An enhanced chaotic key-based RC5 block cipher adapted to image encryption

被引:20
作者
Faragallah, Osama S. [1 ]
机构
[1] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
关键词
RC5; enhanced RC5 (ERC5); chaos; security analysis; CRYPTANALYSIS; ALGORITHM;
D O I
10.1080/00207217.2011.651689
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real-time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo-random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.
引用
收藏
页码:925 / 943
页数:19
相关论文
共 50 条
[21]   An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications [J].
Faragallah, Osama S. .
INFORMATION SECURITY JOURNAL, 2011, 20 (03) :135-147
[22]   A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5 [J].
Alexan, Wassim ;
Youssef, Mohamed ;
Hussein, Hisham H. ;
Ahmed, Karim K. ;
Hosny, Khalid M. ;
Fathy, Abdallah ;
Mansour, Marvy Badr Monir .
SCIENTIFIC REPORTS, 2025, 15 (01)
[23]   Small Details Gray Scale Image Encryption Using RC6 Block Cipher [J].
Faragallah, Osama S. ;
El-sayed, Hala S. ;
Afifi, Ashraf ;
El-Zoghdy, S. F. .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (02) :1559-1589
[24]   Cryptanalyzing an image encryption algorithm with compound chaotic stream cipher based on perturbation [J].
Xin Ge ;
Bin Lu ;
Fenlin Liu ;
Xiangyang Luo .
Nonlinear Dynamics, 2017, 90 :1141-1150
[25]   Image Encryption Based on Chaotic Sub-Block Scrambling and Chaotic Digit Selection Diffusion [J].
Xian, Yongjin ;
Wang, Xingyuan ;
Yan, Xiaopeng ;
Li, Qi ;
Wang, Xiaoyu .
OPTICS AND LASERS IN ENGINEERING, 2020, 134
[26]   Hash key-based image cryptosystem using chaotic maps and cellular automata [J].
Ben Slimane, Nabil ;
Aouf, Nahed ;
Bouallegue, Kais ;
Machhout, Mohsen .
2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, :190-194
[27]   Cryptanalysis of an image block encryption algorithm based on chaotic maps [J].
Ma, Yunling ;
Li, Chengqing ;
Ou, Bo .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
[28]   Optical Image Block Encryption Method Based on Chaotic Convolution [J].
Wang Jia ;
Liu Li .
LASER & OPTOELECTRONICS PROGRESS, 2023, 60 (04)
[29]   Chaotic image encryption based on circular substitution box and key stream buffer [J].
Zhang, Xuanping ;
Zhao, Zhongmeng ;
Wang, Jiayin .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (08) :902-913
[30]   A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with XOR Operation and Supported by Key-Based Permutation and Substitution [J].
Sastry, V. U. K. ;
Shirisha, K. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) :187-194