Cargando…

Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one cont...

Descripción completa

Detalles Bibliográficos
Autores principales: Radwan, Ahmed G., AbdElHaleem, Sherif H., Abd-El-Hafiz, Salwa K.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4767812/
https://www.ncbi.nlm.nih.gov/pubmed/26966561
http://dx.doi.org/10.1016/j.jare.2015.07.002
_version_ 1782417848897896448
author Radwan, Ahmed G.
AbdElHaleem, Sherif H.
Abd-El-Hafiz, Salwa K.
author_facet Radwan, Ahmed G.
AbdElHaleem, Sherif H.
Abd-El-Hafiz, Salwa K.
author_sort Radwan, Ahmed G.
collection PubMed
description This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper.
format Online
Article
Text
id pubmed-4767812
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-47678122016-03-10 Symmetric encryption algorithms using chaotic and non-chaotic generators: A review Radwan, Ahmed G. AbdElHaleem, Sherif H. Abd-El-Hafiz, Salwa K. J Adv Res Review This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. Elsevier 2016-03 2015-08-01 /pmc/articles/PMC4767812/ /pubmed/26966561 http://dx.doi.org/10.1016/j.jare.2015.07.002 Text en © 2015 Production and hosting by Elsevier B.V. on behalf of Cairo University. http://creativecommons.org/licenses/by-nc-nd/4.0/ This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
spellingShingle Review
Radwan, Ahmed G.
AbdElHaleem, Sherif H.
Abd-El-Hafiz, Salwa K.
Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
title Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
title_full Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
title_fullStr Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
title_full_unstemmed Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
title_short Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
title_sort symmetric encryption algorithms using chaotic and non-chaotic generators: a review
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4767812/
https://www.ncbi.nlm.nih.gov/pubmed/26966561
http://dx.doi.org/10.1016/j.jare.2015.07.002
work_keys_str_mv AT radwanahmedg symmetricencryptionalgorithmsusingchaoticandnonchaoticgeneratorsareview
AT abdelhaleemsherifh symmetricencryptionalgorithmsusingchaoticandnonchaoticgeneratorsareview
AT abdelhafizsalwak symmetricencryptionalgorithmsusingchaoticandnonchaoticgeneratorsareview