Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security

Cryptography has recently played a significant role in secure data transmissions and storages. Most conventional data encryption schemes are relatively complicated and complexity in encrypted keys is insufficient, resulting in long computational time and low degree of security against all types of attacks. Consequently, a highlysecured and robust data encryption scheme is necessary. This paper therefore presents the data encryption scheme based on a combination of Cellular Automata (CA) and a robust chaotic system that employs absolutevalue piecewise-linear nonlinearity. The proposed encryption scheme is not only applicable to image encryption but also extendable to text and Excel files. Simulation results reveal that the entropy of the encrypted image is nearly 8 corresponding to the image entropy theory, and the correlation coefficients of before-and-after encrypted images are close to zero. Besides, the histogram of the encrypted image of pixel values in the range (0-255) is apparently flat, indicating that the color in image is fully distributed. Such results indicate that the proposed data encryption scheme offers a high level of security with fast processing time duration. The implementation of image encryption Android application is demonstrated. Comparisons to other related approaches are also included.

[1]  Chin-Chen Chang,et al.  Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values , 2015 .

[2]  Kai Wang,et al.  On the security of 3D Cat map based symmetric image encryption scheme , 2005 .

[3]  Guanrong Chen,et al.  The compound structure of a new chaotic attractor , 2002 .

[4]  Chun-Liang Lin,et al.  Text encryption using ECG signals with chaotic Logistic map , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.

[5]  Ismail Amr Ismail,et al.  A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..

[6]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[7]  Thomas Brett Kirk,et al.  Two-dimensional fast Fourier transform and power spectrum for wear particle analysis , 1997 .

[8]  O. Rössler An equation for continuous chaos , 1976 .

[9]  Cheng-Chi Lee,et al.  Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol , 2015, Int. J. Netw. Secur..

[10]  Yuan Ji,et al.  A Practical Chaotic Secure Communication Scheme Based on Lorenz Model , 2006, 2006 4th IEEE International Conference on Industrial Informatics.

[11]  Hui-Feng Huang,et al.  Convertible Multi-authenticated Encryption Scheme for Data Communication , 2015, Int. J. Netw. Secur..

[12]  Mintu Philip,et al.  AN ENHANCED CHAOTIC IMAGE ENCRYPTION , 2011 .

[13]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[14]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .

[15]  Banlue Srisuchinwong Chaos in a Fractional-Order Jerk Model Using Tanh Nonlinearity , 2010 .

[16]  Marco Tomassini,et al.  Cryptography with cellular automata , 2001, Appl. Soft Comput..

[17]  Steven Guan,et al.  2-D CA variation with asymmetric neighborship for pseudorandom number generation , 2004, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[18]  Kamlesh Gupta,et al.  New Approach for Fast Color Image Encryption Using Chaotic Map , 2011, J. Information Security.

[19]  Feng Huang,et al.  Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm , 2009 .

[20]  Albert Y. Zomaya,et al.  Cellular automata computations and secret key cryptography , 2004, Parallel Comput..

[21]  Xin Ma,et al.  A Novel Chaos-based Image Encryption Scheme with an Improved Permutation Process , 2011 .

[22]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[23]  Bahram Rashidi,et al.  A High Speed and Low Power Image Encryption with 128-Bit AES Algorithm , 2012 .

[24]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[25]  Kwok-Wo Wong,et al.  A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.