Hybrid chaotic keystream generation (HCKG) for symmetric image encryption

Ali H. Kashmar, Ahmed K. Hassn, Eddie Shahril Ismail

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Today, data security is the main objective to protected personal data from unauthorized access users, because of the high-speed development of unsecured networks. The aim of apply symmetric-key algorithms is to produce a good encrypt data in order to safety transmitted information through unsecure networks; such goal is achieve by design efficient keystream generator mechanism. However, there are many properties should be taken in consideration to design a good ciphers including; implement strong and highspeed keystream generation, utilize a complex invertible round functions, as well as time execution and security level. This paper suggested a new technique for design efficient keystream generator mechanism called Hybrid Chaotic Keystream Generator (HCKG) that is suitable for symmetric image encryption. HCKG generator passes through four stages; firstly, choose the chaotic maps, including, Chebyshev, Tent, Gaussian, Henon, and Duffing maps. The secondly stage, exponential function [exp(x)] and the next stage is machine words multiplexer to find the floating-point representation group of random numbers. The final stage, random matrix table as a dynamic substitution box (S-box) depend on random key, shifting, logistic maps for (1D, 2D, 3D), and particle swarm algorithm. Visual Studio was employed as a programming language to implement the algorithms of proposal system. The output of HCKG is testing in several measurements represent including complexity, time execution and avalanche criterion balance; the numerical results show that the keystream generation successfully passed through NIST (statistical package tests for randomness). Finally, image encryption for the corresponding algorithm was done; preliminary results show that HCKG algorithm has good cryptographic strength and resistant against security attacks.

Original languageEnglish
Pages (from-to)984-993
Number of pages10
JournalJournal of Theoretical and Applied Information Technology
Volume97
Issue number3
Publication statusPublished - 1 Feb 2019

Fingerprint

Image Encryption
Cryptography
Generator
Execution Time
High Speed
Statistical package
Particle Swarm Algorithm
Data Security
Data privacy
Logistic map
Chaotic Map
Group Representation
Exponential functions
Studios
Random number
Avalanche
Floating point
Security of data
Chebyshev
Random Matrices

Keywords

  • Chaotic maps
  • Cryptography
  • Image encryption
  • NIST
  • Symmetric key

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Hybrid chaotic keystream generation (HCKG) for symmetric image encryption. / Kashmar, Ali H.; Hassn, Ahmed K.; Ismail, Eddie Shahril.

In: Journal of Theoretical and Applied Information Technology, Vol. 97, No. 3, 01.02.2019, p. 984-993.

Research output: Contribution to journalArticle

@article{fe7d12d5787642c6a3b12af0bb65c555,
title = "Hybrid chaotic keystream generation (HCKG) for symmetric image encryption",
abstract = "Today, data security is the main objective to protected personal data from unauthorized access users, because of the high-speed development of unsecured networks. The aim of apply symmetric-key algorithms is to produce a good encrypt data in order to safety transmitted information through unsecure networks; such goal is achieve by design efficient keystream generator mechanism. However, there are many properties should be taken in consideration to design a good ciphers including; implement strong and highspeed keystream generation, utilize a complex invertible round functions, as well as time execution and security level. This paper suggested a new technique for design efficient keystream generator mechanism called Hybrid Chaotic Keystream Generator (HCKG) that is suitable for symmetric image encryption. HCKG generator passes through four stages; firstly, choose the chaotic maps, including, Chebyshev, Tent, Gaussian, Henon, and Duffing maps. The secondly stage, exponential function [exp(x)] and the next stage is machine words multiplexer to find the floating-point representation group of random numbers. The final stage, random matrix table as a dynamic substitution box (S-box) depend on random key, shifting, logistic maps for (1D, 2D, 3D), and particle swarm algorithm. Visual Studio was employed as a programming language to implement the algorithms of proposal system. The output of HCKG is testing in several measurements represent including complexity, time execution and avalanche criterion balance; the numerical results show that the keystream generation successfully passed through NIST (statistical package tests for randomness). Finally, image encryption for the corresponding algorithm was done; preliminary results show that HCKG algorithm has good cryptographic strength and resistant against security attacks.",
keywords = "Chaotic maps, Cryptography, Image encryption, NIST, Symmetric key",
author = "Kashmar, {Ali H.} and Hassn, {Ahmed K.} and Ismail, {Eddie Shahril}",
year = "2019",
month = "2",
day = "1",
language = "English",
volume = "97",
pages = "984--993",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "3",

}

TY - JOUR

T1 - Hybrid chaotic keystream generation (HCKG) for symmetric image encryption

AU - Kashmar, Ali H.

AU - Hassn, Ahmed K.

AU - Ismail, Eddie Shahril

PY - 2019/2/1

Y1 - 2019/2/1

N2 - Today, data security is the main objective to protected personal data from unauthorized access users, because of the high-speed development of unsecured networks. The aim of apply symmetric-key algorithms is to produce a good encrypt data in order to safety transmitted information through unsecure networks; such goal is achieve by design efficient keystream generator mechanism. However, there are many properties should be taken in consideration to design a good ciphers including; implement strong and highspeed keystream generation, utilize a complex invertible round functions, as well as time execution and security level. This paper suggested a new technique for design efficient keystream generator mechanism called Hybrid Chaotic Keystream Generator (HCKG) that is suitable for symmetric image encryption. HCKG generator passes through four stages; firstly, choose the chaotic maps, including, Chebyshev, Tent, Gaussian, Henon, and Duffing maps. The secondly stage, exponential function [exp(x)] and the next stage is machine words multiplexer to find the floating-point representation group of random numbers. The final stage, random matrix table as a dynamic substitution box (S-box) depend on random key, shifting, logistic maps for (1D, 2D, 3D), and particle swarm algorithm. Visual Studio was employed as a programming language to implement the algorithms of proposal system. The output of HCKG is testing in several measurements represent including complexity, time execution and avalanche criterion balance; the numerical results show that the keystream generation successfully passed through NIST (statistical package tests for randomness). Finally, image encryption for the corresponding algorithm was done; preliminary results show that HCKG algorithm has good cryptographic strength and resistant against security attacks.

AB - Today, data security is the main objective to protected personal data from unauthorized access users, because of the high-speed development of unsecured networks. The aim of apply symmetric-key algorithms is to produce a good encrypt data in order to safety transmitted information through unsecure networks; such goal is achieve by design efficient keystream generator mechanism. However, there are many properties should be taken in consideration to design a good ciphers including; implement strong and highspeed keystream generation, utilize a complex invertible round functions, as well as time execution and security level. This paper suggested a new technique for design efficient keystream generator mechanism called Hybrid Chaotic Keystream Generator (HCKG) that is suitable for symmetric image encryption. HCKG generator passes through four stages; firstly, choose the chaotic maps, including, Chebyshev, Tent, Gaussian, Henon, and Duffing maps. The secondly stage, exponential function [exp(x)] and the next stage is machine words multiplexer to find the floating-point representation group of random numbers. The final stage, random matrix table as a dynamic substitution box (S-box) depend on random key, shifting, logistic maps for (1D, 2D, 3D), and particle swarm algorithm. Visual Studio was employed as a programming language to implement the algorithms of proposal system. The output of HCKG is testing in several measurements represent including complexity, time execution and avalanche criterion balance; the numerical results show that the keystream generation successfully passed through NIST (statistical package tests for randomness). Finally, image encryption for the corresponding algorithm was done; preliminary results show that HCKG algorithm has good cryptographic strength and resistant against security attacks.

KW - Chaotic maps

KW - Cryptography

KW - Image encryption

KW - NIST

KW - Symmetric key

UR - http://www.scopus.com/inward/record.url?scp=85062901435&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85062901435&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:85062901435

VL - 97

SP - 984

EP - 993

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 3

ER -