Upcoming SlideShare
×

# Performance evluvation of chaotic encryption technique

1,056
-1

Published on

Published in: Education
1 Comment
3 Likes
Statistics
Notes
• Full Name
Comment goes here.

Are you sure you want to Yes No
• thanx

Are you sure you want to  Yes  No
Views
Total Views
1,056
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
74
1
Likes
3
Embeds 0
No embeds

No notes for slide

### Performance evluvation of chaotic encryption technique

1. 1. PERFORMANCE EVALUVATION OF CHAOTIC ENCRYPTION GUIDE: PROF JOHN SINGH SITE ANCY MARIAM BABU 10MCA0010
2. 2. OBJECTIVES The main objectives are:  To analyze the confidentiality, integrity of the transmitting video data  To analyze the efficiency of each chaotic algorithm  To observe the encryption speed , power consumption and CPU utilization of the system.
3. 3. INTRODUCTION What is cryptography? The objectives of cryptography What is chaos? Chaotic cryptography  Chaotic encryption  Chaotic decryption
4. 4. CRYPTOGRAPHY  Cryptography is science of secure information.  Components:  Encryption  Decryption  Objectives:  Confidentiality  Authentication  Integrity
5. 5. CHAOS The term ‘CHAOS’ defined: the state of randomness or confusion. Chaos theory  A field of study in mathematics  Study the behavior of dynamic systems with initial condition
6. 6. CHAOTIC CRYPTIGRAPHY- HISTORY IN 1950, SHANNON MENTIONED CHAOS CAN USEDD FOR CRYPTOGRAPHY AT 1980, SHANNON DEVELOPED CHAOTIC THEORY 1N 1990, FIRST CHAOTIC BASED CIPHER 1N 1998, CHAOTIC ENCRYPTON DEVELOPED BY BAPTISTA IN 2000, CHAOS STARTED TO USE WIDELY
7. 7. CHAOTIC CRYPTOGRAPHY Type of fast and secure cryptographic method Usually chaotic signals are noisy like and chaotic systems are initially sensitive. Substantial reduction in encryption and decryption time. Components  Chaotic encryption and decryption
8. 8. CHAOTIC ENCRYPTION Known as Baptistas method . Encryption process  Define mapping scheme of trajectory  Choose initial condition and parameter key  Set initial condition as current trajectory  Iterate the chaotic equation until the trajectory reaches the destination site for each symbol.  Store the number of iterations as a cipher  Encrypt the next message with current trajectory  Produce cipher and repeat the process
9. 9. CHAOTIC DECRYPTION Decryption process  Set the initial condition and parameters and apply the same mapping scheme for decryption.  Iterate the chaotic equation by the cipher (number of iterations).  Find out the site that the trajectory belonged to and store the symbol of the site as message symbol.  Decrypts next symbol by iterating the current trajectory and producing the next message symbol and so on.
10. 10. EXISTING METHODS Selected algorithms are  CVES  SEA  NCA  EES
11. 11. ALGORITHMS CVEA  Proposed by Shu Jun Lia, Xuan Zhengb, Xuanqin Moua and Yuanlong Caia  Universal hasty encryption scheme  Method: encrypt the video using plain cluster  The encryption procedure: one plain-cluster is encrypted by stream sub cipher and followed by block sub cipher.  Decryption: the encrypted plain-cluster is firstly decrypted by block sub-cipher  Pre decrypted plain cluster is encrypted by stream sub cipher.
12. 12. ALGORITHMS SEA  Low cast targeted encryption  Operates on several word sizes, texts and key  Based on Feistel theory with random round of varying numbers. NCA  Use power function and the tangent function  Proposed by Hogan Gao, Yisheng Zhang, Shuyun Liang, Dequn Li.  Two parts of analysis:  Logistic map analysis  NCA map design
13. 13. ALGORITHM EES  Approved by U.S department of commerce in 1994.  Considerable feature is a key escrowed method enabling for detecting attacker  Symmetric key encryption method  Both SKIPJACK and LEAF creation methods are used for the encryption or decryption.
14. 14. RESULTS AND DISCUSSION Performance analysis of selected chaotic encryption technique Parameters used:  Encryption speed  CPU utilization  Power consumption Tool used:  CPU meter  Encryption –decryption tools  Laptop with IV CPU 2.4GHz
15. 15. PARAMETERS ENCRYPTION SPEED:  Throughput of the encryption indicate speed of encryption. CPU utilization:  CPU utilization means the CPU processing time.  It indicates the load on the CPU Power consumption:  CPU cycle measurement.  Depends on the load on CPU
16. 16. ENCRYPTION SPEED45 comparison of different encryption in terms of encryption time and packet40 size:35 CVES3025 SEA2015 NCA10 5 EES 0 THROUGHPUT
17. 17. POWER CONSUMPTION2000180016001400 comparison of different encryption in terms of encryption time and packet size:1200 CVES1000 SEA800 NCA600 EES400 200 0 49 100 247 694 963 3341.19 5310.88
18. 18. TOOLS CPU meter  Encryption decryption tool
19. 19. Snapshots of encryption USING CERTAIN TOOLS FOR ENCRYPTION
20. 20. SNAPSHOTS FOR ENCRYPTED DATA
21. 21. CONCLUSION Chaotic cryptography provides higher security and efficiency to resist the attack. CVES and NCA – better encryption speed EES needs more time to encrypt All the algorithm ranges security from high to middle level.
22. 22. REFFEERENCE Gary C. Kessler 1998, An overview of cryptography, Auerbach (September 1998) pp 3-4. Jon Collas 2009, introduction to cryptography, pgp cooperation pp7-29 Deckert Florian , 23 march 2007, A brief history of cryptography, slide share.net 1 April 2010 J Wei, X Liao, K Wong, T Xiang 2006, A new chaotic cryptosystem, chaos Solutions & Fractals – Elsevier pp 4-10 M.K.HO (Archon) 2001 chaotic encryption standard- history, chaotic encryption webmaster Stephen R. Addison, John E. Gray 2006 Chaos and encryption: problems and potential , IEEE 2006 , pp 275
23. 23. REFFERENCE T Yang 2004, A Survey of chaotic secure communication system , international journal of computational cognitive, yangsky.com Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai February 2002, chaotic encryption scheme for real time digital video, electronic imaging 2002, vol: 4666, pp149- 160 Yaobin Mao and Guanrong Chen, chaos based image encryption, 725 publications/journal pp8-20 G. Alvartz and Shujun Li, 2009, Crypt analyzing a nonlinear chaotic algorithm(NCA) for image encryption, communication in nonlinear science and numerical simulations vol:14 pp 3743-3759
1. #### Gostou de algum slide específico?

Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.