1 AIT Asian Institute of Technology

An analysis of a chaos-based fast image encryption algorithm

AuthorRahmawati, Weny Mistarika
Call NumberAIT Thesis no.CS-14-03
Subject(s)Data encryption (Computer science)
Image processing Security measures

NoteA thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science, School of Engineering and Technology
PublisherAsian Institute of Technology
Series StatementThesis ; no. CS-14-03
AbstractRapid development of computer networks has caused increasing data transfer via the Inter-net. Images, as one type of data, are of much concern because of the necessity to transferlarge amount of image data. In some cases, image transmission is needed to be secure. Thisis causes many researchers concern to encrypt image. Image permutation and image diffu-sion are some of the primitive for encrypting an image. Permutations goal is to make thelocation of image value scramble, whereas diffusion goal is to change the value of the im-age pixel. Permutation and diffusion are two different processes. Many researchers want touse both permutation and diffusion in encryption scheme. A research proposes an algorithmchaos-based and combines permutation and diffusion to encrypt image in one time pass.Chaos based is used because it produces pseudorandom numbers that are very sensitive tosome parameters. With this idea, the encryption and decryption claimed as a fast encryptionscheme.As an encryption algorithm, the security notion is also need to be concerned. The chaos basedfast image encryption is a deterministic encryption which has proven to be insecure undersecurity notion of probabilistic encryption scheme. Even with security notion for determin-istic algorithm, the research is fragile to chosen plaintext attack under padding assumption.The research does not mention how to do padding so if we assume that the padding is usingzero padding it will be insecure.This study analyzes the performance of the chaos based fast image encryption algorithm byimplementing the algorithm, finding that its running time is not faster than a standard en-cryption algorithm, Advanced Encryption Standard (AES) in CBC mode. I also analyze thesecurity of the algorithm under well known security notions for probabilistic and determin-istic encryption schemes and find the method insecure under both notions. Image encryptionresearches are advised to report notion result in comparison with standard algorithms and tobecome familiar with the basics of cryptanalysis before proposing scheme.
Year2014
Corresponding Series Added EntryAsian Institute of Technology. Thesis : no. CS-14-03
TypeThesis
SchoolSchool of Engineering and Technology (SET)
DepartmentDepartment of Information and Communications Technologies (DICT)
Academic Program/FoSComputer Science (CS)
Chairperson(s)Dailey, Matthew N.;
Examination Committee(s)Phan Minh Dung;Chanathip Namprempre;
Scholarship Donor(s)Asian Institute of Technology Fellowship;
DegreeThesis (M. Sc.) - Asian Institute of Technology


Usage Metrics
View Detail0
Read PDF0
Download PDF0