An extendable key space integer image-cipher using 4-bit piece-wise linear cat map

dc.date.accessioned2023-04-19T08:12:29Z
dc.date.available2023-04-19T08:12:29Z
dc.date.issued2022-09-30
dc.description.sponsorshipGefördert im Rahmen des Projekts DEALger
dc.identifierdoi:10.17170/kobra-202304197832
dc.identifier.urihttp://hdl.handle.net/123456789/14595
dc.language.isoeng
dc.relation.doidoi:10.1007/s11042-022-13779-y
dc.rightsNamensnennung 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectCryptographyeng
dc.subjectModular arithmeticeng
dc.subjectRandom integerseng
dc.subjectSecurity analysiseng
dc.subject.ddc510
dc.subject.swdKryptologieger
dc.subject.swdInformationssicherheitger
dc.subject.swdZufallszahlenger
dc.titleAn extendable key space integer image-cipher using 4-bit piece-wise linear cat mapeng
dc.typeAufsatz
dc.type.versionpublishedVersion
dcterms.abstractThis paper presents a multiplierless image-cipher, with extendable 2048-bit key-space, based on a 4-dimensional (4D) quantized piece-wise linear cat map (PWLCM). The quantized PWLCM exhibits limit-cycles of 4-bit encoded integers with periods greater than 10⁷. The synthesis of the PWLCM in a finite state space allows to eliminate the undesirable finite precision effect due to the hardware realization. The proposed image-cipher combines chaos, modular arithmetic, and lattice-based cryptography to encrypt a color image by performing pixel permutation and diffusion in a single operation. Further, an image-dependent confusion operation based on an 8-bit 2D-PWLCM is performed on the whole image to enhance security. In order to increase the key-space without key duplication, 16 × 16 subimages are modified using sub-keys of different lattice length vectors generated from the external key. Both simulations and security analyses confirm that the proposed algorithm can resist common cipher attacks, in addition to its advantages such as simplicity, ease of implementation on low-end processors and extensibility of key-space that allows it to easily adapt even for future post-quantum computing attacks.eng
dcterms.accessRightsopen access
dcterms.creatorGnyamsi Nkuigwa, Gaetan Gildas
dcterms.creatorDjeugoue Nzeuga, Hermann
dcterms.creatorEyebe Fouda, Jean Sire Armand
dcterms.creatorSabat, Samrat L.
dcterms.creatorKoepf, Wolfram
dcterms.extent14609-14631
dcterms.source.identifiereissn:1573-7721
dcterms.source.issueissue 10
dcterms.source.journalMultimedia Tools and Applicationseng
dcterms.source.volumeVolume 82
kup.iskupfalse

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
s11042_022_13779_y.pdf
Size:
2.28 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.03 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections