Abstract
In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification concerns the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption schemes, AES and Triple-DES, the new version of the cipher shows a better performances in rapidity, in confusion and in the key sensitivity.
Similar content being viewed by others
References
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons and Fractals, 21, 749–761.
Ehrsam, W. F., Meyer, C. H. W., Smith, J. L., & Tuchman, W. L. (1976). Message verification and transmission error detection by block chaining. U.S. Patent 4,074,066.
Fridirich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.
Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.
Ge, X., Liu, F., Lu, B., & Yang, C. (2010). Improvement of Rhouma’s attacks on gao algorithm. Physics Letters A, 374(11–12), 1362–1367.
Guan, Z. H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1–3), 153–157.
Li, S., Chen, G., & Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151.
Mahmodi, H., Behnia, S., Akhshani, A., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals, 35, 408–419.
Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.
Mou, X., Li, S., Zheng, X., & Cai, Y. (2002). Chaotic encryption scheme for real time digital video. In SPIE on electronic imaging, San Jose, CA, USA.
Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973–5978.
Shanon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.
Wikipedia (2010). Block cipher modes of operation. Wikipedia.
Yano, K., & Tanaka, K. (2002). Image encryption scheme based on truncated Baker transformation. IIEICE Transactions on Fundamentals E85-A(9), 2025–2035.
Yen, J. C., Guo, J., & Pan, H. F. (2002). New voice over internet protocol technique with hierarchical data security protection. IEE Vis Image Signal Process 149, 4.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hermassi, H., Rhouma, R. & Belghith, S. Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52, 539–549 (2013). https://doi.org/10.1007/s11235-011-9459-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9459-7