Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
ISSN : 0974 - 9330Journal from gdlhub / 2017-08-14 11:52:34
Oleh : Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2, International Journal of Network Security & Its Applications
Dibuat : 2012-06-26, dengan 1 file
Keyword : S Box, Chaos, Non Linearity, Symmetric Cryptosystems, Blowfish, Image Encryption
Subjek : Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Url : http://airccse.org/journal/nsa/0711ijnsa15.pdf
Sumber pengambilan dokumen : Internet
The rapid and extensive usage of Internet in the present decade has put forth information security as an
utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety
of data including text, images, audio and video. With the increasing use of digital techniques for
transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity
and authenticity of the information poses a major challenge for security professionals and hassled to the
major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component
of symmetric key algorithms, which performs substitution and is typically used to make the relationship
between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish
makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory.
Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and
ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt
analysis reported against its design till date because of its salient design features including the key
dependant s boxes and complex key generation process. However every new key requires pre-processing
equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it
prevents its usage in memory limited applications and embedded systems. The modified design of S boxes
maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time
complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed
design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results
on text and Image Encryption show that the modified design of key generation continues to offer the same
level of security as the original Blowfish cipher with a less computational overhead in key generation.
The rapid and extensive usage of Internet in the present decade has put forth information security as an
utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety
of data including text, images, audio and video. With the increasing use of digital techniques for
transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity
and authenticity of the information poses a major challenge for security professionals and hassled to the
major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component
of symmetric key algorithms, which performs substitution and is typically used to make the relationship
between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish
makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory.
Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and
ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt
analysis reported against its design till date because of its salient design features including the key
dependant s boxes and complex key generation process. However every new key requires pre-processing
equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it
prevents its usage in memory limited applications and embedded systems. The modified design of S boxes
maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time
complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed
design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results
on text and Image Encryption show that the modified design of key generation continues to offer the same
level of security as the original Blowfish cipher with a less computational overhead in key generation.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | International Journal of Network Security & Its Applications |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
Jurnal 120
File : Jurnal 120.PDF
(728013 bytes)