A novel parallel image encryption algorithm based on chaos

With rapid technology development, data sizes are increasing and more powerful hardware structures are needed to process these data. An alternative solution for this process is to parallel the transactions to be realized, to provide the time gain, increase the efficiency and reduce the transaction costs. In this article, a new chaos-based parallel encryption algorithm design is presented to meet this requirements. In the study, a new random number generator (RNG) and chaos-based parallel encryption algorithm are developed. Using developed RNG, confusion and encryption of pixel in images have been realized. Also parallel computing has been used to increase security and speedup the encryption. With the new parallel encryption algorithm, the security and performance tests of the image encryption application and the encryption process have been made. In addition, the evaluated performance of the parallel computing is described in speedup and efficiency.

[1]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[2]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[3]  Tao Xiang,et al.  Parallel image encryption algorithm based on discretized chaotic map , 2008 .

[4]  Jianguo Jiang,et al.  Multimedia Security: A Survey of Chaos-Based Encryption Technology , 2012 .

[5]  Sezgin Kaçar Analog circuit and microcontroller based RNG application of a new easy realizable 4D chaotic system , 2016 .

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[8]  Safya Belghith,et al.  Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.

[9]  Tingzhu Bai,et al.  Parallel encryption for multi-channel images based on an optical joint transform correlator , 2017 .

[10]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[11]  Donald W. Davies Some Regular Properties of the 'Data Encryption Standard' Algorithm , 1982, CRYPTO.

[12]  Thomas Rauber,et al.  Parallel Programming: for Multicore and Cluster Systems , 2010, Parallel Programming, 3rd Ed..

[13]  Zhongmeng Zhao,et al.  An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.

[14]  Muhammad Khurram Khan,et al.  Chaos-based secure satellite imagery cryptosystem , 2010, Comput. Math. Appl..

[15]  Dongdong Lin,et al.  Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits , 2016, IEEE MultiMedia.

[16]  Seiichi Uchida,et al.  A parallel image encryption method based on compressive sensing , 2012, Multimedia Tools and Applications.

[17]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[18]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[19]  Chunyan Han,et al.  A Parallel Encryption Algorithm for Color Images Based on Lorenz Chaotic Sequences , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[20]  Safwan El Assad,et al.  Improvement of the Security of ZigBee by a New Chaotic Algorithm , 2014, IEEE Systems Journal.

[21]  Edward F. Schaefer,et al.  A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.

[22]  Thomas Rauber,et al.  Parallel Programming , 2013, Springer Berlin Heidelberg.

[23]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[24]  Qing Zhou,et al.  A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..

[25]  Xing-yuan Wang,et al.  A new image alternate encryption algorithm based on chaotic map , 2014, Nonlinear Dynamics.

[26]  Tariq Shah,et al.  An efficient chaotic image encryption scheme , 2014, Neural Computing and Applications.

[27]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[28]  Zidong Wang,et al.  Image encryption using chaotic coupled map lattices with time-varying delays ☆ , 2010 .

[29]  I. Pehlivan,et al.  A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system , 2017 .

[30]  Xingyuan Wang,et al.  A novel chaotic block image encryption algorithm based on dynamic random growth technique , 2015 .

[31]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[32]  Gu Xing-sheng A Novel Chaos Optimization Algorithm Based on Parallel Computing , 2004 .

[33]  M. Yaghoobi,et al.  A new image encryption method: parallel sub-image encryption with hyper chaos , 2011, Nonlinear Dynamics.

[34]  Hossein Nezamabadi-pour,et al.  A novel parallel image encryption with chaotic windows based on logistic map , 2017, Comput. Electr. Eng..

[35]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[36]  Zbigniew J. Czech,et al.  Introduction to Parallel Computing , 2017 .

[37]  Tao Lin,et al.  A new parallel image cryptosystem based on 5D hyper-chaotic system , 2017, Signal Process. Image Commun..

[38]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[39]  Majid Khan,et al.  A novel image encryption scheme based on multiple chaotic S-boxes , 2015, Nonlinear Dynamics.

[40]  Alireza Jolfaei,et al.  A new approach to measure quality of image encryption , 2010 .

[41]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[42]  Tao Xie,et al.  Breaking a novel image encryption scheme based on improved hyperchaotic sequences , 2012, Nonlinear Dynamics.

[43]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[44]  Yaonan Wang,et al.  Hybrid parallel chaos optimization algorithm with harmony search algorithm , 2014, Appl. Soft Comput..

[45]  Joos Vandewalle,et al.  Weak Keys for IDEA , 1994, CRYPTO.

[46]  Yong Wang,et al.  An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications , 2017, J. Vis. Commun. Image Represent..

[47]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[48]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .