A Survey on Block Cipher and Chaotic Based Encryption Techniques

  IJCTT-book-cover
 
         
 
© 2021 by IJCTT Journal
Volume-69 Issue-3
Year of Publication : 2021
Authors : Jyoti Kansari, Avinash Dhole, Yogesh Rathore
DOI :  10.14445/22312803/IJCTT-V69I3P110

How to Cite?

Jyoti Kansari, Avinash Dhole, Yogesh Rathore, "A Survey on Block Cipher and Chaotic Based Encryption Techniques," International Journal of Computer Trends and Technology, vol. 69, no. 3, pp. 52-59, 2021. Crossref, 10.14445/22312803/IJCTT-V69I3P110

Abstract
As we know the data transmission is the need for today’s world. We cannot imagine our life without multimedia applications and data transmission. As we have seen, there are different attacks over data happening like information theft, hacking, phishing, vishing, smishing, etc. Here it is very important to make sure that transactions over media must be safe that means no attack can occur. Hence security becomes an essential task. The multimedia data includes text, image, and audio and video type data. There are several techniques for making our transaction secure are available. The newest enciphering technique has enhanced the safety of multimedia data from illegal operations. The multimedia enciphering method converts original data to others that are not visualized easily and are named as cipher-text. The process to convert a plain text to ciphered form is named as encryption process, and the inverting process of the encryption process that is transforming cipher-text to the original form is named as decryption process. Its numerous applications like multimedia transmission systems, telemedicine, military communication, and remedial imaging. Here, there are quite a lot of conventional encoding algorithms offered. Mainly three conventional algorithms are widely used. They are International Data Encryption Algorithm shorted as IDEA, RSA, and Advanced Encryption Standard shorted as AES. These algorithms are only applicable for the encryption of text and binary data. There is another method used for encryption in which encryption is performed by using a key. On the other hand, the typical algorithms are incompetent to use them in a direct way in multimedia data and color image encryption because of the high correlation among pixels. This paper analyzes different methods of encryption and decryption.

Keywords
Confusion, Diffusion, Secret Key, bitwise transformation, Henon map, Chaos.

Reference
[1] International Conference on Computing, Communication, and Automation (ICCCA2017) Abhishek Vichare, Tania Jose, Jagruti Tiwari, Uma Yadav, Data Security using Authenticated Encryption and Decryption Algorithm for Android Phones.
[2] Atta Ullah, Sajjad shaukat Jamal, Tariq shah, A novel scheme for image encryption using substitution box and chaotic system., (2017).
[3] S. J. Sheela1, K. V. Suresh1, Deepaknath Tandur2, Image encryption based on modified henon map using hybrid chaotic shift transform., (2018).
[4] Han Qiu a, Gerard memmia, Xuan chen b, Jian xiong c, DC coefficient recovery for JPEG images in ubiquitous communication systems (2019).
[5] Rohit k. Singh, Tajunnisa begum, Lawrence borah, Debabrata samanta, (ICISC-2017), Text Encryption - character jumbling.
[6] Shabieh Farwa1*, Tariq Shah2, and Lubna Idrees1, A highly nonlinear S?box based on a fractional linear transformation Farwa et al. SpringerPlus (2016).
[7] Ahmed M. Elshamy1,5 Fathi E. Abd El-Samie1 Osama S. Faragallah2,6 Elsayed M. Elshamy2 Hala S. El-sayed3 S. F. Elzoghdy4,6 Ahmed N. Z. Rashed1 Abd El-Naser A. Mohamed1 Ahmad Q. Alhamad5, Optical image cryptosystem using double random phase encoding and Arnold`s Cat map (2017).
[8] Amna Shifa1, Muhammad S. Afgan1, Mamoona N. Asghar1, Martin Fleury2, Imran Memon3, Saima Abdullah1, and Nadia Rasheed4, Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering (2018).
[9] Jiantao Zhou, Member, IEEE, Weiwei Sun, Student Member, IEEE, Li Dong, Student Member, IEEE, Xianming Liu, Member, IEEE, Oscar C. Au, Fellow, IEEE, and Yuan Yan Tang, Fellow, IEEE, Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation (2016).
[10] Rafik Hamza, Khan Muhammad, Arunkumar Nachiappan Gustavo Ramírez González, Hash based Encryption for Keyframes of Diagnostic Hysteroscopy.
[11] Unal cavu¸so?glu, Sezgin kaçar, Ahmet zengin, Ihsan pehlivan, A novel hybrid encryption algorithm based on chaos and S-AES algorithm (2018).
[12] Mohsen A. M. El-bendary, FEC merged with double security approach based on encrypted image steganography for a different purpose in the presence of noise and different attacks (2016).
[13] Q. N. Natsheh*, B. Li, A. G. Gale, Security of multi-frame DICOM images using XOR encryption Approach (2016).
[14] Chunhu Li, Guangchun Luo, Ke Qin, Chunbao Li, An image encryption scheme based on chaotic tent map (2016).
[15] Majid Khan1, Zeeshan Asghar1, A novel construction of substitution box for image encryption applications with Gingerbread man chaotic map and S8(2016).
[16] Zeinab Fawaz a, HassanNoura b, Ahmed Mostefaoui, An efficient and secure cipher scheme for image confidentiality preservation (2016).
[17] Shabieh Farwa, Nazeer Muhammad, Tariq Shah, Sohail Ahmad, A Novel Image Encryption Based on Algebraic S-box and Arnold Transform (2017).
[18] Amrane Houas, Zouhir Mokhtari, Kamal Eddine Melkemi, Abdel malik Boussaad, A novel binary image encryption algorithm supported diffuse Representation.
[19] Gaytri, Shelza suri, Dr. Ritu Vijay, An implementation and performance evaluation of an improved chaotic image encryption approach (2016).
[20] Asma chaouch, Belgacem bouallegue, Ouni bouraoui Software, Application for simulation-based AES,RSA and Elliptic-Curve Algorithms (2016).
[21] Mumthas sa, Lijiya ab, Transform Domain Video Steganography Using RSA, Random DNA Encryption and Huffman Encoding (2017).
[22] Yijing Xun1, Zhijiang Li2(&), Xiaolu Zhong2, Sheng Li2, Jiawang Su2, and Ke Zhang2, Dual Anti-counterfeiting of QR Code Based on Information Encryption and Digital Watermarking (2019).
[23] Kahate, A., Cryptography and network security. Tata McGrawHill Education., (2013).
[24] Adamovic, S., Sarac, M., Stamenkovic, D., & Radovanovic, D., The importance of using software tools for learning modern cryptography. Int. J. Eng. Educ., 34(1)(2018) 256-262.
[25] Kirti Sapra and Swati Kapoor, Modified Image Encryption Technique, SSRG International Journal of Electronics and Communication Engineering 1(6) (2014) 21-25.
[26] Subburaj.V, Srinivasan.M, Surendiran, R Sundaranarayanan, R. (2010). “DDoS Defense Mechanism by Applying Stamps using Cryptography”. International Journal of Computer Applications. 1(6), ISSN: 0975 – 8887, pp.48-52. DOI: 10.5120/143-262.