Use of Chaos in Key Schedules for A Symmetrical Encryption Algorithm with Out Data Loss
Serri Ismael Hamad
International Journal of Computational and Electronic Aspects in Engineering
Volume 5: Issue
4, December 2024, pp 194-202
Author's Information
Serri Ismael Hamad 1
Corresponding Author
1College of Education for Pure Sciences, University of Thi-Qar, Nasiriyah, Iraq
Serri Ismael Hamad
Abstract:-
This research presents the construction of a symmetric encryption algorithm for images of 512 × 512 pixels, in color and grayscale without loss of information and without compression, in BMP format. This algorithm consists of 15 rounds with S-box swapping, permutations, X-OR operations, and image size keys. The logistic map operation was used for the generation of S-boxes and to build a schedule of keys of the size of the image, the equations of E. Lorenz, transcendental numbers and the elliptic curve were used. To measure the strength of the encrypted result, the entropy of the information and the goodness test 𝜒∧ 2 were used, obtaining favorable results and close to similar algorithms.Index Terms:-
Pneumonia Detection, CNNs, Chest X-rays, ANN, Neural networksREFERENCES
- M. A. Lone and S. Qureshi, “RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and
affine hill cipher,” Optik, vol. 260, p. 168880, 2022.
- M. Gupta, V. P. Singh, K. K. Gupta, and P. K. Shukla, “An efficient image encryption technique based on two-level
security for internet of things,” Multimedia Tools and Applications, vol. 82, no. 4, pp. 5091–5111, 2023.
- B. Zhang, D. Xiao, H. Huang, and J. Liang, “Compressing cipher images by using semi-tensor product compressed
sensing and pre-mapping,” in 2022 Data Compression Conference (DCC), 2022, pp. 123–132.
- F. H. M. Al-Kadei, “Two-level hiding an encrypted image,” Indonesian Journal of Electrical Engineering and Computer
Science, vol. 18, no. 2, pp. 961–969, 2020.
- M. A. Budiman and M. Y. Saputra, “A hybrid cryptosystem using Vigenère cipher and Rabin-p algorithm in securing BMP
files,” Data Science: Journal of Computing and Applied Informatics, vol. 4, no. 2, pp. 89–99, 2020.
- G. Manikandan, R. Bala, E. Preethivi, K. Sekar, R. Manikandan, and J. Prassanna, “An approach with steganography and
scrambling mechanism for hiding image over images,” International Journal on Emerging Technologies, vol. 10, no. 1, pp.
64–67, 2019.
- M. F. Khan, A. Ahmed, K. Saleem, and T. Shah, “A novel design of cryptographic SP-network based on gold sequences
and chaotic logistic tent system,” IEEE Access, vol. 7, pp. 84980–84991, 2019.
- A. S. Alanazi, N. Munir, M. Khan, and I. Hussain, “A novel design of audio signals encryption with substitution
permutation network based on the Genesio-Tesi chaotic system,” Multimedia Tools and Applications, vol. 82, no. 17, pp.
26577–26593, 2023.
- B. Ahuja, R. Doriya, S. Salunke, M. F. Hashmi, A. Gupta, and N. D. Bokde, “HDIEA: high dimensional color image
encryption architecture using five-dimensional Gauss-logistic and Lorenz system,” Connection Science, vol. 35, no. 1, p.
2175792, 2023.
- M. Ramzan, T. Shah, M. M. Hazzazi, A. Aljaedi, and A. R. Alharbi, “Construction of s-boxes using different maps
over elliptic curves for image encryption,” IEEE Access, vol. 9, pp. 157106–157123, 2021.
- C. Zou, Q. Zhang, X. Wei, and C. Liu, “Image encryption based on improved Lorenz system,” IEEE Access, vol. 8, pp.
75728–75740, 2020.
- S. Rass and P. Schartner, “Authentic quantum nonces,” in Quantum Random Number Generation: Theory and Practice,
Springer, 2020, pp. 35–44.
- R. Civino, C. Blondeau, and M. Sala, “Differential attacks: using alternative operations,” Designs, Codes and
Cryptography, vol. 87, pp. 225–247, 2019.
- M. A. Murillo-Escobar, M. O. Meranza-Castillón, R. M. López-Gutiérrez, and C. Cruz-Hernández, “A chaotic encryption
algorithm for image privacy based on two pseudorandomly enhanced logistic maps,” Multimedia Security Using Chaotic Maps:
Principles and Methodologies, pp. 111–136, 2020.
- S. R. Davies, R. Macfarlane, and W. J. Buchanan, “Comparison of entropy calculation methods for ransomware
encrypted file identification,” Entropy, vol. 24, no. 10, p. 1503, 2022.
- S. N. Ray and S. Chattopadhyay, “Analyzing surface air temperature and rainfall in univariate framework,
quantifying uncertainty through Shannon entropy and prediction through artificial neural network,” Earth Science
Informatics, vol. 14, no. 1, pp. 485–503, 2021.
- V. M. S. García, M. D. G. Ramírez, R. F. Carapia, E. Vega-Alvarado, and E. R. Escobar, “A novel method for image
encryption based on chaos and transcendental numbers,” IEEE Access, vol. 7, pp. 163729–163739, 2019.
- A. H. Zahid et al., “A novel construction of dynamic S-box with high nonlinearity using heuristic evolution,” IEEE
Access, vol. 9, pp. 67797–67812, 2021.
To view full paper, Download here
To View Full Paper
For authors
Author's guidelines Publication Ethics Publication Policies Artical Processing Charges Call for paper Frequently Asked Questions(FAQS) View All Volumes and IssuesPublishing with



