A secure and fast chaotic encryption algorithm using the true accuracy of the computer
Abstract
A secure and fast cryptosystem for image encryption based on chaotic generators is proposed. The principle of the method is to use the permutation-diffusion scheme to create computationally secure encryption primitives using the true accuracy of the computer. In the permutation step, integer sequences obtained by the sorting of the solutions of chaotic Logistic map by descending order is used as the permutation key to shuffle the whole image. This stage substantially reduces the correlation between neighboring pixels. After, in order to increase the entropy of encrypted image, the iteration of the chaotic Skew Tent map is applied, with an exclusive-or scheme, to change the value of the entire pixel. Moreover, to further enhance the security of the cryptosystem, the keystream used in diffusion process is updated for each pixel and the computed encrypted pixel values depends on both the previously encrypted pixels and the random keystream. We proved that the cipher sequence of the algorithm is random and truly random by applying the NIST tests batteries andReferences
H. Dobbertin, V. Rijmen and A.Sowa (2005). Advanced Encryption Standard-AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, Lecture Notes in Computer Science 3373.
F. Riaz, et al. (2012). Enhanced image encryption techniques using modified advanced encryption standard. Communications in Computer and Information Science. 281, 385-396.
S. Dey (2012). SD-AEI: An advanced encryption technique for images. In Proceedings of Digital Information Processing and Communications, Second International Conference, Lithuania, 68-73.
J. S. A. Eyebe Fouda, et al. (2014). A fast chaotic block cipher for image encryption. Communications in nonlinear science and numerical simulations. 19 (3), 578-588.
S. Li, et al. (2007). On the design of perceptual MPEG-video encryption algorithms. In: IEEE Transactions on Circuits and Systems for Video Technology, 214-223.
S. Mohammad, S. Mirzakuchaki (2012). A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal processing. 92(5), 1202-1215.
A. A. Abd El-Latif, et al. (2012). Digital image encryption scheme based on multiple chaotic systems. Sensing and Imaging, An international journal on continuing subsurface sensing technologies and applications. 56(2), 67-88.
C. Shannon (1949). Communication theory of secrecy systems. Bell System Technical Journal. 28, 656-715.
M. Demba and O. M. Abu Zaid (2013). A Proposed Confusion Algorithm Based on Chen’s Chaotic System for Securing Colored Images. International Journal of Signal Processing Systems. 1(2), 296-301.
J-Y. Wang, G. Chen (2015). Design of a Chaos-Based Digital Image Encryption Algorithm in Time Domain. In: IEEE International Conference on Computational Intelligence and Communication Technology (CICT), 26-28.
S. Li, et al. (2008). A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication. 23, 212-223.
S. Sam, P. Devaraj and R. S. Bhuvaneswaran (2012). A novel image cipher based on a mixed transformed logistic maps. Multimedia tools and applications, 56 (2), 315-330.
X. Di, L. Xiaofeng and W. Pengcheng (2009). Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons and Fractals. 40 (5), 2191-2199.
A. A. Abd El-Latif, L. Li and X. Niu (2014). A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimedia tools and applications. 70 (3), 1559-1584.
P. Jagadeesh, P. Nagabhushan and R. Pradeep Kumar (2012). A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction. International Journal of
Computer Application. 78 (4), DOI: 10.5120/13481-1181.
G. Alvarez, S. Li (2009). Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul. 4 (11), 3743-3749.
R. Rhouma, E. Solak and S. Belghith (2010). Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul. 15 (7), 1887-1892.
C. Li, D. Arroyo and K. Lo (2010). Breaking a chaotic cryptographic scheme based on composition maps. International Journal of Bifurcation and Chaos. 20, 2561-2568.
R. Rhouma and S. Belghith (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A. 372 (38), 5973-5978.
E. Solak,et al. (2010). Cryptanalysis of Fridrich’s chaotic image encryption. International Journal of Bifurcation and Chaos. 20 (5), 1405-14013.
C. Zhu, C. Liao and X. Deng (2013). Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dynanics. 71(1), 25-34.
R. Guesmi, et al. (2014). A novel design of Chaos based S-Boxes using genetic algorithm techniques. In: IEEE 11th International Conference on Computer Systems and Applications. 678-684.
X. Wang and Q. Wang (2014). A Novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dynanics. 75 (3), 567-576.
Y. Wang, et al. (2015). A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dynamics. 81 (1), 151-168.
Y. Wang, et al. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing. 1 (1), 514-522.
A. Gonzalo, L. Shujun (2006). Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos. 16, 21-29.
Q. Zhang, L. Guo and X. Wei (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling. 52 (11-12), 2028-2035.
L. Billings and E. Bollt (2001). Probability density functions of some skew tent maps. Chaos, Solitons and Fractals. 12 (2), 365-376.
A. Rukhin, et al. (2010). A statistical test suite for the validation of random number generators and pseudo-random number generators for cryptographic applications,” NIST Special Revised Publication 800-22, April 2010.
Y. Wang, et al. (2010). A new chaos-based fast image encryption algorithm. Applied Soft Computing. 11 (1), 514-522.
C. Fu, et al. (2012). A chaos-based digital image encryption with an improved permutation strategy. Optic Express. 20 (3), 2363-2378.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika