A Stream Cipher Algorithm based on Nonlinear Combination Generator with Enhanced Security for Image Encryption

paper describes a novel approach for image encryption using stream cipher algorithm based on non linear combination generator. This work aims to enhance the security of encrypted image. The work is based on the use of several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pair wise cop rimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler's, Sarkar and al.'s bounds. This proposed approach is simple and highly efficient. The proposed algorithm was evaluated through a set of tests. In order to have a global idea of the whole performance of system, our tests included visual tests, histogram analysis, key space analysis, Berlkamp-Massey attack, correlation attack and algebraic attack. The results of the experimental tests demonstrate that the proposed system is highly key sensitive, highly resistant to noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack and algebraic attack. The system is robust which makes it a potential candidate for image encryption.

[1]  Liu Xiangdong,et al.  Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation , 2008 .

[2]  Belmeguenai Aissa,et al.  Image encryption using stream cipher algorithm with nonlinear filtering function , 2011, 2011 International Conference on High Performance Computing & Simulation.

[3]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[4]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[5]  Claude Carlet On the Coset Weight Divisibility and Nonlinearity of Resilient and Correlation-Immune Functions , 2001, SETA.

[6]  Elwyn R. Berlekamp,et al.  Algebraic coding theory , 1984, McGraw-Hill series in systems science.

[7]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.

[8]  Thomas Johansson,et al.  Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.

[9]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[10]  Dong Hoon Lee,et al.  Algebraic Attacks on Summation Generators , 2004, FSE.

[11]  Thomas Johansson,et al.  Fast Correlation Attacks Based on Turbo Code Techniques , 1999, CRYPTO.

[12]  Alireza Jolfaei,et al.  A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1 , 2010, 2010 International Conference on Artificial Intelligence and Computational Intelligence.

[13]  Anne Canteaut,et al.  Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.

[14]  Alireza Jolfaei,et al.  An applied imagery encryption algorithm based on shuffling and baker's map , 2010 .

[15]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[16]  Frederik Armknecht,et al.  Improving Fast Algebraic Attacks , 2004, FSE.

[17]  V. Strassen Gaussian elimination is not optimal , 1969 .

[18]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.