Use of chaos in key schedules for a symmetrical encryption algorithm without data loss

被引:0
作者
David Gonzalez-Ramirez, Marlon [1 ]
Vega-Alvarado, Eduardo [1 ]
Morales-Rangel, Arturo [2 ]
机构
[1] Inst Politecn Nacl, Ctr Innovac & Desarrollo Tecnol Computo, Ciudad De Mexico, Mexico
[2] BinaryCore, San Francisco, CA USA
来源
NEXO REVISTA CIENTIFICA | 2023年 / 36卷 / 04期
关键词
Image encryption; chaos; elliptic curve; SPN;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This research presents the construction of a symmetric encryption algorithm for images of 512x512 pixels, in color and grayscale without loss of information and without compression, in BMP format. This algorithm consists of 15 rounds with S-box swapping, permutations, X-OR operations, and image size keys. The logistic map operation was used for the generation of S-boxes and to build a schedule of keys of the size of the image, the equations of E. Lorenz, transcendental numbers and the elliptic curve were used. To measure the strength of the encrypted result, the entropy of the information and the goodness test chi boolean AND 2 were used, obtaining favorable results and close to similar algorithms.
引用
收藏
页码:470 / 481
页数:12
相关论文
共 20 条
[1]   HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system [J].
Ahuja, Bharti ;
Doriya, Rajesh ;
Salunke, Sharad ;
Hashmi, Mohammad Farukh ;
Gupta, Aditya ;
Bokde, Neeraj Dhanraj .
CONNECTION SCIENCE, 2023, 35 (01)
[2]  
Al-Kadei F. H. M., 2020, Indonesian Journal of Electrical Engineering and Computer Science, V18, P961, DOI [10.11591/ijeecs.v18.i2.pp961-969, DOI 10.11591/IJEECS.V18.I2.PP961-969]
[3]  
Alanazi A. S., A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system, DOI [10.1007/s11042-023-14964-3, DOI 10.1007/S11042-023-14964-3]
[4]  
bagn archivos gob, Vista de Manual de digitalizacion de documentos
[5]  
Budiman M. A., 2020, Data Science: Journal of Computing and Applied Informatics, V4, P89, DOI [10.32734/JOCAI.V4.I2-4173, DOI 10.32734/JOCAI.V4.I2-4173]
[6]   Differential attacks: using alternative operations [J].
Civino, Roberto ;
Blondeau, Celine ;
Sala, Massimiliano .
DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (2-3) :225-247
[7]   Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification [J].
Davies, Simon R. ;
Macfarlane, Richard ;
Buchanan, William J. .
ENTROPY, 2022, 24 (10)
[8]   An efficient image encryption technique based on two-level security for internet of things [J].
Gupta, Manish ;
Singh, Vibhav Prakash ;
Gupta, Kamlesh Kumar ;
Shukla, Piyush Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (04) :5091-5111
[9]   A Novel Design of Cryptographic SP-Network Based on Gold Sequences and Chaotic Logistic Tent System [J].
Khan, Muhammad Fahad ;
Ahmed, Adeel ;
Saleem, Khalid ;
Shah, Tariq .
IEEE ACCESS, 2019, 7 :84980-84991
[10]  
Krishnan Raghupathy B., 2019, International Journal on Emerging Technologies, V10, P64