Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

被引:73
作者
Radwan, Ahmed G. [1 ,2 ]
AbdElHaleem, Sherif H. [1 ]
Abd-El-Hafiz, Salwa K. [1 ]
机构
[1] Cairo Univ, Fac Engn, Dept Engn Math, Giza 12613, Egypt
[2] Nile Univ, NISC, Cairo, Egypt
关键词
Permutation matrix; Symmetric encryption; Chess; Chaotic map; Fractals; IMAGE ENCRYPTION; SCHEME; PERMUTATION; CIPHER; SYNCHRONIZATION;
D O I
10.1016/j.jare.2015.07.002
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. (C) 2015 Production and hosting by Elsevier B.V. on behalf of Cairo University.
引用
收藏
页码:193 / 208
页数:16
相关论文
共 50 条
[1]   A fractal-based image encryption system [J].
Abd-El-Hafiz, Salwa Kamal ;
Radwan, Ahmed G. ;
Haleem, Sherif H. Abdel ;
Barakat, Mohamed L. .
IET IMAGE PROCESSING, 2014, 8 (12) :742-752
[2]  
Abd-El-Hafiz SK, 2015, APPL MATH INF SCI AM, V9, P1
[3]  
AbdElHaleem SH, 2014, IEEE INT NEW CIRC, P405, DOI 10.1109/NEWCAS.2014.6934068
[4]  
AbdElHaleem SH, 2013, IEEE I C ELECT CIRC, P877, DOI 10.1109/ICECS.2013.6815554
[5]  
Al-Husainy MAF, 2012, INT J SECUR APPL, V6, P1
[6]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[7]  
[Anonymous], 2011, ICM 2011 P
[8]  
[Anonymous], 2011, IJNSA, DOI DOI 10.5121/IJNSA.2011.3212
[9]  
[Anonymous], 2011, INT J NETW SECUR APP
[10]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54