A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation
- PDF / 6,244,525 Bytes
- 23 Pages / 439.37 x 666.142 pts Page_size
- 87 Downloads / 218 Views
A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation Sundas Tariq 2 & Majid Khan 1,2 & Abdullah Alghafis 3
& Muhammad Amin
1
Received: 6 September 2019 / Revised: 8 April 2020 / Accepted: 27 May 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
The digital information is transmitted through different communication channels with ease within no time. The sphere of digital world is evolving and become one of the key aspects of our daily lives. In this regard, confidentially to this digital information which are fundamentally transmitted over insecure line of communication is one of the mandatory concerns. This digital information is placed in different databases available online. In this article, our aim is to perform cryptanalysis of Logarithmic based image encryption scheme and investigate its potential key leakages by utilizing public key to recover its private key. Moreover, we have suggested chaos-based Logarithm scheme which is more secure. The Lorenz system is utilized in an anticipated mechanism which is sensitive to initial conditions and chaotic parameters. The proposed scheme is then authenticated by using available security performance benchmarks. To measure the security against different cryptographic attacks, we utilized the statistical analyses which are entropy and the correlation between the pixels, and the differential analyses which are number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI). In order to resist the brute force attacks, key sensitivity analyses and key space analyses is also performed. The randomness of proposed encryption scheme investigated through entropy and NIST randomness suit tests. An application on digital images is investigated. Also, we have compared our modified confidentiality scheme with existing benchmarks which suggested our encryption technique is quite reasonable for digital multimedia security. Keywords Confidentiality scheme . Lorenz chaotic system . Encryption
* Abdullah Alghafis [email protected]
1
Cyber and Information Security Lab (CISL), Institute of Space Technology, Islamabad, Pakistan
2
Department of Applied Mathematics and Statistics, Institute of Space Technology, Islamabad, Pakistan
3
King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia
Multimedia Tools and Applications
1 Introduction This world nowadays becomes a global village due to fast transmission of digital contents over an insecure communication line. The advanced era is fundamentally a fifth generation (5G) technology epoch with real time implementation. Currently, we are enjoying number of different online software applications in order to communicate with ease from any part of existing world. These digital mechanisms provide ease in our daily life. Moreover, through social media, we can also communicate with our associates far away from our geographical location with ease through different socially interconnected mediums. Most recently, trends by using t
Data Loading...