A New Encryption Approach Based on Four-Square and Zigzag Encryption (C4CZ)

With the evolution and the development of data-processing tools and their pervasive scopes of applications, the need for data protection today has become a crucial necessity in order to reduce the number of incidents caused by non-authorized data accesses and to prevent malicious usage. With the purpose of maintaining a significantly high level of security, cryptography englobes the entirety of methods as well as a couple of techniques and tools aimed to assure data confidentiality. Indeed, this work’s main focus is a new approach based on a four-square encryption accompanied by a zigzag transformation. This approach allows us to provide the appropriate settings for the four-square technique and the new conception of a transformation that manages future plans. These last are immune to brute attacks and statistic attacks. Considering all of that, this exhaustive study will emphasize the reliability of this approach.

[1]  Zhu Wang,et al.  A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator , 2009 .

[2]  Ling Lü,et al.  Study on spatiotemporal chaos tracking synchronization of a class of complex network , 2012 .

[3]  Naveed Ahmed Azam,et al.  A novel image encryption scheme based on an elliptic curve , 2019, Signal Process..

[4]  Robert C. Hilborn,et al.  Chaos And Nonlinear Dynamics: An Introduction for Scientists and Engineers , 1994 .

[5]  Johan Håstad,et al.  Solving Simultaneous Modular Equations of Low Degree , 1988, SIAM J. Comput..

[6]  Mohammad Eshghi,et al.  Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.

[7]  Ling Cong,et al.  A general efficient method for chaotic signal estimation , 1999 .

[8]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[9]  Adrian Skrobek Cryptanalysis of chaotic stream cipher , 2007 .

[10]  M. Zarebnia,et al.  A combination chaotic system and application in color image encryption , 2017, ArXiv.

[11]  Annick Lesne Chaos in biology. , 2006 .

[12]  Xing-yuan Wang,et al.  A new image alternate encryption algorithm based on chaotic map , 2014, Nonlinear Dynamics.

[13]  Khalid Satori,et al.  Grayscale image encryption using shift bits operations , 2018, 2018 International Conference on Intelligent Systems and Computer Vision (ISCV).

[14]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[15]  H. Weidenmuller,et al.  Random Matrices and Chaos in Nuclear Physics , 2008, 0807.1070.

[16]  Xiaogang Wu,et al.  Parameter estimation only from the symbolic sequences generated by chaos system , 2004 .

[17]  Junjie Lu,et al.  A NOVEL FRACTIONAL-ORDER HYPERCHAOTIC SYSTEM AND ITS CIRCUIT REALIZATION , 2010 .

[18]  Mohammad Reza Mosavi,et al.  A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.

[19]  Khalid Satori,et al.  A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher , 2018, BDCA.

[20]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[21]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[22]  Brent Waters,et al.  Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption , 2019, IACR Cryptol. ePrint Arch..

[23]  X. Tong,et al.  An image encryption algorithm based on the perturbed high-dimensional chaotic map , 2015, Nonlinear Dynamics.