Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application

  • PDF / 2,885,055 Bytes
  • 24 Pages / 595.224 x 790.955 pts Page_size
  • 93 Downloads / 175 Views

DOWNLOAD

REPORT


Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption R. Vidhya1 · M. Brindha1 · N. Ammasai Gounden2

© Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract In this paper, a novel zig-zag scan-based feedback convolution algorithm for image encryption against differential attacks is proposed. The two measures Number of Pixel Change Rate (NPCR) and Unified Average Changed Intensity (UACI) are commonly utilized for analyzing the differential attacks. From the study of the existing papers, even though high Number of Pixel Change Rate and Unified Average Changed Intensity values are obtained, a few values lie in the critical range of αlevel significance which in turn increase the possibility of differential attacks. To overcome differential attacks, two aspects of scanning with different test cases are analyzed and from these analyses, it is concluded that zig-zag scan based feedback convolution in forward and reverse direction achieves good Number of Pixel Change Rate and Unified Average Changed Intensity without critical values. Zig-zag scan based feedback convolution in forward and reverse direction is enforced for key sequence generation and applied in diffusion process to achieve high level of security. Moreover, plain image related initial seed is also generated to overcome the chosen/known plain text attacks. Both numerical and theoretical analyses are performed to prove that the proposed encryption method is resistant to differential attacks. General security measures are carried out for the proposed method to validate its security level. From the simulations, it is shown that the proposed methodology has good keyspace, high key sensitivity, good randomness, and uniform distribution of cipher image pixels. Keywords Convolution · Differential cryptanalysis · Image encryption · Security

1 Introduction Due to the incredible development of information technology, numerous information/data is being transferred via telecommunication networks like internet, computer networks, telephone networks, TCP/IP networks, etc. The information may be a text or multimedia information like  M. Brindha

[email protected] R. Vidhya [email protected] N. Ammasai Gounden [email protected] 1

Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, Tamilnadu, India

2

Department of Electrical and Electronics and Engineering, National Institute of Technology, Tiruchirappalli, Tamilnadu, India

image, audio, video, etc. In today’s world, the security of information/data is questionable because of the development of network technologies. Particularly, image security is essential for many domains and at the same time conventional cryptographic algorithms like RSA, AES, and DES are not pertinent because of certain aspects of the image such as huge data size, high correlation, etc. Over the last two decades, chaotic system is utilized for image encryption due to the extrinsic features like er