Proposed color Image Lightweight Encryption Using Salsa20 with Key Derivation Function
DOI:
https://doi.org/10.21123/bsj.2024.9280Keywords:
Light Encryption, SALSA20, Key Derivation Function, PBKDF2, Pseudorandom Function, SHA256, Attacks.Abstract
Due to the extraordinary development in the production and exchange of multimedia across unprotected networks, there is a greater need to develop reliable secure, and effective cryptographic algorithms. This paper proposes a Lightweight Encryption algorithm combining Salsa20 and password-based Key Derivation Function2 ) PBKDF2) for color images. Due to the PBKDF2 characteristics such as strengthening the security of the password by applying multiple rounds of a pseudorandom function (PRF) to generate the key, Salt Usage adds additional randomness to the key derivation process, therefor it is used to enhance salsa20. By offering a large key space, the recommended lightweight image encryption has demonstrated robustness against brute force attacks. Additionally, the suggested method is capable of protecting against statistical cracking, differential attack and image security based on the histogram, correlation, NPCR, UACI, and entropy criteria. The time to encrypt an image takes 1.3 seconds, so it can be run on real-time programs
References
Hassan NF, Abbas RJE, Journal T. Proposed Video Watermarking Algorithm based on Edge or Corner Regions. J Eng Technol 2018; 36(1 Part B): 25-32. https://doi.org/10.30684/etj.36.1B.4
Nassef M, Alkinani MH, Shafik AM. A Novel Image Cryptosystem Inspired by the Generation of Biological Protein Sequences. IEEE Access. 2023;11:29101-29115, https://doi.org/10.1109/ACCESS.2023.3261133 .
Lessage X, Collier L, Van Ouytsel CHB, Legay A, Mahmoudi S, Massonet P. Secure federated learning applied to medical imaging with fully homomorphic encryption. In: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC). 2024. p. 1-12. https://doi.org/10.1109/ICAIC60265.2024.10433836 .
Mahdi MS, Hassan NF. Design of Keystream Generator utilizing Firefly Algorithm. JQCM, 2018; 10(3): 91-9. https://doi.org/10.29304/jqcm.2018.10.3.441
Salman D, Azeez R, Abdul-hossen A,. Build Cryptographic System from Multi-Biometrics using Meerkat Algorithm. IJCI ,.2019; 45(2): 1-8. https://doi.org/10.25195/ijci.v45i2.46
Sulaiman S, Hanapi ZM. Extensive analysis on images encryption using hybrid elliptic curve cryptosystem and hill cipher. J Comput Sci. 2021;17:221-230. https://doi.org/10.3844/jcssp.2021.221.230 .
Tayyeh HK, Mahdi MS, AL-Jumaili AA. Novel Steganography Scheme using Arabic Text Features in Holy Quran. Int J Electr Comput Eng. 2019; 9(3): 1910. https://doi.org/10.11591/ijece.v9i3.pp1910-1918
Salim KG, Al-alak SMK, Jawad MJ. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES. Baghdad Sci J. 2021; 18(2): 0417. https://doi.org/10.21123/bsj.2021.18.2.0417
Bersani F, Tschofenig H. The EAP-PSK protocol: A Pre-shared Key Extensible Authentication Protocol (EAP) method. 2007. RFC 4764. Report No.: 2070-1721. https://doi.org/10.17487/RFC4764
Kadir A, Hamdulla A, Guo W-QJO. Color Image Encryption using Skew Tent map and Hyper Chaotic System of 6th-order CNN. Optik . 2014; 125(5): 1671-5. https://doi.org/10.1016/j.ijleo.2013.09.040
Ali RH. Steganography in Audio Using Wavelet and DES. Baghdad Sci J. 2015; 12(2): 431-6. https://doi.org/10.21123/bsj.2015.12.2.431-436
Rimani R, Said NH, Pacha AALI, Ramos JAL. An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme. Baghdad Sci J. 2021; 18(3): 0628. https://doi.org/10.21123/bsj.2021.18.3.0628
Moriarty K, Kaliski B, Rusch A. Pkcs# 5: Password-based Cryptography Specification Version 2.1. RFC. 2017. Report No.: 2070-1721.
Kodwani G, Arora S, Atrey PK, editors. On Security of Key Derivation Functions in Password-based Cryptography. IEEE International Conference on Cyber Security and Resilience. 2021. https://doi.org/10.1109/CSR51186.2021.9527961
Najm H, Hoomod HK, Hassan RJ, Sciences N. A Proposed Hybrid Cryptography Algorithm based on GOST and Salsa (20). Period Eng Nat Sci. 2020; 8(3): 1829-35.
Shaktawat R, Suwalka I, Lakshmi N, Panwar A. An Improved Encryption Technique for Digital Imaging and Communications in Medicine (DICOM). ECS Trans. 2022;107(1):8229. https://doi.org/10.1149/10701.8229ecst
Adnan M, Kalra S, Cresswell JC, Taylor GW, Tizhoosh HR. Federated learning and differential privacy for medical image analysis. Sci Rep. 2022;12(1):1953. https://doi.org/10.1038/s41598-022-05539-7 .
Jeong K, Lee Y, Sung J, Hong S. Security Analysis of HMAC/NMAC by using Fault Injection. J Appl Math 2013; 2013. https://doi.org/10.1155/2013/101907
Hao R, Li B, Ma B, Song L J. Algebraic Fault Attack on the SHA-256 Compression Function. J Appl Math. 2014; 4(2): 1-9. https://doi.org/10.7815/ijorcs.42.2014.079
Almazrooie M, Samsudin A, Singh . Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map. J Inf Process Syst. 2015; 11(2): 310-24. https://doi.org/10.3745/JIPS.02.0024
Alshawi I, Muhalhal L. Improved Salsa20 Stream Cipher Diffusion Based on Random Chaotic Maps. Informatica . 2022; 46(7). https://doi.org/10.31449/inf.v46i7.4279
Zhang YJO. Cryptanalysis of a Novel Image Fusion Encryption Algorithm based on DNA Sequence Operation and Hyper-chaotic System. Optik . 2015; 126(2): 223-9. https://doi.org/10.1016/j.ijleo.2014.08.129
Downloads
Issue
Section
License
Copyright (c) 2024 ebtehal talib, Abeer Salim Jamil, Nidaa Flaih Hassan
This work is licensed under a Creative Commons Attribution 4.0 International License.