SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
DOI : 10.5121/ijccms.2013.2203 19
CHAOTIC VARIATIONS OF AES ALGORITHM
Chittaranjan Pradhan1
and Ajay Kumar Bisoi2
1
School of Computer Engineering, KIIT University, Bhubaneswar, India
chitaprakash@gmail.com
2
School of Computer Engineering, KIIT University, Bhubaneswar, India
akbisoifcs@kiit.ac.in
ABSTRACT
Advanced Encryption Standard (AES) algorithm is considered as a secured algorithm. Still, some security
issues lie in the S-Box and the key used. In this paper, we have tried to give focus on the security of the key
used. Here, the proposed modified algorithms for the AES have been simulated and tested with different
chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of
both. For the evaluation purpose, the CPU time has been taken as the parameter. Though the variations of
AES algorithms are taking some more time as compared to the standard AES algorithm, still the variations
can be taken into consideration in case of more sensitive information. As we are giving more security to
the key used for AES algorithm, our proposed algorithms are very much secured from unauthorized
people.
KEYWORDS
AES Algorithm, 1-D Logistic Chaotic Equation, Cross-Chaos, Encryption, Decryption.
1. INTRODUCTION
Due to the advancements in the Internet technology, huge digital data are transmitted over the
public network. As the public network is open to all, protection of these data is a vital issue.
Thus, for protecting these data from the unauthorized people, different encryption and decryption
algorithms have been developed. Out of these algorithms, AES (Advanced Encryption Standard)
algorithm is very much secured [1, 2].
Though AES algorithm is secured, still some security issues lie with this. In 2010, Abdulkarim
Amer Shtew et. al. have found such issues and modified the standard algorithm by modifying the
shift row phase involved [3]. Similarly, in 2010, El-Sayed Abdoul-Moaty ElBadawy et. al. and in
2011, Zhang Zhao et. al. have modified the standard AES algorithm by modifying the S-box
generation using 1-D logistic chaos equation [4, 5]. In 2011, Alireza Jolfaei et. al. have identified
such issues and modified the standard algorithm by modifying the S-box using the chaotic
baker’s map equations [6].
Here, we have followed a different approach by encrypting the key used in the AES algorithm.
For the key encryption, we have used the 1-D logistic chaotic equation, Cross-chaotic equation
and the combined version of these two techniques.
2. AES ALGORITHM
AES (Advanced Encryption Standard) algorithm is based on substitution and permutation
principles. It takes the input text block of size 128 bit and a variable key size of 128, 192 or 256
bits for 10, 12 or 14 rounds respectively. Each round consists of several processing steps,
including the encryption step itself. Similarly, set of reverse rounds are performed to transform
cipher text back into plaintext [1, 2].
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
20
The pictorial representation of the AES encryption process to encrypt 128-bit PT (Plain Text) to
128-CT (Cipher Text) is shown in Figure 1. When the PT size is more than 128-bits, it will be
divided into blocks of 128-bit PT. In such situation, AES encryption will be done for each block
separately.
From the single key, different subkeys are generated by using the standard key schedule
algorithm. So, the sensitive part of the algorithm is the secret key. Therefore we are motivated to
do some processing to give further security to this key.
Key
Schedule
128-bit PT Block
128-bit CT Block
Round i
Add Round Key
W4*i – W4*(i+1)-1
W0 – W3
Key
Figure 1. AES Encryption
Figure 2 shows the decryption process of the AES algorithm, which decrypts 128-bit CT(Cipher
Text) to 128-bit PT(Plain Text).
Figure 2. AES Decryption
3. 1-D LOGISTIC CHAOS EQUATION
Chaos signals are a kind of pseudorandom, irreversible and dynamical signals, which pose good
characteristics of pseudorandom sequences. Chaotic systems are highly sensitive to initial
parameters. The output sequence has good randomness, correlation, complexity and is similar to
white noise. Chaotic sequence has high linear complexity and non predictability. The model here
is chaos 1-D Logistic as shown in equation 1:
( + 1) = ∗ ( ) ∗ [1 − ( )] (1)
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
21
where, ∈ (0,4) and ( ) ∈ (0,1). By initializing and (0), we can get the required chaotic
signal [7]. In order to get chaotic sequences, the chaotic signal ( ) must be transformed into
integer sequence ( ) using the quantization function as shown in equation 2:
( ) =
0, 0 ≤ ( , ) < 0.5
1, 0.5 ≤ ( , ) < 1
(2)
where, ( , ) is the random number.
4. CROSS CHAOS SEQUENCE
Chaotic map is used for randomization purpose. Cross Chaotic map is defined as per equation 3:
= 1 − ∗ ; , ∈ [−1,1]
= cos( ∗ )
(3)
where, variables and are the control parameters of the system. But, the system will show
better chaotic behaviour when = 2 and = 6. Two chaotic sequences = … and
= … using initial values , and control parameters and , are generated. and
are reconstructed as row and column matrix respectively. Then they are multiplied with each
other, to get a new matrix . Finally, this matrix is converted to binary matrix using the same
quantization equation 2. Due to increased number of parameters, this technique gives higher
security as compared to 1-D logistic map [8].
5. PROPOSED ALGORITHMS
Here, we have modified the standard AES algorithm by pre-processing the key using different
chaotic equations. For the experimental results, we have taken lena64.bmp as the reference
image which is of size 64x64. The models for different chaos variation processes are discussed
below.
5.1. Proposed Algorithm using 1-D Logistic Chaos Equation
In this case, 1-D logistic chaos equation has been taken for encryption of the key used in AES
algorithm. The block diagrams of modified AES encryption and decryption processes are shown
in Figure 3 and Figure 4.
Figure 3.1-D Logistic Chaos variation AES Encryption
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
22
Figure 4. 1-D Logistic Chaos variation AES Decryption
Figure 5(a) shows the original image which is lena64.bmp. It has been encrypted with the
modified AES algorithm using the 1-D logistic chaos encrypted key (shown in Figure 5(b)).
Figure 5(c) shows the reconstructed image from the modified AES algorithm.
Figure 5. 1-D Logistic Chaos variation AES Process
5.2. Proposed Algorithm using Cross Chaos Equation
In this case, cross chaos equation has been taken for encryption of the key used in AES
algorithm. The block diagrams of modified AES encryption and decryption processes are shown
in Figure 6 and Figure 7.
Key
Schedule
Figure 6. Cross Chaos variation AES Encryption
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
23
Figure 7. Cross Chaos variation AES Decryption
Figure 8(a) shows the original lena image. It has been encrypted with the modified AES
algorithm using the cross chaos encrypted key (shown in Figure 8(b)). Figure 8(c) shows the
reconstructed image from the modified AES algorithm.
Figure 8. Cross Chaos variation AES Process
5.3. Proposed Algorithm using Dual Equation
Here, cross chaos equation along with 1-D logistic chaos equation have been taken for
encryption of the key used in AES algorithm. The block diagrams of modified AES encryption
and decryption processes are shown in Figure 9 and Figure 10.
Figure 9. Dual variation AES Encryption
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
24
Figure 10. Dual variation AES Decryption
Figure 11(a) shows the original lena image. It has been encrypted with the modified AES
algorithm using the cross chaos and 1-D logistic chaos encrypted key (shown in Figure 11(b)).
Figure 11(c) shows the reconstructed image from the modified AES algorithm.
Figure 11. Dual variation AES Process
5.4. Analysis of Different Proposed Algorithms
We have analyzed the above discussed algorithms with the help of CPU times (in seconds).
Figure 12 shows the chart for the CPU times for lena64.bmp and moon_64.bmp images in
different versions of AES algorithms.
142
144
146
148
150
152
154
lena64.bmp moon_64.bmp
Standard AES
process
1-D Logistic Chaos
variation AES
process
Cross Chaos
variation AES
process
Dual variation AES
process
Figure 12. Chart of CPU Times
From the chart, we can find the dual variation AES algorithm though takes little more time than
the standard AES algorithm, is very much secured. This is because the key has been encrypted
by using cross chaos and 1-D logistic chaos equations. As different unknown parameters are
involved in these two chaotic equations, it is very difficult to decrypt the key.
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
25
3. CONCLUSIONS
The proposed modified algorithms for the AES have been simulated and tested with different
chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as
combination of both. For the evaluation purpose, the CPU time has been taken as the parameter.
As we are giving more security to the key used for AES algorithm, our proposed algorithms are
very much secured from the unauthorized people. In future, these algorithms can be applied in
some more specific fields like digital watermarking, video processing.
REFERENCES
[1] Behrouzan A. Forouzan (2010), Cryptography & Network Security, TMH Publisher, ISBN:
9780070660465.
[2] Bruce Schneier (2009), Applied Cryptography, John Wiley & Sons Publisher, ISBN:
9780471117094
[3] Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, Abd El Fatah .A. Hegazy (2010), “An
Efficient Modified AdvancedEncryption Standard (MAES) Adapted for Image Cryptosystems”,
International Journal of Computer Science and Network Security, Vol.10, No.2, pp 226- 232.
[4] El-Sayed Abdoul-Moaty ElBadawy, Amro Mokhtar, Waleed A. El-Masry, Alaa El-Din Sayed
Hafez (2010), “A New Chaos Advanced Encryption Standard (AES)Algorithm for Data
Security”, International Conference on Signals and Electronic Systems, Poland, pp 405- 408.
[5] Zhang Zhao, Sun Shiliang (2011), “Image encryption algorithm Based on Logistic chaotic system
and s- box scrambling”, 4th
International Congress on Image and Signal Processing, IEEE, pp:
177-181.
[6] Alireza Jolfaei, Abdolrasoul Mirghadri (2011), “Image Encryption Using Chaos and Block
Cipher”, Computer and Information Science, Vol. 4, No. 1, pp: 172-185.
[7] Gursharanjeet Singh Kalra, Rajneesh Talwar, Dr. Harsh Sadawarti (2011), “Robust Blind Digital
Image Watermarking Using DWT and Dual Encryption Technique”, 3rd
International Conference
on Computational Intelligence, Communication Systems and Networks, IEEE, pp: 226-230.
[8] Chittaranjan Pradhan, Shibani Rath, Ajay Kumar Bisoi (2012), “Non Blind Digital Watermarking
Technique Using DWT and Cross Chaos”, 2nd
International Conference on Communication,
Computing & Security, Elsevier, Vol. 6 pp: 897 – 904.
Authors
Chittaranjan Pradhan has completed his Bachelor of Engineering in Computer
Science & Engineering and Master of Technology in Computer Science &
Engineering. Presently, he is working as Assistant Professor in School of Computer
Engineering, KIIT University, Bhubaneswar, India. He has published some innovative
research papers in International Journals and Conferences. His major research areas
cover Computer Security, Digital Watermarking, Image Processing, Chaos Theory
and Data Mining.
Ajay Kumar Bisoi obtained his Ph. D. in Particle Physics from the Utkal University,
Odisha, India. Currently, he is working as Professor & Dean in School of Computer
Engineering, KIIT University, Bhubaneswar, India. He is in the teaching profession
since 1984. He has been a DAAD scholar at Mainz University, Germany and an
Associate Member at ICTP, Italy. He has participated in many national and
international forums, talks and discussions. His interest areas are: Fractal Graphics,
Digital Watermarking, Chaotic Theory, Software Engineering and Computational
Physics.

More Related Content

What's hot

A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...IJECEIAES
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESIJERD Editor
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.CSCJournals
 
Mlp trainning algorithm
Mlp trainning algorithmMlp trainning algorithm
Mlp trainning algorithmHưng Đặng
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityIOSR Journals
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1Deepak John
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmIJERA Editor
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USCIMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USCEditor IJMTER
 

What's hot (17)

Fuzzy logic member functions
Fuzzy logic member functionsFuzzy logic member functions
Fuzzy logic member functions
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
 
Capstone paper
Capstone paperCapstone paper
Capstone paper
 
Lesson 38
Lesson 38Lesson 38
Lesson 38
 
Mlp trainning algorithm
Mlp trainning algorithmMlp trainning algorithm
Mlp trainning algorithm
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
 
Lesson 39
Lesson 39Lesson 39
Lesson 39
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Lesson 36
Lesson 36Lesson 36
Lesson 36
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USCIMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
 

Similar to Chaotic Variations Of Aes Algorithm

Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05ijmsr
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...ijcsit
 
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignIOSR Journals
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithmiosrjce
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithmeSAT Journals
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityIAEME Publication
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gsAes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gszaidinvisible
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...zaidinvisible
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
 
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...IRJET Journal
 
Cryptography unit2.pptx
Cryptography unit2.pptxCryptography unit2.pptx
Cryptography unit2.pptxSayaliKawale2
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLidescitation
 

Similar to Chaotic Variations Of Aes Algorithm (20)

Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
 
A03530107
A03530107A03530107
A03530107
 
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES Design
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
 
F017364451
F017364451F017364451
F017364451
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Aes
AesAes
Aes
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced security
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gsAes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
 
Cryptography unit2.pptx
Cryptography unit2.pptxCryptography unit2.pptx
Cryptography unit2.pptx
 
11
1111
11
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Chaotic Variations Of Aes Algorithm

  • 1. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 DOI : 10.5121/ijccms.2013.2203 19 CHAOTIC VARIATIONS OF AES ALGORITHM Chittaranjan Pradhan1 and Ajay Kumar Bisoi2 1 School of Computer Engineering, KIIT University, Bhubaneswar, India chitaprakash@gmail.com 2 School of Computer Engineering, KIIT University, Bhubaneswar, India akbisoifcs@kiit.ac.in ABSTRACT Advanced Encryption Standard (AES) algorithm is considered as a secured algorithm. Still, some security issues lie in the S-Box and the key used. In this paper, we have tried to give focus on the security of the key used. Here, the proposed modified algorithms for the AES have been simulated and tested with different chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of both. For the evaluation purpose, the CPU time has been taken as the parameter. Though the variations of AES algorithms are taking some more time as compared to the standard AES algorithm, still the variations can be taken into consideration in case of more sensitive information. As we are giving more security to the key used for AES algorithm, our proposed algorithms are very much secured from unauthorized people. KEYWORDS AES Algorithm, 1-D Logistic Chaotic Equation, Cross-Chaos, Encryption, Decryption. 1. INTRODUCTION Due to the advancements in the Internet technology, huge digital data are transmitted over the public network. As the public network is open to all, protection of these data is a vital issue. Thus, for protecting these data from the unauthorized people, different encryption and decryption algorithms have been developed. Out of these algorithms, AES (Advanced Encryption Standard) algorithm is very much secured [1, 2]. Though AES algorithm is secured, still some security issues lie with this. In 2010, Abdulkarim Amer Shtew et. al. have found such issues and modified the standard algorithm by modifying the shift row phase involved [3]. Similarly, in 2010, El-Sayed Abdoul-Moaty ElBadawy et. al. and in 2011, Zhang Zhao et. al. have modified the standard AES algorithm by modifying the S-box generation using 1-D logistic chaos equation [4, 5]. In 2011, Alireza Jolfaei et. al. have identified such issues and modified the standard algorithm by modifying the S-box using the chaotic baker’s map equations [6]. Here, we have followed a different approach by encrypting the key used in the AES algorithm. For the key encryption, we have used the 1-D logistic chaotic equation, Cross-chaotic equation and the combined version of these two techniques. 2. AES ALGORITHM AES (Advanced Encryption Standard) algorithm is based on substitution and permutation principles. It takes the input text block of size 128 bit and a variable key size of 128, 192 or 256 bits for 10, 12 or 14 rounds respectively. Each round consists of several processing steps, including the encryption step itself. Similarly, set of reverse rounds are performed to transform cipher text back into plaintext [1, 2].
  • 2. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 20 The pictorial representation of the AES encryption process to encrypt 128-bit PT (Plain Text) to 128-CT (Cipher Text) is shown in Figure 1. When the PT size is more than 128-bits, it will be divided into blocks of 128-bit PT. In such situation, AES encryption will be done for each block separately. From the single key, different subkeys are generated by using the standard key schedule algorithm. So, the sensitive part of the algorithm is the secret key. Therefore we are motivated to do some processing to give further security to this key. Key Schedule 128-bit PT Block 128-bit CT Block Round i Add Round Key W4*i – W4*(i+1)-1 W0 – W3 Key Figure 1. AES Encryption Figure 2 shows the decryption process of the AES algorithm, which decrypts 128-bit CT(Cipher Text) to 128-bit PT(Plain Text). Figure 2. AES Decryption 3. 1-D LOGISTIC CHAOS EQUATION Chaos signals are a kind of pseudorandom, irreversible and dynamical signals, which pose good characteristics of pseudorandom sequences. Chaotic systems are highly sensitive to initial parameters. The output sequence has good randomness, correlation, complexity and is similar to white noise. Chaotic sequence has high linear complexity and non predictability. The model here is chaos 1-D Logistic as shown in equation 1: ( + 1) = ∗ ( ) ∗ [1 − ( )] (1)
  • 3. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 21 where, ∈ (0,4) and ( ) ∈ (0,1). By initializing and (0), we can get the required chaotic signal [7]. In order to get chaotic sequences, the chaotic signal ( ) must be transformed into integer sequence ( ) using the quantization function as shown in equation 2: ( ) = 0, 0 ≤ ( , ) < 0.5 1, 0.5 ≤ ( , ) < 1 (2) where, ( , ) is the random number. 4. CROSS CHAOS SEQUENCE Chaotic map is used for randomization purpose. Cross Chaotic map is defined as per equation 3: = 1 − ∗ ; , ∈ [−1,1] = cos( ∗ ) (3) where, variables and are the control parameters of the system. But, the system will show better chaotic behaviour when = 2 and = 6. Two chaotic sequences = … and = … using initial values , and control parameters and , are generated. and are reconstructed as row and column matrix respectively. Then they are multiplied with each other, to get a new matrix . Finally, this matrix is converted to binary matrix using the same quantization equation 2. Due to increased number of parameters, this technique gives higher security as compared to 1-D logistic map [8]. 5. PROPOSED ALGORITHMS Here, we have modified the standard AES algorithm by pre-processing the key using different chaotic equations. For the experimental results, we have taken lena64.bmp as the reference image which is of size 64x64. The models for different chaos variation processes are discussed below. 5.1. Proposed Algorithm using 1-D Logistic Chaos Equation In this case, 1-D logistic chaos equation has been taken for encryption of the key used in AES algorithm. The block diagrams of modified AES encryption and decryption processes are shown in Figure 3 and Figure 4. Figure 3.1-D Logistic Chaos variation AES Encryption
  • 4. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 22 Figure 4. 1-D Logistic Chaos variation AES Decryption Figure 5(a) shows the original image which is lena64.bmp. It has been encrypted with the modified AES algorithm using the 1-D logistic chaos encrypted key (shown in Figure 5(b)). Figure 5(c) shows the reconstructed image from the modified AES algorithm. Figure 5. 1-D Logistic Chaos variation AES Process 5.2. Proposed Algorithm using Cross Chaos Equation In this case, cross chaos equation has been taken for encryption of the key used in AES algorithm. The block diagrams of modified AES encryption and decryption processes are shown in Figure 6 and Figure 7. Key Schedule Figure 6. Cross Chaos variation AES Encryption
  • 5. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 23 Figure 7. Cross Chaos variation AES Decryption Figure 8(a) shows the original lena image. It has been encrypted with the modified AES algorithm using the cross chaos encrypted key (shown in Figure 8(b)). Figure 8(c) shows the reconstructed image from the modified AES algorithm. Figure 8. Cross Chaos variation AES Process 5.3. Proposed Algorithm using Dual Equation Here, cross chaos equation along with 1-D logistic chaos equation have been taken for encryption of the key used in AES algorithm. The block diagrams of modified AES encryption and decryption processes are shown in Figure 9 and Figure 10. Figure 9. Dual variation AES Encryption
  • 6. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 24 Figure 10. Dual variation AES Decryption Figure 11(a) shows the original lena image. It has been encrypted with the modified AES algorithm using the cross chaos and 1-D logistic chaos encrypted key (shown in Figure 11(b)). Figure 11(c) shows the reconstructed image from the modified AES algorithm. Figure 11. Dual variation AES Process 5.4. Analysis of Different Proposed Algorithms We have analyzed the above discussed algorithms with the help of CPU times (in seconds). Figure 12 shows the chart for the CPU times for lena64.bmp and moon_64.bmp images in different versions of AES algorithms. 142 144 146 148 150 152 154 lena64.bmp moon_64.bmp Standard AES process 1-D Logistic Chaos variation AES process Cross Chaos variation AES process Dual variation AES process Figure 12. Chart of CPU Times From the chart, we can find the dual variation AES algorithm though takes little more time than the standard AES algorithm, is very much secured. This is because the key has been encrypted by using cross chaos and 1-D logistic chaos equations. As different unknown parameters are involved in these two chaotic equations, it is very difficult to decrypt the key.
  • 7. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 25 3. CONCLUSIONS The proposed modified algorithms for the AES have been simulated and tested with different chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of both. For the evaluation purpose, the CPU time has been taken as the parameter. As we are giving more security to the key used for AES algorithm, our proposed algorithms are very much secured from the unauthorized people. In future, these algorithms can be applied in some more specific fields like digital watermarking, video processing. REFERENCES [1] Behrouzan A. Forouzan (2010), Cryptography & Network Security, TMH Publisher, ISBN: 9780070660465. [2] Bruce Schneier (2009), Applied Cryptography, John Wiley & Sons Publisher, ISBN: 9780471117094 [3] Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, Abd El Fatah .A. Hegazy (2010), “An Efficient Modified AdvancedEncryption Standard (MAES) Adapted for Image Cryptosystems”, International Journal of Computer Science and Network Security, Vol.10, No.2, pp 226- 232. [4] El-Sayed Abdoul-Moaty ElBadawy, Amro Mokhtar, Waleed A. El-Masry, Alaa El-Din Sayed Hafez (2010), “A New Chaos Advanced Encryption Standard (AES)Algorithm for Data Security”, International Conference on Signals and Electronic Systems, Poland, pp 405- 408. [5] Zhang Zhao, Sun Shiliang (2011), “Image encryption algorithm Based on Logistic chaotic system and s- box scrambling”, 4th International Congress on Image and Signal Processing, IEEE, pp: 177-181. [6] Alireza Jolfaei, Abdolrasoul Mirghadri (2011), “Image Encryption Using Chaos and Block Cipher”, Computer and Information Science, Vol. 4, No. 1, pp: 172-185. [7] Gursharanjeet Singh Kalra, Rajneesh Talwar, Dr. Harsh Sadawarti (2011), “Robust Blind Digital Image Watermarking Using DWT and Dual Encryption Technique”, 3rd International Conference on Computational Intelligence, Communication Systems and Networks, IEEE, pp: 226-230. [8] Chittaranjan Pradhan, Shibani Rath, Ajay Kumar Bisoi (2012), “Non Blind Digital Watermarking Technique Using DWT and Cross Chaos”, 2nd International Conference on Communication, Computing & Security, Elsevier, Vol. 6 pp: 897 – 904. Authors Chittaranjan Pradhan has completed his Bachelor of Engineering in Computer Science & Engineering and Master of Technology in Computer Science & Engineering. Presently, he is working as Assistant Professor in School of Computer Engineering, KIIT University, Bhubaneswar, India. He has published some innovative research papers in International Journals and Conferences. His major research areas cover Computer Security, Digital Watermarking, Image Processing, Chaos Theory and Data Mining. Ajay Kumar Bisoi obtained his Ph. D. in Particle Physics from the Utkal University, Odisha, India. Currently, he is working as Professor & Dean in School of Computer Engineering, KIIT University, Bhubaneswar, India. He is in the teaching profession since 1984. He has been a DAAD scholar at Mainz University, Germany and an Associate Member at ICTP, Italy. He has participated in many national and international forums, talks and discussions. His interest areas are: Fractal Graphics, Digital Watermarking, Chaotic Theory, Software Engineering and Computational Physics.