Cargando…

Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System

Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors pr...

Descripción completa

Detalles Bibliográficos
Autor principal: Karawia, Abdelrahman
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7824367/
https://www.ncbi.nlm.nih.gov/pubmed/33396342
http://dx.doi.org/10.3390/e23010057
_version_ 1783640059934670848
author Karawia, Abdelrahman
author_facet Karawia, Abdelrahman
author_sort Karawia, Abdelrahman
collection PubMed
description Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors proposed permutation using non-chaotic methods and have displayed good results in comparison to chaos-based methods. In the current article, a new image encryption algorithm is designed using combination of Newton-Raphson’s method (non-chaotic) and general Bischi-Naimzadah duopoly system as a hyperchaotic two-dimensional map. The plain image is first shuffled by using Newton-Raphson’s method. Next, a secret matrix with the same size of the plain image is created using general Bischi-Naimzadah duopoly system. Finally, the XOR between the secret matrix and the shuffled image is calculated and then the cipher image is obtained. Several security experiments are executed to measure the efficiency of the proposed algorithm, such as key space analysis, correlation coefficients analysis, histogram analysis, entropy analysis, differential attacks analysis, key sensitivity analysis, robustness analysis, chosen plaintext attack analysis, computational analysis, and NIST statistical Tests. Compared to many recent algorithms, the proposed algorithm has good security efficiency.
format Online
Article
Text
id pubmed-7824367
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-78243672021-02-24 Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System Karawia, Abdelrahman Entropy (Basel) Article Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors proposed permutation using non-chaotic methods and have displayed good results in comparison to chaos-based methods. In the current article, a new image encryption algorithm is designed using combination of Newton-Raphson’s method (non-chaotic) and general Bischi-Naimzadah duopoly system as a hyperchaotic two-dimensional map. The plain image is first shuffled by using Newton-Raphson’s method. Next, a secret matrix with the same size of the plain image is created using general Bischi-Naimzadah duopoly system. Finally, the XOR between the secret matrix and the shuffled image is calculated and then the cipher image is obtained. Several security experiments are executed to measure the efficiency of the proposed algorithm, such as key space analysis, correlation coefficients analysis, histogram analysis, entropy analysis, differential attacks analysis, key sensitivity analysis, robustness analysis, chosen plaintext attack analysis, computational analysis, and NIST statistical Tests. Compared to many recent algorithms, the proposed algorithm has good security efficiency. MDPI 2020-12-31 /pmc/articles/PMC7824367/ /pubmed/33396342 http://dx.doi.org/10.3390/e23010057 Text en © 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Karawia, Abdelrahman
Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
title Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
title_full Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
title_fullStr Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
title_full_unstemmed Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
title_short Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
title_sort cryptographic algorithm using newton-raphson method and general bischi-naimzadah duopoly system
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7824367/
https://www.ncbi.nlm.nih.gov/pubmed/33396342
http://dx.doi.org/10.3390/e23010057
work_keys_str_mv AT karawiaabdelrahman cryptographicalgorithmusingnewtonraphsonmethodandgeneralbischinaimzadahduopolysystem