409 research outputs found
Review on DNA Cryptography
Cryptography is the science that secures data and communication over the
network by applying mathematics and logic to design strong encryption methods.
In the modern era of e-business and e-commerce the protection of
confidentiality, integrity and availability (CIA triad) of stored information
as well as of transmitted data is very crucial. DNA molecules, having the
capacity to store, process and transmit information, inspires the idea of DNA
cryptography. This combination of the chemical characteristics of biological
DNA sequences and classical cryptography ensures the non-vulnerable
transmission of data. In this paper we have reviewed the present state of art
of DNA cryptography.Comment: 31 pages, 12 figures, 6 table
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC)
for grayscale and color images. Our contributions to the image encryption
community include 1) we develop new Latin square image encryption primitives
including Latin Square Whitening, Latin Square S-box and Latin Square P-box ;
2) we provide a new way of integrating probabilistic encryption in image
encryption by embedding random noise in the least significant image bit-plane;
and 3) we construct LSIC with these Latin square image encryption primitives
all on one keyed Latin square in a new loom-like substitution-permutation
network. Consequently, the proposed LSIC achieve many desired properties of a
secure cipher including a large key space, high key sensitivities, uniformly
distributed ciphertext, excellent confusion and diffusion properties,
semantically secure, and robustness against channel noise. Theoretical analysis
show that the LSIC has good resistance to many attack models including
brute-force attacks, ciphertext-only attacks, known-plaintext attacks and
chosen-plaintext attacks. Experimental analysis under extensive simulation
results using the complete USC-SIPI Miscellaneous image dataset demonstrate
that LSIC outperforms or reach state of the art suggested by many peer
algorithms. All these analysis and results demonstrate that the LSIC is very
suitable for digital image encryption. Finally, we open source the LSIC MATLAB
code under webpage https://sites.google.com/site/tuftsyuewu/source-code.Comment: 26 pages, 17 figures, and 7 table
A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data
Recentlty, cryptography makes extensive use of different fields includingbioinformatics. The fundamental idea behind the cipher presented here is to transform any kind of binary message; such as text, sound tracks, and even images, into the form of a single-stranded DNA sequence. Subsequently, digraphs of codon triplets are encrypted using a grid of 8x8 codon matrix that is randomly constructed according to some secret key. Although the encryption/decryption rules were kept almost the same as the classical 5x5 Playfair, using the DNA encoding step makes it almost impossible for an attacker to perform a frequency analysis on that vast number of character digraphs. Furthermore, an interweaving step is added to scramble the encrypted sequence offering more randomness. When compared with other modifications of the Playfair cipher, the proposed method showed a number of advantages including the ability to cipher any type of digital media, the elimination of plain-text preprocessing step, and the applicability to be integrated into larger security systems such as DNA steganography. Furthermore, due to the very weak correlation between cipher-data and original message, the proposed method shows a strong robustness against cipher attacks.DOI:http://dx.doi.org/10.11591/ijece.v4i1.496
Joint block and stream cipher based on a modified skew tent map
Image encryption is very different from that of texts due to the bulk data capacity and the
high redundancy of images. Thus, traditional methods are difficult to use for image encryption
as their pseudo-random sequences have small space. Chaotic cryptography use chaos
theory in specific systems working such as computing algorithms to accomplish dissimilar
cryptographic tasks in a cryptosystem with a fast throughput. For higher security, encryption
is the approach to guard information and prevent its leakage. In this paper, a hybrid encryption
scheme that combines both stream and block ciphering algorithms is proposed in order
to achieve the required level of security with the minimum encryption time. This scheme is
based on an improved mathematical model to cover the defects in the previous discredited
model proposed by Masuda. The proposed chaos-based cryptosystem uses the improved
Skew Tent Map (STM) RQ-FSTM as a substitution layer. This map is based on a lookup
table to overcome various problems, such as the fixed point, the key space restrictions, and
the limitation of mapping between plain text and cipher text. It uses the same map as a generator
to change the byte position to achieve the required confusion and diffusion effects.
This modification improves the security level of the original STM. The robustness of the
proposed cryptosystem is proven by the performance and the security analysis, as well as
the high encryption speed. Depending on the results of the security analysis the proposed
system has a better dynamic key space than previous ones using STM, a double encryption
quality and a better security analysis than others in the literature with speed convenience to
real-time applications
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN
The Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data’s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it’s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table
- …