Image observation on the modified ECB operations in Advanced Encryption Standard

This paper presents an image encryption instead of text to observe the modified ECB mode operations in AES processing. If a plaint image contains some groups of identical colors, then the encrypted cipher image may appear some kinds of patterns at the related areas. This is a limitation of AES in ECB mode. To overcome the limitation, a straight forward approach is to make those identical colors different or to remove them. For making those inputs different before encryption, three number sequences, which are the sequential number from counter output, the non-sequential number from accumulator output and the random numbers generated from cipher function itself, are added to the image inputs. By using the different numbers and the different ways of addition, the modifications result in obtaining seven modes of operation, and four of them were defined in NIST publications. To remove the identical inputs, image compression before encryption is used. Though by adding compression and decompression seems to make the whole process more complicated, yet the processing time decreases due to the shrinking file size after image compression. These two approaches to modify ECB operation work very well as shown in the experiments.

[1]  Christof Paar,et al.  IT security project: implementation of the Advanced Encryption Standard (AES) on a smart card , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[2]  Morris J. Dworkin,et al.  SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[3]  A. Velmurugan,et al.  High Speed VLSI Design CCMP AES Cipher for WLAN (IEEE 802.11i) , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[4]  Keshab K. Parhi,et al.  High-speed VLSI architectures for the AES algorithm , 2004, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[5]  Arshad Aziz,et al.  An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[6]  Palash Sarkar,et al.  A General Construction of Tweakable Block Ciphers and Different Modes of Operations , 2008, IEEE Transactions on Information Theory.

[7]  Xuejie Zhang,et al.  Design of an extremely high performance counter mode AES reconfigurable processor , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).

[8]  Chung-Cheng Hsieh,et al.  Embedded a low area 32-bit AES for image encryption/decryption application , 2009, 2009 IEEE International Symposium on Circuits and Systems.

[9]  Ingrid Verbauwhede,et al.  Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors , 2006, IEEE Transactions on Computers.

[10]  H.C. Luong,et al.  Low Power VLSI Design for a RFID Passive Tag baseband System Enhanced with an AES Cryptography Engine , 2007, 2007 1st Annual RFID Eurasia.

[11]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.

[12]  Guido Bertoni,et al.  Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.

[13]  Helger Lipmaa,et al.  Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption , 2000 .

[14]  Vijay Kumar,et al.  Efficient Rijndael Encryption Implementation with Composite Field Arithmetic , 2001, CHES.

[15]  François Charot,et al.  Efficient Modular-Pipelined AES Implemenation in Counter Mode on ALTERA FPGA , 2003, FPL.

[16]  Rafael C. González,et al.  Digital image processing using MATLAB , 2006 .