198
Views
20
CrossRef citations to date
0
Altmetric
Original Articles

An enhanced chaotic key‐based RC5 block cipher adapted to image encryption

Pages 925-943 | Received 03 Sep 2010, Accepted 11 Nov 2011, Published online: 06 Mar 2012

References

  • Ahmed , HEH , Kalash , HM and Faragallah , OS . 2007 . An Efficient Chaos‐Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption . An International Journal of Computing and Informatics , 31 : 121 – 129 .
  • Alvarez , G and Li , S . 2006 . Some Basic Cryptographic Requirements for Chaos‐based Cryptosystems . International Journal of Bifurcation Chaos , 16 : 1 – 8 .
  • Alvarez , G , Montoya , F and Romera , M . 2003 . Cryptanalysis of an Ergodic Chaotic Cipher . Physics Letters A , 311 : 172 – 179 .
  • Alvarez , G , Montoya , F , Romera , M and Pastor , G . 2004 . Cryptanalysis of Dynamic Look‐up Table Based Chaotic Cryptosystems . Physics Letters A , 326 : 211 – 218 .
  • Amin , M , Faragallah , OS and Abd El‐Latif , AA . 2010 . A Chaotic Block Cipher Algorithm for Image Cryptosystems . Communications in Nonlinear Science and Numerical Simulation , 15 : 3484 – 3497 .
  • Arroyo , D . Alvarez, G., and Li, S. (2008a), ‘Some Hints for the Design of Digital Chaos‐based Cryptosystems: Lessons Learned From Cryptanalysis’, http://arxiv.org/abs/0812.0765v1
  • Arroyo , D , Li , C , Li , S , Alvarez , G and Halang , WA . 2008b . Cryptanalysis of an Image Encryption Scheme based on a New Total Shuffling Algorithm . Chaos, Solitons and Fractals , 41 : 2613 – 2616 .
  • Behnia , S , Akhshani , A , Akhavan , A and Mahmodi , H . 2007 . Applications of Tripled Chaotic Maps in Cryptography . Chaos, Solitons and Fractals , 40 : 505 – 519 .
  • Chang , CC , Hwang , MS and Chen , TS . 2001 . A New Encryption Algorithm for Image Cryptosystems . Journal of Systems and Software , 58 : 83 – 91 .
  • Handschuh , H and Heys , HM . 1999 . “ A Timing Attack on RC5 ” . In SAC’98 , Edited by: Tavares , S and Meijer , H . 306 – 318 . Heidelberg , Berlin : Springer, LCNS 1556 .
  • Kaliski , BS . and Yin, Y.L. (1998), ‘On the Security of the RC5 Encryption Algorithm’, RSA Laboratories Technical Report TR‐602, version 1.0, RSA Laboratories
  • Knudsen , LR and Meier , W . 1997 . Differential Cryptanalysis of RC5 . European Transactions on Telecommunications , 8 : 445 – 454 .
  • Kocarev , L . 2001 . Chaos‐based Cryptography: A Brief Overview . IEEE Circuits and Systems Magazine , 1 : 6 – 12 .
  • Kocarev , L . Galias Z., and Lian S. (ed.) (2009). Intelligent Computing Based on Chaos, New York, NY: Springer
  • Kocarev , L , Jakimoski , G , Stojanovski , T and Parlitz , U . 1998 . From Chaotic Maps to Encryption Schemes . IEEE International Symposium on Circuits and Systems , 31 : 514 – 517 .
  • Kwok , HS and Tang , WKS . 2006 . A Fast Image Encryption System Based on Chaotic Maps With Finite Precision Representation . Chaos, Solitons and Fractals , 32 : 1518 – 1529 .
  • Li , S , Chen , G and Zheng , X . 2004 . “ Chaos‐Based Encryption for Digital Images and Videos ” . In Multimedia Security Handbook , 1 – 15 . Boca Raton , FL : CRC Press, LLC . ch. 4
  • Li , C , Li , S , Alvarez , G , Chen , G and Lo , K-T . 2008a . Cryptanalysis of a Chaotic Block Cipher with External Key and Its Improved Version . Chaos, Solitons and Fractals , 37 : 299 – 307 .
  • Li , S , Li , C , Chen , G and Lo , K-T . 2008b . Cryptoanalysis of the RCES/RSES Image Encryption Scheme . The Journal of Systems and Software , 81 : 1130 – 1143 .
  • Li , S . and Zheng, X. (2002), ‘Cryptanalysis of a Chaotic Image Encryption Method’, in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’2002), Scottsdale, AZ, 26–29 May, vol. 2, pp. 708–711
  • Lian , S . 2007 . Efficient Image or Video Encryption Based on Spatiotemporal Chaos System . Chaos, Solitons and Fractals , 40 : 2509 – 2519 .
  • Lian , S . 2008 . A Block Cipher Based on Chaotic Neural Networks . Neurocomputing , 72 : 1296 – 1301 .
  • Lian , S . 2009 . Multimedia Content Encryption: Techniques and Applications , New York , NY : Taylor & Francis Group, LLC .
  • Lian , S , Sun , J and Wang , Z . 2005a . Security Analysis of a Chaos‐based Image Encryption Algorithm . Physica A: Statistical and Theoretical Physics , 35 : 645 – 661 .
  • Lian , S , Sun , J and Wang , Z . 2005b . A Block Cipher Based on a Suitable Use of the Chaotic Standard Map . Chaos, Solitons and Fractals , 26 : 117 – 129 .
  • Lian , S , Sun , J and Wang , Z . 2007 . A Chaotic Stream Cipher and the Usage in Video Encryption . Chaos, Solitons and Fractals , 34 : 851 – 859 .
  • Mao , Y . (2003), ‘Research on Chaos‐Based Image Encryption and Watermarking Technology’, Ph.D. thesis, Nanjing University of Science & Technology, Department of Automatation, Nanjing, China
  • Mao , YB and Chen , G . 2005 . “ Chaos‐Based Image Encryption ” . In Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics , Edited by: Bayro , E . 231 – 265 . New York : Springer‐Verlag .
  • Mao , Y , Chen , G and Lian , S . 2004a . A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps . Chaos, Solitons and Fractals , 21 : 749 – 761 .
  • Mao , Y , Chen , G and Lian , S . 2004b . A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps . International Journal of Bifurcation and Chaos , 14 : 3613 – 3624 .
  • Menezes , AJ , van Oorschot , PC and Vanstone , S . 1996 . Handbook of Applied Cryptography , Boca Raton , FL : CRC Press .
  • Miyaji , A . Nonaka, M., and Takii, Y. (2002), ‘Known Plaintext Correlation Attack Against RC5’, in Proceedings of the CT‐RSA 2002, San Jose, CA, 18–22 February, LCNS 2271, pp. 131–148
  • Rivest , RL . 1995 . RC5 Encryption Algorithm . Dr Dobbs Journal , 226 : 146 – 148 .
  • Rivest , RL . (1997), ‘The RC5 Encryption Algorithm’, MIT Laboratory for Computer Science, 545 Technology square, Cambridge, MA, 02139, http://theory.lcs.mit.edu/~rivest/Rivest-rc5rev.pdf (accessed 20 March 1997)
  • Shannon , CE . 1949 . Communication Theory of Secrecy Systems . Bell System Technical Journal , 28 : 656 – 715 .
  • Shimoyama , T . Takeuchiy, K., and Hayakaway, J. (2000), ‘Correlation Attack to the Block Cipher RC5 and the Simplied Variants of RC6’, http://csrc.nist.gov/archive/aes/round2/conf3/papers/36-tshimoyama.pdf
  • Wang , Y , Wong , K-W , Liao , X and Xiang , T . 2009 . A Block Cipher with Dynamic S‐boxes Based on Tent Map . Communications in Nonlinear Science and Numerical Simulation , 14 : 3089 – 3099 .
  • Xiang , T , Wong , K-W and Liao , X . 2008 . An Improved Chaotic Cryptosystem With External Key . Communication in Nonlinear Science and Numerical Simulation , 13 : 1879 – 1887 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.