Main Article Content
The growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret permutation of RKP scheme; this change makes the encryption system depend on the secret key and allows both to respect the second Shannon’s theory and the Kerckhoff principle. Security analysis of cryptosystem demonstrates that the proposed diffusion scheme of RKP enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.
communications implementing electronic transfers of personal data, require reliable techniques and secure. In fact, the use of a communication network exposes exchanges to certain risks, which require the existence of adequate security measures. The data encryption is often the only effective way to meet these requirements. This paper present a cryptosystem by block for encrypting images, as images are considered particular data because of their size and their information, which are two dimensional nature and characterized by high redundancy and strong correlation. In this cryptosystem, we used a new dynamic diffusion technique called round key permutation, which consists to permute pixels of each bloc in a manner nonlinear, dynamic and random using permutation table calculated according to the master key and sub-keys. We use thereafter the AES encryption algorithm in our cryptosystem by replacing the linear permutation of ShiftRows with round key permutation technique; this changing makes the encryption scheme depend on encryption key. Security analysis of cryptosystem demonstrate that the modification made on using the proposed technique of Round Key Permutation enhances the fortress of encryption algorithm, as can be observed in the entropy and other obtained values.
Received 25/3/2020, Accepted 27/12/2020, Published Online First 21/2/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Daria L, Alexander P. Applying Correlation and Regression Analysis to Detect Security Incidents in the Internet of Things. IJCNIS. 2015 Dec; 7(3):131-137.
Xingyuan W, Siwei W, Yingqian Z, Kang G. A novel image encryption algorithm based on chaotic shuffling method. Inf. Secur. J. 2017 Feb; 26 (1):7-16.
Chen J, Zhu Zhi-liang, Zhang Li-bo, Zhang Y, Yang Ben-qiang. Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process.; 2018; 142: 340-353
Ming X, Zihong T. A novel image cipher based on 3D bit matrix and latin cubes. Inf. Sci. 2019; 478:1-14
Xuncai Z, Feng H, Ying N. Chaotic Image Encryption Algorithm Based on Bit Permutation and Dynamic DNA Encoding. Computational Intelligence and Neuroscience. Volume 2017, Article ID 6919675, 11 pages.
Dong-dai L, Wei Z, Hai Y, Zhi-liang Z. An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process.. 2018 Oct; 151: 130-143. Available from: https://doi.org/10.1016/j.sigpro.2018.05.008
Chong F, Gao-yuan Z, Mai Z, Zhe C, Wei-min L. A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy. Secur. Commun. Netw. 2018 Feb; 2018:1-13. Available from: https://doi.org/10.1155/2018/2708532
Ruisong Y. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt. Commun. 2011; 284(22): 5290-5298.
Hraoui S, Gmira F, Abbou FM, Jarrar AO, Jarjar A. A Chaotic Cryptosystem for Color Images Using Pixel-Level and Bit-Level Pseudo-Random Permutations. In:The Proceedings of the Third International Conference on Smart City Applications 2018 Oct 10 (pp. 481-491). Springer, Cham.
Jun-xin C, Zhi-liang Z, Chong F, Hai Y. An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt. Express. 2013; 21(23): 27873-27890.
Guangfeng C, Chunhua W, Hua C. A Novel Color Image Encryption Algorithm Based on Hyperchaotic System and Permutation-Diffusion Architecture. Int J Bifurcat Chaos . 2019; 29(09): 1950115.
Rasul E, Abdul HA, Ismail F I, Ayman A, Malrey L. Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng. 2017; 90: 146-154.
Xingyuan W, Hongyu Z, Le F, Xiaolin Y, Hao Z. High-sensitivity image encryption algorithm with random diffusion based on dynamic-coupled map lattices. Opt Lasers Eng. 2019; 122:225-238. Available from: https://doi.org/10.1016/j.optlaseng.2019.04.005
Nawel B, Zahir A, Aissa B, Selma B. Image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map. IET Image Processing. 2020; 14(6): 5-11. DOI: 10.1049/iet-ipr.2019.0671.
Abdalla M, Mihir B. Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. ASIACRYPT 2000. Lecture Notes in Computer Science book series. Springer-Verlag, 2000 Dec; 1976: 546-559.
TownSendSecurity.com. Introduction to AES Encryption: White Paper, 2016. (online) Available at https://townsendsecurity.com/sites/default/files/AES_Introduction.pdf.
William s. Cryptography and network security principles and practice. Pearson. United States of America, 2011, p. 900.
Chen G, Mao Y, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals. 2014; 21:749–761.
Socek D, Li S, Magliveras SS, Furht B. Short paper: Enhanced 1-d chaotic key-based algorithm for image encryption. InFirst International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05) 2005 Sep 5 (pp. 406-407). IEEE.
Mansour I, Chalhoub G, Bakhache B. Evaluation of a fast symmetric cryptographic algorithm based on the chaos theory for wireless sensor networks. In2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012 Jun 25 (pp. 913-919). IEEE.