Lightweight, dynamic and efficient image encryption scheme

Recently, there has been a growing attention for Chaos-based image encryption algorithms. This class of algorithms relies on embedded chaotic maps to ensure a high security level with minimal performance overhead. One such algorithm, which we refer to as NCIES, was proposed recently, and the authors claimed that the algorithm achieves the required cryptographic properties with just a single round. In this paper, we first assess the performance of the NCIES cipher and we show that a single round is not enough for this cipher to ensure the desired cryptographic properties. In this context, we describe how such a cipher is vulnerable to a chosen plaintext/ciphertext attack. Next, we propose a new lightweight dynamic key-dependent cipher scheme that can address and overcome the issues identified in the NCIES cipher and other recent lightweight image encryption schemes. The proposed cipher is designed in a way to achieve a good balance between the latency, the required resources, and the security level when compared to recent chaotic image cipher schemes.

[1]  Jason Smith,et al.  SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..

[2]  Kyoji Shibutani,et al.  Piccolo: An Ultra-Lightweight Blockcipher , 2011, CHES.

[3]  Ana Cristina Dascalescu,et al.  A new hyperchaotic map and its application in an image encryption scheme , 2014, Signal Process. Image Commun..

[4]  Zhiliang Zhu,et al.  An efficient image encryption scheme using lookup table-based confusion and diffusion , 2015, Nonlinear Dynamics.

[5]  Bhaskar Mondal,et al.  A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..

[6]  S. Kyoji,et al.  Piccolo: An Ultra-Lightweight Blockcipher , 2011 .

[7]  Safwan El Assad,et al.  A new chaos-based image encryption system , 2016, Signal Process. Image Commun..

[8]  Xiaojing Wang,et al.  Image Encryption Based on Bivariate Polynomials , 2008, CSSE.

[9]  Mohammad Eshghi,et al.  Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.

[10]  Andrea C. Arpaci-Dusseau,et al.  Error propagation analysis for file systems , 2009, PLDI '09.

[11]  Kwok-Tung Lo,et al.  Breaking an Image Encryption Algorithm Based on Chaos , 2010, Int. J. Bifurc. Chaos.

[12]  Ali Chehab,et al.  A new efficient lightweight and secure image cipher scheme , 2017, Multimedia Tools and Applications.

[13]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[14]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[15]  Shay Gueron,et al.  Intel's New AES Instructions for Enhanced Performance and Security , 2009, FSE.

[16]  Thomas Peyrin,et al.  The LED Block Cipher , 2011, IACR Cryptol. ePrint Arch..

[17]  Xing-yuan Wang,et al.  Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .

[18]  A. A-A Gutub,et al.  Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[19]  Anne Canteaut,et al.  PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..

[20]  Wenling Wu,et al.  LBlock: A Lightweight Block Cipher , 2011, ACNS.

[21]  Reza Ebrahimi Atani,et al.  A novel image encryption algorithm based on hash function , 2010, 2010 6th Iranian Conference on Machine Vision and Image Processing.

[22]  Hassan N. Noura,et al.  An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..

[23]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .

[24]  Wei Xiang,et al.  Error resilience performance evaluation of H.264 I-frame and JPWL for wireless image transmission , 2010, 2010 4th International Conference on Signal Processing and Communication Systems.

[25]  Hassan N. Noura,et al.  An efficient and secure cipher scheme for images confidentiality preservation , 2016, Signal Process. Image Commun..

[26]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[27]  C. K. Huang,et al.  Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system , 2013, Telecommun. Syst..

[28]  Aniruddha Bhattacharjya,et al.  Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks , 2013, SSCC.

[29]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[30]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[31]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[32]  Yinglong Wang,et al.  Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations , 2008, 2008 International Conference on Computational Intelligence and Security.

[33]  Adnan Abdul-Aziz Gutub,et al.  Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.

[34]  Hassan N. Noura,et al.  ERSS-RLNC: Efficient and robust secure scheme for random linear network coding , 2014, Comput. Networks.

[35]  Zhu Wang,et al.  A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator , 2009 .

[36]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[37]  Kazuhiko Minematsu,et al.  $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.

[38]  Nasharuddin Zainal,et al.  High Definition Image Encryption Algorithm Based on AES Modification , 2014, Wirel. Pers. Commun..

[39]  Christophe De Vleeschouwer,et al.  Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..

[40]  Daesung Kwon,et al.  LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors , 2013, WISA.

[41]  Anil Kumar,et al.  Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map , 2010, ICISTM.

[42]  Rengarajan Amirtharajan,et al.  Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.

[43]  Carmen R. Wilson VanVoorhis,et al.  Understanding Power and Rules of Thumb for Determining Sample Sizes , 2007 .

[44]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[45]  Jung Hwan Song,et al.  On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher , 2006, ICISC.

[46]  S. Li,et al.  Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .

[47]  Rafat Parveen,et al.  Wavelet based partial image encryption , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.

[48]  G. Hommel,et al.  Confidence interval or p-value?: part 4 of a series on evaluation of scientific publications. , 2009, Deutsches Arzteblatt international.

[49]  Manoj Kumar,et al.  FeW: A Lightweight Block Cipher , 2019, IACR Cryptol. ePrint Arch..

[50]  Khumanthem Manglem Singh,et al.  A robust image encryption scheme based on chaotic system and elliptic curve over finite field , 2017, Multimedia Tools and Applications.

[51]  Nicky Mouha,et al.  Report on Lightweight Cryptography , 2017 .

[52]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[53]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[54]  Sean O'Melia,et al.  Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[55]  Irina Filip,et al.  Challenges and perspectives of child labor , 2018, Industrial psychiatry journal.

[56]  Feng Huang,et al.  Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm , 2009 .

[57]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.