Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer

Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption

Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption

ISSN : 0974 - 9330
Journal from gdlhub / 2017-08-14 11:52:34
By : Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2, International Journal of Network Security & Its Applications
Created : 2012-06-26, with 1 files

Keyword : S Box, Chaos, Non Linearity, Symmetric Cryptosystems, Blowfish, Image Encryption
Subject : Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Url : http://airccse.org/journal/nsa/0711ijnsa15.pdf
Document Source : Internet

The rapid and extensive usage of Internet in the present decade has put forth information security as an


utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety


of data including text, images, audio and video. With the increasing use of digital techniques for


transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity


and authenticity of the information poses a major challenge for security professionals and hassled to the


major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component


of symmetric key algorithms, which performs substitution and is typically used to make the relationship


between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish


makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory.


Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and


ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt


analysis reported against its design till date because of its salient design features including the key


dependant s boxes and complex key generation process. However every new key requires pre-processing


equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it


prevents its usage in memory limited applications and embedded systems. The modified design of S boxes


maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time


complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed


design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results


on text and Image Encryption show that the modified design of key generation continues to offer the same


level of security as the original Blowfish cipher with a less computational overhead in key generation.

Description Alternative :

The rapid and extensive usage of Internet in the present decade has put forth information security as an


utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety


of data including text, images, audio and video. With the increasing use of digital techniques for


transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity


and authenticity of the information poses a major challenge for security professionals and hassled to the


major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component


of symmetric key algorithms, which performs substitution and is typically used to make the relationship


between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish


makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory.


Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and


ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt


analysis reported against its design till date because of its salient design features including the key


dependant s boxes and complex key generation process. However every new key requires pre-processing


equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it


prevents its usage in memory limited applications and embedded systems. The modified design of S boxes


maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time


complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed


design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results


on text and Image Encryption show that the modified design of key generation continues to offer the same


level of security as the original Blowfish cipher with a less computational overhead in key generation.

Give Comment ?#(0) | Bookmark

PropertyValue
Publisher IDgdlhub
OrganizationI
Contact NameHerti Yani, S.Kom
AddressJln. Jenderal Sudirman
CityJambi
RegionJambi
CountryIndonesia
Phone0741-35095
Fax0741-35093
Administrator E-mailelibrarystikom@gmail.com
CKO E-mailelibrarystikom@gmail.com

Print ...

Contributor...

  • , Editor: fachruddin

Downnload...

  • Download for member only.

    Jurnal 120
    Download Image
    File : Jurnal 120.PDF

    (728013 bytes)