You are here

Enhanced 1-D chaotic key-based algorithm for image encryption

Download pdf | Full Screen View

Date Issued:
2004-11-22
Summary:
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold: 1) we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, 2) we increase the key size to 128 bits, and 3) we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/knownplaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good.
Title: Enhanced 1-D chaotic key-based algorithm for image encryption.
100 views
24 downloads
Name(s): Furht, Borko, creator
Socek, Daniel, creator
Magliveras, Spyros S., creator
Type of Resource: text
Genre: Article
Issuance: single unit
Date Issued: 2004-11-22
Publisher: IEEE
Physical Description: text/pdf [8p]
Language(s): English
Summary: A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold: 1) we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, 2) we increase the key size to 128 bits, and 3) we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/knownplaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good.
Identifier: 358402 (digitool), FADT358402 (IID), fau:2121 (fedora), 10.1109/SECURECOMM.2005.39 (doi)
Note(s): This manuscript is a draft version of a paper published as Daniel Socek, Shujun Li, Spyros S. Magliveras and Borko Furht. Short Paper: Enhanced 1‐D Chaotic Key‐Based Algorithm for Image Encryption. Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureCOMM 2005) September 5‐9, 2005, pp. 406‐407 online at http://dx.doi.org/10.1109/SECURECOMM.2005.39
Subject(s): Data encryption (Computer science)
Computer algorithm
Mulitmedia systems --Security measures.
Persistent Link to This Record: http://purl.flvc.org/fcla/dt/358402
Restrictions on Access: ©2005 IEEE
Host Institution: FAU

In Collections