Design and implementation of a Chaotic Cipher block chaining mode for image encryption

Author(s):  
Ta Thi Kim Hue ◽  
Thang Manh Hoang ◽  
Safwan Al Assad
2010 ◽  
Vol 129-131 ◽  
pp. 881-885
Author(s):  
Bin Wang ◽  
Ju Long Lan ◽  
Yun Fei Guo ◽  
Yuan Yang Zhang

Block ciphers play an essential role in securing the wireless communications. In this paper, an FPGA implementation of the new block cipher SMS4 is presented. The SMS4 Intellectual Property (IP) core includes a non-pipelined encryption/decryption data path with an on-the-fly key scheduler and supports both the Electronic Code Book (ECB) and Cipher Block Chaining (CBC) operation modes. Our result shows that the SMS4 IP core can achieve a high throughput using only a relatively small area. It is well suitable for the field of area restrained condition.


In this article, a Modified Pseudo Hadamard Transformation (MPHT) and non-Chaotic substitution based image encryption scheme has been proposed. Due to intrinsic properties such as, strong redundancy and correlation between the adjacent pixels, images are more vulnerable to cyber-attacks. In the proposed technique, the redundancy and correlation have been effectively reduced by pixel position transformation using MPHT and pixel value variation using non chaotic substitution, providing two stage security in encryption for secrete images. An average 99.6089% of Number of Pixel Changing Rate (NPCR) and 33.4328% of Unified Average pixel Changing Intensity (UACI) are obtained for a set of standard test images compared to more popular existing techniques


2020 ◽  
Vol 515 ◽  
pp. 191-217 ◽  
Author(s):  
Nestor Tsafack ◽  
Jacques Kengne ◽  
Bassem Abd-El-Atty ◽  
Abdullah M. Iliyasu ◽  
Kaoru Hirota ◽  
...  

Author(s):  
Ibrahim S. I. Abuhaiba ◽  
Hanan M. Abuthraya ◽  
Huda B. Hubboub ◽  
Ruba A. Salamah

Author(s):  
Mazleena Salleh ◽  
Subariah Ibrahim ◽  
Ismail Fauzi Isnin

Imej digunakan dalam pelbagai bidang seperti perubatan, ketenteraan, sains, kejuruteraan, kesenian, hiburan, pengiklanan, pendidikan dan latihan. Dengan bertambahnya penggunaan teknik digital bagi penghantaran dan penyimpanan imej, isu asas untuk melindungi kerahsiaan, keutuhan dan kesahihan imej perlu dititikberatkan. Kertas–kerja ini membincangkan algoritma alternatif penyulitan kekunci simetri, iaitu Secure Image Encryption (SIP), bagi melindungi keselamatan imej, Algoritma ini direka bentuk berdasarkan teknik chaos. SIP mengolah piksel, bukannya bit sebagaimana yang dilakukan oleh algoritma penyulitan yang popular seperti Triple–DES dan IDEA. Pada umumnya, SIP terdiri daripada tiga komponen: (1) fungsi transformasi mendatar–menegak (HVT); (2) fungsi anjakan (S), dan (3) fungsi skala kelabu (GS). Fungsi HVT adalah berdasarkan pemetaan chaos yang digunakan dalam algoritma pemetaan Baker. Fungsi GS pula melanjutkan algoritma ini ke tiga–dimensi dengan dimensi ketiga merujuk kepada aras skala kelabu piksel. Algoritma ini menyokong dua mod operasi, iaitu Electronic Code Book (ECB) dan Cipher Block Chaining (CBC). Analisis yang dilakukan terhadap SIP menunjukkan aras keselamatan masih memuaskan walaupun kekunci yang digunakan terdiri daripada kekunci lemah jika digunakan dalam algoritma pemetaan Baker. Kata kunci: Kerahsiaan, chaos, kriptografi, penyulitan imej Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, integrity as well as the authenticity of images has become a major concern. This paper discusses an alternative symmetric–key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. Unlike other popular encryption algorithms such as Triple–DES and IDEA, SIP manipulates pixels rather than bits. Generally, SIP comprises of three main components: (1) horizontal–vertical transformation function (HVT); (2) shift function (S), and (3) gray scale function (GS). HVT function is based on a two–dimensional chaotic map that utilized Baker´s map algorithm. GS function extends the algorithm to three–dimension, whereby, the third dimension refers to the level of the gray–scale of a pixel. The algorithm supports two modes of operation namely Electronic Code Book (ECB) and Cipher Block Chaining (CBC). From the analysis done, SIP manage to encrypt images of various sizes even with the usage of weak keys that exist in Baker´s map encryption algorithm. Key words: Confidentiality, chaos, cryptography, image encryption


Sign in / Sign up

Export Citation Format

Share Document