Color image encryption based on one-time keys and robust chaotic maps

We designed a stream-cipher algorithm based on one-time keys and robust chaotic maps, in order to get high security and improve the dynamical degradation. We utilized the piecewise linear chaotic map as the generator of a pseudo-random key stream sequence. The initial conditions were generated by the true random number generators, the MD5 of the mouse positions. We applied the algorithm to encrypt the color image, and got the satisfactory level security by two measures: NPCR and UACI. When the collision of MD5 had been found, we combined the algorithm with the traditional cycle encryption to ensure higher security. The ciphered image is robust against noise, and makes known attack unfeasible. It is suitable for application in color image encryption.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[3]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[4]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[5]  Xiaogang Wu,et al.  Parameter estimation only from the symbolic sequences generated by chaos system , 2004 .

[6]  A. Pisarchik,et al.  Image encryption with chaotically coupled chaotic maps , 2008 .

[7]  M. Baptista Cryptography with chaos , 1998 .

[8]  Guanrong Chen,et al.  A stream cipher based on a spatiotemporal chaotic system , 2007 .

[9]  Xingyuan Wang,et al.  Cryptanalysis and improvement on a cryptosystem based on a chaotic map , 2009, Comput. Math. Appl..

[10]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[11]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[12]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[13]  Kwok-Wo Wong,et al.  A true random number generator based on mouse movement and chaotic cryptography , 2009 .

[14]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[15]  Carlos Cid,et al.  Recent developments in cryptographic hash functions: Security implications and future directions , 2006, Inf. Secur. Tech. Rep..

[16]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[17]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[18]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[19]  Eric Thompson MD5 collisions and the impact on computer forensics , 2005, Digit. Investig..

[20]  Safya Belghith,et al.  OCML-based colour image encryption , 2009 .