Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption

In this paper, we propose a new modified version of Advanced Encryption Standard (AES) using chaotic key generator for satellite imagery security. We analyze and examine the Modified AES and chaotic key generator to enhance the key space and sensitivity, performance, and security level for reducing the risk of different attacks. The chaotic key generator utilizes multiple chaotic maps named as Logistic, Henon, Tent, Cubic, Sine and Chebyshev. The proposed algorithm presents numerous interesting and attractive features, such as a high level of security, large enough key-space with improved key sensitivity, pixel distributing uniformity and an acceptable encryption and decryption speed. The presented algorithm is ideal for real-time applications to deal with redundant, bulky, complex and stubborn satellite imagery.

[1]  Zbigniew Kotulski,et al.  Discrete chaotic cryptography ( DCC ) . New method for secure communication , 2001 .

[2]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[3]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[4]  R A Williamson REMOTE SENSING AND TRANSPORTATION SECURITY , 2002 .

[5]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[6]  Máire O'Neill,et al.  Rijndael FPGA Implementations Utilising Look-Up Tables , 2003, J. VLSI Signal Process..

[7]  Zbigniew Kotulski,et al.  Discrete chaotic cryptography , 1997 .

[8]  Matti Tommiska,et al.  A fully pipelined memoryless 17.8 Gbps AES-128 encryptor , 2003, FPGA '03.

[9]  Kris Gaj,et al.  Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays , 2001, CT-RSA.

[10]  Kwok-Wo Wong,et al.  A chaotic cryptography scheme for generating short ciphertext , 2003 .

[11]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[12]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Donald W. Davies,et al.  Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.

[15]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[16]  M.Z.H. Sarker,et al.  A Cost Effective Symmetric Key Cryptographic Algorithm for Small Amount of Data , 2005, 2005 Pakistan Section Multitopic Conference.

[17]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[18]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[19]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[20]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[21]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[22]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[23]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[24]  M. Baptista Cryptography with chaos , 1998 .

[25]  M. Usama,et al.  Classical and chaotic encryption techniques for the security of satellite images , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[26]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[27]  Z. Kotulski,et al.  APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD , 1999 .

[28]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[29]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[30]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[31]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[32]  Ingrid Verbauwhede,et al.  A 21.54 Gbits/s fully pipelined AES processor on FPGA , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.

[33]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[34]  Zhong-Ping Jiang,et al.  A note on chaotic secure communication systems , 2002 .

[35]  K. Wong,et al.  A Modified Chaotic Cryptographic Method , 2001, Communications and Multimedia Security.