Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

被引:73
作者
Radwan, Ahmed G. [1 ,2 ]
AbdElHaleem, Sherif H. [1 ]
Abd-El-Hafiz, Salwa K. [1 ]
机构
[1] Cairo Univ, Fac Engn, Dept Engn Math, Giza 12613, Egypt
[2] Nile Univ, NISC, Cairo, Egypt
关键词
Permutation matrix; Symmetric encryption; Chess; Chaotic map; Fractals; IMAGE ENCRYPTION; SCHEME; PERMUTATION; CIPHER; SYNCHRONIZATION;
D O I
10.1016/j.jare.2015.07.002
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. (C) 2015 Production and hosting by Elsevier B.V. on behalf of Cairo University.
引用
收藏
页码:193 / 208
页数:16
相关论文
共 50 条
[21]   Image encryption with chaotically coupled chaotic maps [J].
Pisarchik, A. N. ;
Zanin, M. .
PHYSICA D-NONLINEAR PHENOMENA, 2008, 237 (20) :2638-2648
[22]   Encryption and decryption of images with chaotic map lattices [J].
Pisarchik, A. N. ;
Flores-Carmona, N. J. ;
Carpio-Valadez, M. .
CHAOS, 2006, 16 (03)
[23]  
Pisarchik AN, 2012, HORIZONS COMPUTER SC, V4
[24]  
Qiu Run-he, 2011, 2011 4th International Congress on Image and Signal Processing (CISP 2011), P629, DOI 10.1109/CISP.2011.6100304
[25]   1-D digitally-controlled multiscroll chaos generator [J].
Radwan, A. ;
Soliman, A. M. ;
Elwakil, A. S. .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (01) :227-242
[26]   Control and switching synchronization of fractional order chaotic systems using active control technique [J].
Radwan, A. G. ;
Moaddy, K. ;
Salama, K. N. ;
Momani, S. ;
Hashim, I. .
JOURNAL OF ADVANCED RESEARCH, 2014, 5 (01) :125-132
[27]  
Radwan A.G., 2012, INT C ENG TECHN, P1, DOI [10.1109/ICEngTechnol.2012.6396148, DOI 10.1109/ICENGTECHNOL.2012.6396148]
[28]   MOS realization of the modified Lorenz chaotic system [J].
Radwan, AG ;
Soliman, AM ;
El-Sedeek, A .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :553-561
[29]   On some generalized discrete logistic maps [J].
Radwan, Ahmed G. .
JOURNAL OF ADVANCED RESEARCH, 2013, 4 (02) :163-171
[30]  
Rukhin A., 2001, STAT TEST SUITE RAND, P800