A modified serpent based algorithm for image encryption

According to the fast progression of digital communication systems, information security becomes indispensable in data exchange and storage. There are wide uses of images in medical and industrial processes, so it is necessary to sustain the confidential image's data from unauthorized access and disclosures. This paper proposes a new modification on the Serpent algorithm for image's encryption which based on chaotic mapping and cyclic group substitution instead of byte substitution transformation (DES S-Box) which will decrease the number of rounds and the time usage. A comparison with the classical AES will be declared. The empirical results approved that the modified encryption algorithm provides comparable security and higher performance than the classical Serpent. Elaborated results in terms of implementation, security analysis and statistical tests are declared. Comparative study with classical Serpent encryption algorithms is shown the notability of our modification.

[1]  René Schoof,et al.  The Discrete Logarithm Problem , 2016, Open Problems in Mathematics.

[2]  Ali E. Taki,et al.  Implementation of AES Algorithm in MicroController Using PIC18F452 , 2013 .

[3]  Bruce Schneier,et al.  Improved Cryptanalysis of Rijndael , 2000, FSE.

[4]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[5]  Mohammad A. Karim,et al.  Color image encryption using double random phase encoding , 1999 .

[6]  James F. Dray,et al.  Advanced Encryption Standard (AES) , 2001 .

[7]  Salma M. Saif,et al.  Text and Biomedical Images Disguising using Advanced Encryption Standard , 2013 .

[8]  Hassan M. Elkamchouchi,et al.  New encryption technique using the meaning of location algorithm , 2015, 2015 9th International Conference on Application of Information and Communication Technologies (AICT).

[9]  Mai Hossam Taher HARDWARE IMPLEMENTATION OF THE SERPENT BLOCK CIPHER USING FPGA TECHNOLOGY , 2014 .

[10]  M. Baptista Cryptography with chaos , 1998 .

[11]  Iwao Sasase,et al.  A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.

[12]  Xiaojun Tong,et al.  A Novel Image Encryption Scheme Based On Feedback and 3D Baker , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Salma M. Saif,et al.  Hardware Implementation of Biomedical Data Encryption using FPGA , 2014 .

[14]  Vincent Rijmen,et al.  The Wide Trail Design Strategy , 2001, IMACC.

[15]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[16]  Eli Biham,et al.  Related-Key Impossible Differential Attacks on 8-Round AES-192 , 2006, CT-RSA.

[17]  Hongjun Liu,et al.  Chaos-based color image block encryption scheme using S-box , 2014 .

[18]  Alfred Menezes,et al.  The Discrete Logarithm Problem in GL(n, q) , 1997, Ars Comb..

[19]  Ross Anderson,et al.  Serpent: A Proposal for the Advanced Encryption Standard , 1998 .

[20]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[21]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .