Open Access Open Access  Restricted Access Subscription or Fee Access

A Chaos-Based Approach for Correcting the Security Level of a Block Cipher Algorithm

Fatma Zayen Sbiaa(1*), Medien Zeghid(2), Sonia Kotel(3), Rached Tourki(4), Mohsen Machhout(5), Adel Baganne(6)

(1) Laboratory of Information Science and Technology, communication and Knowledge (Lab-STICC), University of South Brittany. Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences, University of Monastir., Tunisia
(2) Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences, University of Monastir, Tunisia
(3) Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences, University of Monastir, Tunisia
(4) Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences, University of Monastir, Tunisia
(5) Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences, University of Monastir, Tunisia
(6) Laboratory of Information Science and Technology, communication and Knowledge (Lab-STICC), University of South Brittany, France
(*) Corresponding author


DOI: https://doi.org/10.15866/irecos.v11i2.8356

Abstract


Cryptography has become not only limited to prevent sensitive military information, but also one of the critical components of the security policy of any organization. It is considered as an industry standard for providing information trust, security, electro-financial transactions and controlling access to different resources. Related research has not stopped to improve the impact of the cryptographic algorithms. However, the cryptanalysis strived to find the potential weaknesses in the most known and secure algorithm. This is the reason why researchers have to make sure that the current algorithms are secure enough to resist against the new attacks. In this paper, a new approach for correcting the security level of a block cipher algorithm is proposed. The main goal of the present work is to provide solutions for the existing encryption algorithms which necessarily have their advantages and drawbacks. Thus, the designed algorithm must keep all the benefits presented by the main algorithm while adding improvements to the disadvantages essentially the security issues. The proposed modifications are based on the exploitation of the chaos theory properties. The experimental results showed that the proposed modifications can be easily implemented as they do not need a high level of consumption or hardware occupation. In addition, the security analysis proved the resistance of the new algorithm to statistical attacks, differential attacks, and initial key sensibility.
Copyright © 2016 Praise Worthy Prize - All rights reserved.

Keywords


Symmetric Cryptography; Block Cipher; Data Encryption Standard; Security Analysis; Cryptanalysis; Chaos; Update Functions

Full Text:

PDF


References


S. Lian, Multimedia Content Encryption: Techniques and Applications, Taylor & Francis Group, LLC, 2009.

L. Shiguo, K. Dimitris, and R. Giancarlo, Recent Advances in Multimedia Information System Security, International Journal of Computing and Informatics, 2009, Vol.33, No.1, pp. 3–24.

E. Schaefer, An introduction to cryptography and cryptanalysis, pp.94-108, 2000.

Ayushi, A Symmetric Key Cryptographic Algorithm, International Journal of Computer Applications, V., pp., 2010.
http://dx.doi.org/10.5120/331-502

S. Lian, J. Sun and Z. Wang, A block cipher based on a suitable use of chaotic standard map, Chaos, Solitons & Fractals Vol.26(No.1): 117–129.
http://dx.doi.org/10.1016/j.chaos.2004.11.096

S. Behnia, A. Akhshani, H. Mahmodi and A. Akhavan, A novel algorithm for image encryption based on mixture of chaotic maps, Chaos, Solitons and Fractal,
http://dx.doi.org/10.1016/j.chaos.2006.05.011

S. Zhaopin, G. Zhang and J. Jiang, Multimedia Security: A Survey of Chaos-Based Encryption Technology, School of Computer and Information, Hefei University of Technology China.
http://dx.doi.org/10.5772/36036

H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, New Comparative Study Between DES, 3DES and AES within Nine Factors, Journal Of Computing, Volume 2, Issue 3, March 2010, pp. 152-157.

E. Biham and A. Shamir, Differential Cryptanalysis of the Full 16-Round DES, Advances in Cryptology-CRYPTO '92 Proceedings, Springer-Verlag, 1993, pp. 487- 496).
http://dx.doi.org/10.1007/3-540-48071-4_34

T.Nie and T. Zhang, A Study of DES and Blowfish Encryption Algorithm, 2009 IEEE.
http://dx.doi.org/10.1109/tencon.2009.5396115

M. Mathur and A. Kesarwani, Comparison Between DES , 3DES , RC2 , RC6 , Blowfish and AES (Proceedings of National Conference on New Horizons in IT - NCNHIT 2013).

J. Thakur and N. Kumar, DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis, International Journal of Emerging Technology and Advanced Engineering, December 2011).

G. Kumar, M. Rai and G. Lee, Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement, International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012.

P. Jindal and B. Singh, Analyzing the Security-Performance Tradeoff in Block Ciphers, International Conference on Computing, Communication and Automation “ICCCA2015”.
http://dx.doi.org/10.1109/ccaa.2015.7148425

G. Singh, A. Kumar, K. Singla and S. Sandha, Performance Evaluation of Symmetric Cryptography Algorithms, International Journal of Electronics & Communication Technology, 2011.

S.S. Preet and M. Raman, Comparison of Data Encryption Algorithms, International Journal of Computer Science and Communication, vol. 2, No. 1, January-June 2011, pp. 125-127.

Benhadjyoussef, N., Elhadjyoussef, W., Machhout, M., Torki, K., Tourki, R., A cryptographic processor for 32 bit embedded system with resource-constraints, (2013) International Review on Computers and Software (IRECOS), 8 (1), pp. 132-143.

FIPS PUB 46-3, Data Encryption Standard (DES), National Institute of Standards and Technology (October 1999).

National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), FIPS Publication 197 (2001).

M. Dworkin, Recommendation for block cipher modes of operation: methods and techniques, Gaithersburg: U.S.Doc/NIST (2001).
http://dx.doi.org/10.6028/nist.sp.800-38a

Y. Wu, NPCR and UACI Randomness Tests for Image Encryption, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.

J. Alireza and M. Abdolrasoul, Image Encryption Using Chaos and Block Cipher, Computer and Information Science.
http://dx.doi.org/10.5539/cis.v4n1p172

G.A. Sathishkumar, and K. Bhoopathy Bagan, A Novel Image Encryption Algorithm Using Pixel Shuffling and BASE 64 Encoding Based Chaotic Block Cipher, WSEAS Transactions on Computers, Vol.10, No. 6, 2011, pp. 169-178.

Bafandehkar, M., Yasin, S., Mahmod, R., A Literature Review on Scalar Recoding Algorithms in Elliptic Curve Cryptography, (2015) International Journal on Communications Antenna and Propagation (IRECAP), 5 (4), pp. 183-189.
http://dx.doi.org/10.15866/irecap.v5i4.5673

Ali, N., Sufian, Y., Rahma, A., Hossen, A., A Novel Multi Modification in AES Block Cipher Algorithm for Complexity Improvement, (2014) International Review on Computers and Software (IRECOS), 9 (6), pp. 901-905.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2019 Praise Worthy Prize