Use of Chaos in Key Schedules for A Symmetrical Encryption Algorithm with Out Data Loss

Serri Ismael Hamad
International Journal of Computational and Electronic Aspects in Engineering
Volume 5: Issue 4, December 2024, pp 194-202


Author's Information
Serri Ismael Hamad 1 
Corresponding Author
1College of Education for Pure Sciences, University of Thi-Qar, Nasiriyah, Iraq
Serri Ismael Hamad

Research Paper -- Peer Research Papered
First online on – 30 December 2024

Open Access article under Creative Commons License

Cite this article –Serri Ismael Hamad “Use of Chaos in Key Schedules for A Symmetrical Encryption Algorithm with Out Data Loss”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 5, Issue 4, pp. 194-202, 2024.
https://doi.org/10.26706/ijceae.5.4.20241107


Abstract:-
This research presents the construction of a symmetric encryption algorithm for images of 512 × 512 pixels, in color and grayscale without loss of information and without compression, in BMP format. This algorithm consists of 15 rounds with S-box swapping, permutations, X-OR operations, and image size keys. The logistic map operation was used for the generation of S-boxes and to build a schedule of keys of the size of the image, the equations of E. Lorenz, transcendental numbers and the elliptic curve were used. To measure the strength of the encrypted result, the entropy of the information and the goodness test 𝜒∧ 2 were used, obtaining favorable results and close to similar algorithms.
Index Terms:-
Pneumonia Detection, CNNs, Chest X-rays, ANN, Neural networks
REFERENCES
  1. M. A. Lone and S. Qureshi, “RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher,” Optik, vol. 260, p. 168880, 2022.

  2. M. Gupta, V. P. Singh, K. K. Gupta, and P. K. Shukla, “An efficient image encryption technique based on two-level security for internet of things,” Multimedia Tools and Applications, vol. 82, no. 4, pp. 5091–5111, 2023.

  3. B. Zhang, D. Xiao, H. Huang, and J. Liang, “Compressing cipher images by using semi-tensor product compressed sensing and pre-mapping,” in 2022 Data Compression Conference (DCC), 2022, pp. 123–132.

  4. F. H. M. Al-Kadei, “Two-level hiding an encrypted image,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 18, no. 2, pp. 961–969, 2020.

  5. M. A. Budiman and M. Y. Saputra, “A hybrid cryptosystem using Vigenère cipher and Rabin-p algorithm in securing BMP files,” Data Science: Journal of Computing and Applied Informatics, vol. 4, no. 2, pp. 89–99, 2020.

  6. G. Manikandan, R. Bala, E. Preethivi, K. Sekar, R. Manikandan, and J. Prassanna, “An approach with steganography and scrambling mechanism for hiding image over images,” International Journal on Emerging Technologies, vol. 10, no. 1, pp. 64–67, 2019.

  7. M. F. Khan, A. Ahmed, K. Saleem, and T. Shah, “A novel design of cryptographic SP-network based on gold sequences and chaotic logistic tent system,” IEEE Access, vol. 7, pp. 84980–84991, 2019.

  8. A. S. Alanazi, N. Munir, M. Khan, and I. Hussain, “A novel design of audio signals encryption with substitution permutation network based on the Genesio-Tesi chaotic system,” Multimedia Tools and Applications, vol. 82, no. 17, pp. 26577–26593, 2023.

  9. B. Ahuja, R. Doriya, S. Salunke, M. F. Hashmi, A. Gupta, and N. D. Bokde, “HDIEA: high dimensional color image encryption architecture using five-dimensional Gauss-logistic and Lorenz system,” Connection Science, vol. 35, no. 1, p. 2175792, 2023.

  10. M. Ramzan, T. Shah, M. M. Hazzazi, A. Aljaedi, and A. R. Alharbi, “Construction of s-boxes using different maps over elliptic curves for image encryption,” IEEE Access, vol. 9, pp. 157106–157123, 2021.

  11. C. Zou, Q. Zhang, X. Wei, and C. Liu, “Image encryption based on improved Lorenz system,” IEEE Access, vol. 8, pp. 75728–75740, 2020.

  12. S. Rass and P. Schartner, “Authentic quantum nonces,” in Quantum Random Number Generation: Theory and Practice, Springer, 2020, pp. 35–44.

  13. R. Civino, C. Blondeau, and M. Sala, “Differential attacks: using alternative operations,” Designs, Codes and Cryptography, vol. 87, pp. 225–247, 2019.

  14. M. A. Murillo-Escobar, M. O. Meranza-Castillón, R. M. López-Gutiérrez, and C. Cruz-Hernández, “A chaotic encryption algorithm for image privacy based on two pseudorandomly enhanced logistic maps,” Multimedia Security Using Chaotic Maps: Principles and Methodologies, pp. 111–136, 2020.

  15. S. R. Davies, R. Macfarlane, and W. J. Buchanan, “Comparison of entropy calculation methods for ransomware encrypted file identification,” Entropy, vol. 24, no. 10, p. 1503, 2022.

  16. S. N. Ray and S. Chattopadhyay, “Analyzing surface air temperature and rainfall in univariate framework, quantifying uncertainty through Shannon entropy and prediction through artificial neural network,” Earth Science Informatics, vol. 14, no. 1, pp. 485–503, 2021.

  17. V. M. S. García, M. D. G. Ramírez, R. F. Carapia, E. Vega-Alvarado, and E. R. Escobar, “A novel method for image encryption based on chaos and transcendental numbers,” IEEE Access, vol. 7, pp. 163729–163739, 2019.

  18. A. H. Zahid et al., “A novel construction of dynamic S-box with high nonlinearity using heuristic evolution,” IEEE Access, vol. 9, pp. 67797–67812, 2021.



  19. To view full paper, Download here


Publishing with