ETRI Journal | |
Efficient Image Chaotic Encryption Algorithm with No Propagation Error | |
关键词: perturbation technique; NIST; Chaos-based cryptosystem; | |
Others : 1185900 DOI : 10.4218/etrij.10.1510.0063 |
|
【 摘 要 】
Many chaos-based encryption methods have been presented and discussed in the last two decades, but very few of them are suitable to secure transmission on noisy channels or respect the standard of the National Institute of Standards and Technology (NIST). This paper tackles the problem and presents a novel chaos-based cryptosystem for secure transmitted images. The proposed cryptosystem overcomes the drawbacks of existing chaotic algorithms such as the Socek, Xiang, Yang, and Wong methods. It takes advantage of the increasingly complex behavior of perturbed chaotic signals. The perturbing orbit technique improves the dynamic statistical properties of generated chaotic sequences, permits the proposed algorithm reaching higher performance, and avoids the problem of error propagation. Finally, many standard tools, such as NIST tests, are used to quantify the security level of the proposed cryptosystem, and experimental results prove that the suggested cryptosystem has a high security level, lower correlation coefficients, and improved entropy.
【 授权许可】
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
20150520115517214.pdf | 1144KB | download |
【 参考文献 】
- [1]A. Riaz and M. Ali, "Chaotic Communications, Their Applications and Advantages over Traditional Methods of Communication," IEEE Commun. Syst., Networks Digital Signal Process., July 2008, pp. 21-24.
- [2]G. Millérioux, J.M. Amigo, and J. Daafouz, "A Connection between Chaotic and Conventional Cryptography," IEEE Trans. Circuits Syst., vol. 55, no. 6, July 2008, pp. 1695-1703.
- [3]L. Kocarev, "Chaos Based Cryptography: A Brief Overview," IEEE Trans. Circuits Syst. Mag., vol. 1, no. 3, 2001, pp. 6-21.
- [4]G. Alvarez and S. Li, "Some Basic Cryptographic Requirements for Chaos Based Cryptosystems," Int. J. Bifurcation Chaos, vol. 16, no. 8, 2006, pp. 2129-2151.
- [5]T. Yang, C.W. Wu, and L.O. Chua, "Cryptography Based on Chaotic Systems," IEEE Trans. Circuits Syst., vol. 44, no. 5, Feb. 1997, pp. 469-472.
- [6]G. Jakimoski and L. Kocarev, "Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps," IEEE Trans. Circuits Syst., vol. 48, no. 2, Feb. 2001, pp. 163-169.
- [7]D. Socek et al., "Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption," IEEE Security Privacy for Emerging Areas in Commun. Networks, 2005, pp. 406-407.
- [8]T. Xiang et al., "A Novel Block Cryptosystem Based on Iterating a Chaotic Map," Phys. Lett. A, vol. 349, 2006, pp. 109-115.
- [9]D. Yang et al., "A Novel Block Cryptosystem Based on Iterating Map with Output Feed-Back," Chaos, Solitons and Fractals, vol. 41, 2009, pp. 505-510.
- [10]S. El Assad and C. Vladeanu, "Digital Chaotic Codec for DS-CDMA Communication Systems," Lebanese Sci. J., vol. 7, no. 2, 2006, pp. 55-71.
- [11]L. Kocarev et al., "Discrete Chaos I: Theory," IEEE Trans. Circuits Syst. Mag., vol. 53, no. 6, June 2006, pp.1300-1309.
- [12]A. Awad et al., "Comparative Study of 1-D Chaotic Generators for Digital Data Encryption," IAENG Int. J. Comput. Sci., vol. 35, no. 4, 2008, pp. 483-488.
- [13]D. Xiao, X. Liao, and P. Wei, "Analysis and Improvement of a Chaos-Based Image Encryption Algorithm," Chaos, Solitons & Fractals, vol. 40, no. 5, 2009, pp. 2191-2199.
- [14]M. Ali B. Younes and A. Jantan, "An Image Encryption Approach Using a Combination of Permutation Techniques Followed by Encryption," IAENG Int. J. Comput. Sci. Network Security, vol. 8, no. 4, 2008, pp. 191-197.
- [15]S.G. Lian, J. Sun, and Z. Wang, "A Block Cipher Based on a Suitable Use of Chaotic Standard Map," Chaos, Solitons and Fractals, vol. 26, no. 1, 2005, pp. 117-129.
- [16]K.W. Wong, B.S.H. Kwok, and W.S. Law, "A Fast Image Encryption Scheme Based on Chaotic Standard Map," Phys. Lett. A, vol. 372, no. 15, 2008, pp. 2645-2652.
- [17]Z. Shi and R. Lee, "Bit Permutation Instructions for Accelerating Software Cryptography," IEEE Application-Specific Syst. Architectures Processors, 2000, pp. 138-148.
- [18]R.B. Lee, Z. Shi, and X. Yang, "Efficient Permutation Instructions for Fast Software Cryptography," IEEE Micro, vol. 21, no. 6, 2001, pp. 56-69.
- [19]Y. Hilewitz, Z.J. Shi, and R.B. Lee, "Comparing Fast Implementations of Bit Permutation Instruction," IEEE Signals Syst., Comput., vol. 2, 2004, pp. 1856-1863.
- [20]A. Awad, S.E. Assad, and D. Carragata, "A Robust Cryptosystem Based Chaos for Secure Data," IEEE Int. Symp. Image/Video Commun. over Fixed Mobile Networks, Bilbao, Spain 2008.
- [21]S. Tao, W. Ruli, and Y. Yixun, "Perturbance Based Algorithm to Expand Cycle Length of Chaotic Key Stream," IEEE Electron. Lett., vol. 34, no. 9, 1998, pp. 873-874.
- [22]S. Li et al., "On the Security of a Chaotic Encryption Scheme: Problems with Computerized Chaos in Finite Computing Precision," Comput. Phys. Commun., vol. 153, no. 1, 2003 pp. 52-58.
- [23]A. Rukin et al., "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications," NIST Special Publication, pp. 800-822 (with revisions dated May 15, 2001).
- [24]M. Dworkin, "Recommendation for Block Cipher Modes of Operation. Methods and Techniques. Computers Security," Computer Security Division, Nat. Inst. Standards Technol., Gaithersburg, MD 20899-8930, 2001.