An extendable key space integer image-cipher using 4-bit piece-wise linear cat map
dc.date.accessioned | 2023-04-19T08:12:29Z | |
dc.date.available | 2023-04-19T08:12:29Z | |
dc.date.issued | 2022-09-30 | |
dc.description.sponsorship | Gefördert im Rahmen des Projekts DEAL | ger |
dc.identifier | doi:10.17170/kobra-202304197832 | |
dc.identifier.uri | http://hdl.handle.net/123456789/14595 | |
dc.language.iso | eng | |
dc.relation.doi | doi:10.1007/s11042-022-13779-y | |
dc.rights | Namensnennung 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.subject | Cryptography | eng |
dc.subject | Modular arithmetic | eng |
dc.subject | Random integers | eng |
dc.subject | Security analysis | eng |
dc.subject.ddc | 510 | |
dc.subject.swd | Kryptologie | ger |
dc.subject.swd | Informationssicherheit | ger |
dc.subject.swd | Zufallszahlen | ger |
dc.title | An extendable key space integer image-cipher using 4-bit piece-wise linear cat map | eng |
dc.type | Aufsatz | |
dc.type.version | publishedVersion | |
dcterms.abstract | This paper presents a multiplierless image-cipher, with extendable 2048-bit key-space, based on a 4-dimensional (4D) quantized piece-wise linear cat map (PWLCM). The quantized PWLCM exhibits limit-cycles of 4-bit encoded integers with periods greater than 10⁷. The synthesis of the PWLCM in a finite state space allows to eliminate the undesirable finite precision effect due to the hardware realization. The proposed image-cipher combines chaos, modular arithmetic, and lattice-based cryptography to encrypt a color image by performing pixel permutation and diffusion in a single operation. Further, an image-dependent confusion operation based on an 8-bit 2D-PWLCM is performed on the whole image to enhance security. In order to increase the key-space without key duplication, 16 × 16 subimages are modified using sub-keys of different lattice length vectors generated from the external key. Both simulations and security analyses confirm that the proposed algorithm can resist common cipher attacks, in addition to its advantages such as simplicity, ease of implementation on low-end processors and extensibility of key-space that allows it to easily adapt even for future post-quantum computing attacks. | eng |
dcterms.accessRights | open access | |
dcterms.creator | Gnyamsi Nkuigwa, Gaetan Gildas | |
dcterms.creator | Djeugoue Nzeuga, Hermann | |
dcterms.creator | Eyebe Fouda, Jean Sire Armand | |
dcterms.creator | Sabat, Samrat L. | |
dcterms.creator | Koepf, Wolfram | |
dcterms.extent | 14609-14631 | |
dcterms.source.identifier | eissn:1573-7721 | |
dcterms.source.issue | issue 10 | |
dcterms.source.journal | Multimedia Tools and Applications | eng |
dcterms.source.volume | Volume 82 | |
kup.iskup | false |