Mythili, P; Paul, A J; Poulose Jacob,K(IEEE, September 22, 2011)
[+]
[-]
Abstract:
In this paper we propose a cryptographic
transformation based on matrix manipulations for image
encryption. Substitution and diffusion operations, based on the
matrix, facilitate fast conversion of plaintext and images into
ciphertext and cipher images. The paper describes the encryption
algorithm, discusses the simulation results and compares with
results obtained from Advanced Encryption Standard (AES). It
is shown that the proposed algorithm is capable of encrypting
images eight times faster than AES.
Description:
Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE
Mythili, P; Paul, A J; Poulose Jacob,K(International Journal of Computer Applications® (IJCA), 2011)
[+]
[-]
Abstract:
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure
Description:
International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011