Proposed color Image Lightweight Encryption Using Salsa20 with Key Derivation Function

Authors

  • ebtehal talib Ministry of Higher Education and Scientific Research, Baghdad, Iraq. https://orcid.org/0000-0002-9513-5877
  • Abeer Salim Jamil Department of Computer Technics Engineering, Al-Mansour University College, Iraq.
  • Nidaa Flaih Hassan Department of Computer Science, University of Technology, Baghdad, Iraq.

DOI:

https://doi.org/10.21123/bsj.2024.9280

Keywords:

Light Encryption, SALSA20, Key Derivation Function, PBKDF2, Pseudorandom Function, SHA256, Attacks.

Abstract

Due to the extraordinary development in the production and exchange of multimedia across unprotected networks, there is a greater need to develop reliable secure, and effective cryptographic algorithms. This paper proposes a Lightweight Encryption algorithm combining Salsa20 and password-based Key Derivation Function2 ) PBKDF2) for color images. Due to the PBKDF2 characteristics such as strengthening the security of the password by applying multiple rounds of a pseudorandom function (PRF) to generate the key, Salt Usage adds additional randomness to the key derivation process, therefor it is used to enhance salsa20.  By offering a large key space, the recommended lightweight image encryption has demonstrated robustness against brute force attacks. Additionally, the suggested method is capable of protecting against statistical cracking, differential attack and image security based on the histogram, correlation, NPCR, UACI, and entropy criteria. The time to encrypt an image takes 1.3 seconds, so it can be run on real-time programs

References

Hassan NF, Abbas RJE, Journal T. Proposed Video Watermarking Algorithm based on Edge or Corner Regions. J Eng Technol 2018; 36(1 Part B): 25-32. https://doi.org/10.30684/etj.36.1B.4

Nassef M, Alkinani MH, Shafik AM. A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences. IEEE Access. 2023;11:29101-29115, https://doi.org/10.1109/ACCESS.2023.3261133 .

Lessage X, Collier L, Van Ouytsel CHB, Legay A, Mahmoudi S, Massonet P. Secure federated learning applied to medical imaging with fully homomorphic encryption. In: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC). 2024. p. 1-12. https://doi.org/10.1109/ICAIC60265.2024.10433836 .

Mahdi MS, Hassan NF. Design of Keystream Generator utilizing Firefly Algorithm. JQCM, 2018; 10(3): 91-9. https://doi.org/10.29304/jqcm.2018.10.3.441

Salman D, Azeez R, Abdul-hossen A,. Build Cryptographic System from Multi-Biometrics using Meerkat Algorithm. IJCI ,.2019; 45(2): 1-8. https://doi.org/10.25195/ijci.v45i2.46

Sulaiman S, Hanapi ZM. Extensive analysis on images encryption using hybrid elliptic curve cryptosystem and hill cipher. J Comput Sci. 2021;17:221-230. https://doi.org/10.3844/jcssp.2021.221.230 .

Tayyeh HK, Mahdi MS, AL-Jumaili AA. Novel Steganography Scheme using Arabic Text Features in Holy Quran. Int J Electr Comput Eng. 2019; 9(3): 1910. https://doi.org/10.11591/ijece.v9i3.pp1910-1918

Salim KG, Al-alak SMK, Jawad MJ. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES. Baghdad Sci J. 2021; 18(2): 0417. https://doi.org/10.21123/bsj.2021.18.2.0417

Bersani F, Tschofenig H. The EAP-PSK protocol: A Pre-shared Key Extensible Authentication Protocol (EAP) method. 2007. RFC 4764. Report No.: 2070-1721. https://doi.org/10.17487/RFC4764

Kadir A, Hamdulla A, Guo W-QJO. Color Image Encryption using Skew Tent map and Hyper Chaotic System of 6th-order CNN. Optik . 2014; 125(5): 1671-5. https://doi.org/10.1016/j.ijleo.2013.09.040

Ali RH. Steganography in Audio Using Wavelet and DES. Baghdad Sci J. 2015; 12(2): 431-6. https://doi.org/10.21123/bsj.2015.12.2.431-436

Rimani R, Said NH, Pacha AALI, Ramos JAL. An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme. Baghdad Sci J. 2021; 18(3): 0628. https://doi.org/10.21123/bsj.2021.18.3.0628

Moriarty K, Kaliski B, Rusch A. Pkcs# 5: Password-based Cryptography Specification Version 2.1. RFC. 2017. Report No.: 2070-1721.

Kodwani G, Arora S, Atrey PK, editors. On Security of Key Derivation Functions in Password-based Cryptography. IEEE International Conference on Cyber Security and Resilience. 2021. https://doi.org/10.1109/CSR51186.2021.9527961

Najm H, Hoomod HK, Hassan RJ, Sciences N. A Proposed Hybrid Cryptography Algorithm based on GOST and Salsa (20). Period Eng Nat Sci. 2020; 8(3): 1829-35.

Shaktawat R, Suwalka I, Lakshmi N, Panwar A. An Improved Encryption Technique for Digital Imaging and Communications in Medicine (DICOM). ECS Trans. 2022;107(1):8229. https://doi.org/10.1149/10701.8229ecst

Adnan M, Kalra S, Cresswell JC, Taylor GW, Tizhoosh HR. Federated learning and differential privacy for medical image analysis. Sci Rep. 2022;12(1):1953. https://doi.org/10.1038/s41598-022-05539-7 .

Jeong K, Lee Y, Sung J, Hong S. Security Analysis of HMAC/NMAC by using Fault Injection. J Appl Math 2013; 2013. https://doi.org/10.1155/2013/101907

Hao R, Li B, Ma B, Song L J. Algebraic Fault Attack on the SHA-256 Compression Function. J Appl Math. 2014; 4(2): 1-9. https://doi.org/10.7815/ijorcs.42.2014.079

Almazrooie M, Samsudin A, Singh . Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map. J Inf Process Syst. 2015; 11(2): 310-24. https://doi.org/10.3745/JIPS.02.0024

Alshawi I, Muhalhal L. Improved Salsa20 Stream Cipher Diffusion Based on Random Chaotic Maps. Informatica . 2022; 46(7). https://doi.org/10.31449/inf.v46i7.4279

Zhang YJO. Cryptanalysis of a Novel Image Fusion Encryption Algorithm based on DNA Sequence Operation and Hyper-chaotic System. Optik . 2015; 126(2): 223-9. https://doi.org/10.1016/j.ijleo.2014.08.129

Downloads

Issue

Section

article

How to Cite

1.
Proposed color Image Lightweight Encryption Using Salsa20 with Key Derivation Function. Baghdad Sci.J [Internet]. [cited 2024 Dec. 30];22(2). Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/9280