors, Zurich, Switzerland.","DOI":"10.1109\/ASAP.2014.6868630"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1080\/24699322.2019.1649070","article-title":"Development of modified RSA algorithm using fixed Mersenne prime numbers for medical ultrasound imaging instrumentation","volume":"24","author":"Shin","year":"2019","journal-title":"Comput. Assist. Surg."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Aggarwal, D., Joux, A., Prakash, A., and Santha, M. (2018, January 19\u201323). A new public-key cryptosystem via Mersenne numbers. Proceedings of the Advances in Cryptology\u2013CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-319-96878-0_16"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Yang, X.B., Boussakta, S., Al-Gailani, M., and Ngadiran, R. (2010, January 21\u201323). A new development of cryptosystem using New Mersenne Number Transform. Proceedings of the 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010), Newcastle Upon Tyne, UK.","DOI":"10.1109\/CSNDSP16145.2010.5580343"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"80395","DOI":"10.1109\/ACCESS.2020.2989820","article-title":"HMNT: Hash function based on new Mersenne number transform","volume":"8","author":"Maetouq","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1016\/j.procs.2018.08.042","article-title":"Use of symmetric Hadamard and Mersenne matrices in digital image processing","volume":"126","author":"Vostrikov","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Masood, F., Boulila, W., Ahmad, J., Sankar, S., Rubaiee, S., and Buchanan, W.J. (2020). A novel privacy approach of digital aerial images based on Mersenne twister method with DNA genetic encoding and chaos. Remote Sens., 12.","DOI":"10.3390\/rs12111893"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"106249","DOI":"10.1109\/ACCESS.2023.3319335","article-title":"Anteater: When Arnold\u2019s cat meets Langton\u2019s ant to encrypt images","volume":"11","author":"Alexan","year":"2023","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"102718","DOI":"10.1109\/ACCESS.2024.3433499","article-title":"Fibonacci Q-Matrix, Hyperchaos, and Galois Field (28) for augmented medical image encryption","volume":"12","author":"Alexan","year":"2024","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","article-title":"An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations","volume":"52","author":"Chai","year":"2017","journal-title":"Signal Process. Image Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sigpro.2018.02.007","article-title":"An image encryption algorithm based on chaotic system and compressive sensing","volume":"148","author":"Chai","year":"2018","journal-title":"Signal Process."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"106178","DOI":"10.1016\/j.optlaseng.2020.106178","article-title":"An effective image encryption algorithm based on compressive sensing and 2D-SLIM","volume":"134","author":"Xu","year":"2020","journal-title":"Opt. Lasers Eng."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","article-title":"A comprehensive review on image encryption techniques","volume":"27","author":"Kaur","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_20","unstructured":"Crandall, R., and Pomerance, C. (2005). \u201cPrimes!\u201d Prime Numbers: A Computational Perspective, Springer."},{"key":"ref_21","first-page":"100","article-title":"On new identities for Mersenne numbers","volume":"18","author":"Goy","year":"2018","journal-title":"Appl. Math. E-Notes"},{"key":"ref_22","first-page":"15","article-title":"Application of new classes of Mersenne primes for fast modular reduction for large-integer multiplication","volume":"1","author":"Sreehari","year":"2012","journal-title":"Int. J. Cyber-Secur. Digit. Forensics (IJCSDF)"},{"key":"ref_23","first-page":"16","article-title":"A Technique to Speed up the Modular Multiplicative Inversion over GF(P) Applicable to Elliptic Curve Cryptography","volume":"47","author":"Sridhar","year":"2012","journal-title":"Int. J. Comput. Appl."},{"key":"ref_24","first-page":"425","article-title":"Efficient design and performance analysis of a hardware right-shift binary modular inversion algorithm in GF(P)","volume":"17","author":"Choi","year":"2017","journal-title":"J. Semicond. Technol. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Lu, J., and Li, S. (2021, January 22\u201328). A multibit left-shift modular inverse hardware algorithm and its implementation. Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea.","DOI":"10.1109\/ISCAS51556.2021.9401795"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Choi, P., Kong, J.-T., and Kim, D.K. (2015, January 2\u20135). Analysis of hardware modular inversion modules for elliptic curve cryptography. Proceedings of the 2015 International SoC Design Conference (ISOCC), Gyeongju, Republic of Korea.","DOI":"10.1109\/ISOCC.2015.7401713"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"032192","DOI":"10.1186\/1687-3963-2006-032192","article-title":"Modular inverse algorithms without multiplications for cryptographic applications","volume":"2006","author":"Hars","year":"2006","journal-title":"EURASIP J. Embed. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/s13319-017-0148-5","article-title":"A survey of image encryption algorithms","volume":"8","author":"Kumari","year":"2017","journal-title":"3D Res."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","article-title":"Fast image encryption algorithm based on parallel computing system","volume":"486","author":"Wang","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Feng, W., Yang, J., Zhao, X., Qin, Z., Zhang, J., Zhu, Z., Wen, H., and Qian, K. (2024). A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps. Mathematics, 12.","DOI":"10.3390\/math12243917"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"123190","DOI":"10.1016\/j.eswa.2024.123190","article-title":"Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption","volume":"246","author":"Feng","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TCSI.2024.3439869","article-title":"Memristive tabu learning neuron generated multi-wing attractor with FPGA implementation and application in encryption","volume":"72","author":"Deng","year":"2024","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Feng, W., Zhao, X., Zhang, J., Qin, Z., Zhang, J., and He, Y. (2022). Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform. Mathematics, 10.","DOI":"10.3390\/math10152751"},{"key":"ref_34","first-page":"101612","article-title":"Cryptanalyzing an Image Cipher Using Multiple Chaos and DNA Operations","volume":"35","author":"Wen","year":"2023","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"145459","DOI":"10.1109\/ACCESS.2021.3123571","article-title":"Cryptanalysis and improvement of the image encryption scheme based on Feistel network and dynamic DNA encoding","volume":"9","author":"Feng","year":"2021","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"12584","DOI":"10.1109\/ACCESS.2019.2893760","article-title":"Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map","volume":"7","author":"Feng","year":"2019","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"9907","DOI":"10.1007\/s11042-016-3585-x","article-title":"A new chaos-based image encryption algorithm with dynamic key selection mechanisms","volume":"76","author":"Chai","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s11071-013-1070-x","article-title":"A novel image encryption scheme based on Brownian motion and PWLCM chaotic system","volume":"75","author":"Wang","year":"2014","journal-title":"Nonlinear Dyn."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Shaista, M., Parsa, S., Parah, S.A., Ullah, H., Hijji, M., and Muhammad, K. (2022). Adaptive color image encryption scheme based on multiple distinct chaotic maps and DNA computing. Mathematics, 10.","DOI":"10.3390\/math10122004"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Li, N., Xie, S., and Zhang, J. (2022). A color image encryption algorithm based on double fractional order chaotic neural network and convolution operation. Entropy, 24.","DOI":"10.3390\/e24070933"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.matcom.2020.05.016","article-title":"An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing","volume":"177","author":"Alghafis","year":"2020","journal-title":"Math. Comput. Simul."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Zhu, S., Zhu, C., and Wang, W. (2018). A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy, 20.","DOI":"10.3390\/e20090716"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","article-title":"Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing","volume":"62","author":"Zhou","year":"2014","journal-title":"Opt. Laser Technol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1002\/sec.1458","article-title":"A secure image encryption algorithm based on chaotic maps and SHA-3","volume":"9","author":"Ye","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Younas, I., and Khan, M. (2018). A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy, 20.","DOI":"10.3390\/e20120913"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Alexan, W., Chen, Y.-L., Por, L.Y., and Gabr, M. (2023). Hyperchaotic maps and the single neuron model: A novel framework for chaos-based image encryption. Symmetry, 15.","DOI":"10.20944\/preprints202304.0148.v1"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","article-title":"Chaotic image encryption algorithm using wave-line permutation and block diffusion","volume":"83","author":"Ye","year":"2016","journal-title":"Nonlinear Dyn."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"14764","DOI":"10.1109\/ACCESS.2023.3341103","article-title":"A new image encryption scheme based on the hybridization of Lorenz Chaotic map and Fibonacci Q-matrix","volume":"12","author":"Mohamed","year":"2023","journal-title":"IEEE Access"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/2\/166\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:34:00Z","timestamp":1759919640000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/2\/166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,22]]},"references-count":48,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["sym17020166"],"URL":"https:\/\/doi.org\/10.3390\/sym17020166","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,22]]}}}