SlideShare a Scribd company logo
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
DOI : 10.5121/ijccms.2013.2203 19
CHAOTIC VARIATIONS OF AES ALGORITHM
Chittaranjan Pradhan1
and Ajay Kumar Bisoi2
1
School of Computer Engineering, KIIT University, Bhubaneswar, India
chitaprakash@gmail.com
2
School of Computer Engineering, KIIT University, Bhubaneswar, India
akbisoifcs@kiit.ac.in
ABSTRACT
Advanced Encryption Standard (AES) algorithm is considered as a secured algorithm. Still, some security
issues lie in the S-Box and the key used. In this paper, we have tried to give focus on the security of the key
used. Here, the proposed modified algorithms for the AES have been simulated and tested with different
chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of
both. For the evaluation purpose, the CPU time has been taken as the parameter. Though the variations of
AES algorithms are taking some more time as compared to the standard AES algorithm, still the variations
can be taken into consideration in case of more sensitive information. As we are giving more security to
the key used for AES algorithm, our proposed algorithms are very much secured from unauthorized
people.
KEYWORDS
AES Algorithm, 1-D Logistic Chaotic Equation, Cross-Chaos, Encryption, Decryption.
1. INTRODUCTION
Due to the advancements in the Internet technology, huge digital data are transmitted over the
public network. As the public network is open to all, protection of these data is a vital issue.
Thus, for protecting these data from the unauthorized people, different encryption and decryption
algorithms have been developed. Out of these algorithms, AES (Advanced Encryption Standard)
algorithm is very much secured [1, 2].
Though AES algorithm is secured, still some security issues lie with this. In 2010, Abdulkarim
Amer Shtew et. al. have found such issues and modified the standard algorithm by modifying the
shift row phase involved [3]. Similarly, in 2010, El-Sayed Abdoul-Moaty ElBadawy et. al. and in
2011, Zhang Zhao et. al. have modified the standard AES algorithm by modifying the S-box
generation using 1-D logistic chaos equation [4, 5]. In 2011, Alireza Jolfaei et. al. have identified
such issues and modified the standard algorithm by modifying the S-box using the chaotic
baker’s map equations [6].
Here, we have followed a different approach by encrypting the key used in the AES algorithm.
For the key encryption, we have used the 1-D logistic chaotic equation, Cross-chaotic equation
and the combined version of these two techniques.
2. AES ALGORITHM
AES (Advanced Encryption Standard) algorithm is based on substitution and permutation
principles. It takes the input text block of size 128 bit and a variable key size of 128, 192 or 256
bits for 10, 12 or 14 rounds respectively. Each round consists of several processing steps,
including the encryption step itself. Similarly, set of reverse rounds are performed to transform
cipher text back into plaintext [1, 2].
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
20
The pictorial representation of the AES encryption process to encrypt 128-bit PT (Plain Text) to
128-CT (Cipher Text) is shown in Figure 1. When the PT size is more than 128-bits, it will be
divided into blocks of 128-bit PT. In such situation, AES encryption will be done for each block
separately.
From the single key, different subkeys are generated by using the standard key schedule
algorithm. So, the sensitive part of the algorithm is the secret key. Therefore we are motivated to
do some processing to give further security to this key.
Key
Schedule
128-bit PT Block
128-bit CT Block
Round i
Add Round Key
W4*i – W4*(i+1)-1
W0 – W3
Key
Figure 1. AES Encryption
Figure 2 shows the decryption process of the AES algorithm, which decrypts 128-bit CT(Cipher
Text) to 128-bit PT(Plain Text).
Figure 2. AES Decryption
3. 1-D LOGISTIC CHAOS EQUATION
Chaos signals are a kind of pseudorandom, irreversible and dynamical signals, which pose good
characteristics of pseudorandom sequences. Chaotic systems are highly sensitive to initial
parameters. The output sequence has good randomness, correlation, complexity and is similar to
white noise. Chaotic sequence has high linear complexity and non predictability. The model here
is chaos 1-D Logistic as shown in equation 1:
( + 1) = ∗ ( ) ∗ [1 − ( )] (1)
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
21
where, ∈ (0,4) and ( ) ∈ (0,1). By initializing and (0), we can get the required chaotic
signal [7]. In order to get chaotic sequences, the chaotic signal ( ) must be transformed into
integer sequence ( ) using the quantization function as shown in equation 2:
( ) =
0, 0 ≤ ( , ) < 0.5
1, 0.5 ≤ ( , ) < 1
(2)
where, ( , ) is the random number.
4. CROSS CHAOS SEQUENCE
Chaotic map is used for randomization purpose. Cross Chaotic map is defined as per equation 3:
= 1 − ∗ ; , ∈ [−1,1]
= cos( ∗ )
(3)
where, variables and are the control parameters of the system. But, the system will show
better chaotic behaviour when = 2 and = 6. Two chaotic sequences = … and
= … using initial values , and control parameters and , are generated. and
are reconstructed as row and column matrix respectively. Then they are multiplied with each
other, to get a new matrix . Finally, this matrix is converted to binary matrix using the same
quantization equation 2. Due to increased number of parameters, this technique gives higher
security as compared to 1-D logistic map [8].
5. PROPOSED ALGORITHMS
Here, we have modified the standard AES algorithm by pre-processing the key using different
chaotic equations. For the experimental results, we have taken lena64.bmp as the reference
image which is of size 64x64. The models for different chaos variation processes are discussed
below.
5.1. Proposed Algorithm using 1-D Logistic Chaos Equation
In this case, 1-D logistic chaos equation has been taken for encryption of the key used in AES
algorithm. The block diagrams of modified AES encryption and decryption processes are shown
in Figure 3 and Figure 4.
Figure 3.1-D Logistic Chaos variation AES Encryption
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
22
Figure 4. 1-D Logistic Chaos variation AES Decryption
Figure 5(a) shows the original image which is lena64.bmp. It has been encrypted with the
modified AES algorithm using the 1-D logistic chaos encrypted key (shown in Figure 5(b)).
Figure 5(c) shows the reconstructed image from the modified AES algorithm.
Figure 5. 1-D Logistic Chaos variation AES Process
5.2. Proposed Algorithm using Cross Chaos Equation
In this case, cross chaos equation has been taken for encryption of the key used in AES
algorithm. The block diagrams of modified AES encryption and decryption processes are shown
in Figure 6 and Figure 7.
Key
Schedule
Figure 6. Cross Chaos variation AES Encryption
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
23
Figure 7. Cross Chaos variation AES Decryption
Figure 8(a) shows the original lena image. It has been encrypted with the modified AES
algorithm using the cross chaos encrypted key (shown in Figure 8(b)). Figure 8(c) shows the
reconstructed image from the modified AES algorithm.
Figure 8. Cross Chaos variation AES Process
5.3. Proposed Algorithm using Dual Equation
Here, cross chaos equation along with 1-D logistic chaos equation have been taken for
encryption of the key used in AES algorithm. The block diagrams of modified AES encryption
and decryption processes are shown in Figure 9 and Figure 10.
Figure 9. Dual variation AES Encryption
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
24
Figure 10. Dual variation AES Decryption
Figure 11(a) shows the original lena image. It has been encrypted with the modified AES
algorithm using the cross chaos and 1-D logistic chaos encrypted key (shown in Figure 11(b)).
Figure 11(c) shows the reconstructed image from the modified AES algorithm.
Figure 11. Dual variation AES Process
5.4. Analysis of Different Proposed Algorithms
We have analyzed the above discussed algorithms with the help of CPU times (in seconds).
Figure 12 shows the chart for the CPU times for lena64.bmp and moon_64.bmp images in
different versions of AES algorithms.
142
144
146
148
150
152
154
lena64.bmp moon_64.bmp
Standard AES
process
1-D Logistic Chaos
variation AES
process
Cross Chaos
variation AES
process
Dual variation AES
process
Figure 12. Chart of CPU Times
From the chart, we can find the dual variation AES algorithm though takes little more time than
the standard AES algorithm, is very much secured. This is because the key has been encrypted
by using cross chaos and 1-D logistic chaos equations. As different unknown parameters are
involved in these two chaotic equations, it is very difficult to decrypt the key.
International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013
25
3. CONCLUSIONS
The proposed modified algorithms for the AES have been simulated and tested with different
chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as
combination of both. For the evaluation purpose, the CPU time has been taken as the parameter.
As we are giving more security to the key used for AES algorithm, our proposed algorithms are
very much secured from the unauthorized people. In future, these algorithms can be applied in
some more specific fields like digital watermarking, video processing.
REFERENCES
[1] Behrouzan A. Forouzan (2010), Cryptography & Network Security, TMH Publisher, ISBN:
9780070660465.
[2] Bruce Schneier (2009), Applied Cryptography, John Wiley & Sons Publisher, ISBN:
9780471117094
[3] Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, Abd El Fatah .A. Hegazy (2010), “An
Efficient Modified AdvancedEncryption Standard (MAES) Adapted for Image Cryptosystems”,
International Journal of Computer Science and Network Security, Vol.10, No.2, pp 226- 232.
[4] El-Sayed Abdoul-Moaty ElBadawy, Amro Mokhtar, Waleed A. El-Masry, Alaa El-Din Sayed
Hafez (2010), “A New Chaos Advanced Encryption Standard (AES)Algorithm for Data
Security”, International Conference on Signals and Electronic Systems, Poland, pp 405- 408.
[5] Zhang Zhao, Sun Shiliang (2011), “Image encryption algorithm Based on Logistic chaotic system
and s- box scrambling”, 4th
International Congress on Image and Signal Processing, IEEE, pp:
177-181.
[6] Alireza Jolfaei, Abdolrasoul Mirghadri (2011), “Image Encryption Using Chaos and Block
Cipher”, Computer and Information Science, Vol. 4, No. 1, pp: 172-185.
[7] Gursharanjeet Singh Kalra, Rajneesh Talwar, Dr. Harsh Sadawarti (2011), “Robust Blind Digital
Image Watermarking Using DWT and Dual Encryption Technique”, 3rd
International Conference
on Computational Intelligence, Communication Systems and Networks, IEEE, pp: 226-230.
[8] Chittaranjan Pradhan, Shibani Rath, Ajay Kumar Bisoi (2012), “Non Blind Digital Watermarking
Technique Using DWT and Cross Chaos”, 2nd
International Conference on Communication,
Computing & Security, Elsevier, Vol. 6 pp: 897 – 904.
Authors
Chittaranjan Pradhan has completed his Bachelor of Engineering in Computer
Science & Engineering and Master of Technology in Computer Science &
Engineering. Presently, he is working as Assistant Professor in School of Computer
Engineering, KIIT University, Bhubaneswar, India. He has published some innovative
research papers in International Journals and Conferences. His major research areas
cover Computer Security, Digital Watermarking, Image Processing, Chaos Theory
and Data Mining.
Ajay Kumar Bisoi obtained his Ph. D. in Particle Physics from the Utkal University,
Odisha, India. Currently, he is working as Professor & Dean in School of Computer
Engineering, KIIT University, Bhubaneswar, India. He is in the teaching profession
since 1984. He has been a DAAD scholar at Mainz University, Germany and an
Associate Member at ICTP, Italy. He has participated in many national and
international forums, talks and discussions. His interest areas are: Fractal Graphics,
Digital Watermarking, Chaotic Theory, Software Engineering and Computational
Physics.

More Related Content

What's hot

Fuzzy logic member functions
Fuzzy logic member functionsFuzzy logic member functions
Fuzzy logic member functions
Dr. C.V. Suresh Babu
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
IJECEIAES
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
IJERA Editor
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
IJERD Editor
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
CSCJournals
 
Capstone paper
Capstone paperCapstone paper
Capstone paper
Muhammad Saeed
 
Lesson 38
Lesson 38Lesson 38
Lesson 38
Avijit Kumar
 
Mlp trainning algorithm
Mlp trainning algorithmMlp trainning algorithm
Mlp trainning algorithm
Hưng Đặng
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
IOSR Journals
 
Lesson 39
Lesson 39Lesson 39
Lesson 39
Avijit Kumar
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
IDES Editor
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
Deepak John
 
Lesson 36
Lesson 36Lesson 36
Lesson 36
Avijit Kumar
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
IJERA Editor
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USCIMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
Editor IJMTER
 

What's hot (17)

Fuzzy logic member functions
Fuzzy logic member functionsFuzzy logic member functions
Fuzzy logic member functions
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
 
Capstone paper
Capstone paperCapstone paper
Capstone paper
 
Lesson 38
Lesson 38Lesson 38
Lesson 38
 
Mlp trainning algorithm
Mlp trainning algorithmMlp trainning algorithm
Mlp trainning algorithm
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
A High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction CapabilityA High Throughput CFA AES S-Box with Error Correction Capability
A High Throughput CFA AES S-Box with Error Correction Capability
 
Lesson 39
Lesson 39Lesson 39
Lesson 39
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Lesson 36
Lesson 36Lesson 36
Lesson 36
 
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES AlgorithmFPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
FPGA Implementation of an Area Optimized Architecture for 128 bit AES Algorithm
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USCIMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
IMPROVED PERFORMANCE RS DECODER USING LCC DECODING BASED ON USC
 

Similar to CHAOTIC VARIATIONS OF AES ALGORITHM

Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
ijmsr
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
ijcsit
 
A03530107
A03530107A03530107
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES Design
IOSR Journals
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
Sumathi Reddy
 
F017364451
F017364451F017364451
F017364451
IOSR Journals
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
iosrjce
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
IJMER
 
Aes
AesAes
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
eSAT Journals
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
Shubham Chauhan
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced security
IAEME Publication
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
zaidinvisible
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gsAes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
zaidinvisible
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
IJECEIAES
 
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
IRJET Journal
 
Cryptography unit2.pptx
Cryptography unit2.pptxCryptography unit2.pptx
Cryptography unit2.pptx
SayaliKawale2
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
idescitation
 
11
1111

Similar to CHAOTIC VARIATIONS OF AES ALGORITHM (20)

Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...A design of a fast parallel pipelined implementation of aes advanced encrypti...
A design of a fast parallel pipelined implementation of aes advanced encrypti...
 
A03530107
A03530107A03530107
A03530107
 
Fault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES DesignFault Detection Technique for Compact AES Design
Fault Detection Technique for Compact AES Design
 
Fault Detection AES
Fault Detection AESFault Detection AES
Fault Detection AES
 
F017364451
F017364451F017364451
F017364451
 
A New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES AlgorithmA New Approach for Video Encryption Based on Modified AES Algorithm
A New Approach for Video Encryption Based on Modified AES Algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
Aes
AesAes
Aes
 
Arm recognition encryption by using aes algorithm
Arm recognition    encryption by using aes algorithmArm recognition    encryption by using aes algorithm
Arm recognition encryption by using aes algorithm
 
VHDL Encryption
VHDL EncryptionVHDL Encryption
VHDL Encryption
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced security
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gsAes cryptography algorithm based on intelligent blum blum-shub prn gs
Aes cryptography algorithm based on intelligent blum blum-shub prn gs
 
Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...
 
Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...Performance Analysis of Application for Security Enhancements using Cryptanal...
Performance Analysis of Application for Security Enhancements using Cryptanal...
 
Cryptography unit2.pptx
Cryptography unit2.pptxCryptography unit2.pptx
Cryptography unit2.pptx
 
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDLA Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
A Cryptographic Hardware Revolution in Communication Systems using Verilog HDL
 
11
1111
11
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 

CHAOTIC VARIATIONS OF AES ALGORITHM

  • 1. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 DOI : 10.5121/ijccms.2013.2203 19 CHAOTIC VARIATIONS OF AES ALGORITHM Chittaranjan Pradhan1 and Ajay Kumar Bisoi2 1 School of Computer Engineering, KIIT University, Bhubaneswar, India chitaprakash@gmail.com 2 School of Computer Engineering, KIIT University, Bhubaneswar, India akbisoifcs@kiit.ac.in ABSTRACT Advanced Encryption Standard (AES) algorithm is considered as a secured algorithm. Still, some security issues lie in the S-Box and the key used. In this paper, we have tried to give focus on the security of the key used. Here, the proposed modified algorithms for the AES have been simulated and tested with different chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of both. For the evaluation purpose, the CPU time has been taken as the parameter. Though the variations of AES algorithms are taking some more time as compared to the standard AES algorithm, still the variations can be taken into consideration in case of more sensitive information. As we are giving more security to the key used for AES algorithm, our proposed algorithms are very much secured from unauthorized people. KEYWORDS AES Algorithm, 1-D Logistic Chaotic Equation, Cross-Chaos, Encryption, Decryption. 1. INTRODUCTION Due to the advancements in the Internet technology, huge digital data are transmitted over the public network. As the public network is open to all, protection of these data is a vital issue. Thus, for protecting these data from the unauthorized people, different encryption and decryption algorithms have been developed. Out of these algorithms, AES (Advanced Encryption Standard) algorithm is very much secured [1, 2]. Though AES algorithm is secured, still some security issues lie with this. In 2010, Abdulkarim Amer Shtew et. al. have found such issues and modified the standard algorithm by modifying the shift row phase involved [3]. Similarly, in 2010, El-Sayed Abdoul-Moaty ElBadawy et. al. and in 2011, Zhang Zhao et. al. have modified the standard AES algorithm by modifying the S-box generation using 1-D logistic chaos equation [4, 5]. In 2011, Alireza Jolfaei et. al. have identified such issues and modified the standard algorithm by modifying the S-box using the chaotic baker’s map equations [6]. Here, we have followed a different approach by encrypting the key used in the AES algorithm. For the key encryption, we have used the 1-D logistic chaotic equation, Cross-chaotic equation and the combined version of these two techniques. 2. AES ALGORITHM AES (Advanced Encryption Standard) algorithm is based on substitution and permutation principles. It takes the input text block of size 128 bit and a variable key size of 128, 192 or 256 bits for 10, 12 or 14 rounds respectively. Each round consists of several processing steps, including the encryption step itself. Similarly, set of reverse rounds are performed to transform cipher text back into plaintext [1, 2].
  • 2. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 20 The pictorial representation of the AES encryption process to encrypt 128-bit PT (Plain Text) to 128-CT (Cipher Text) is shown in Figure 1. When the PT size is more than 128-bits, it will be divided into blocks of 128-bit PT. In such situation, AES encryption will be done for each block separately. From the single key, different subkeys are generated by using the standard key schedule algorithm. So, the sensitive part of the algorithm is the secret key. Therefore we are motivated to do some processing to give further security to this key. Key Schedule 128-bit PT Block 128-bit CT Block Round i Add Round Key W4*i – W4*(i+1)-1 W0 – W3 Key Figure 1. AES Encryption Figure 2 shows the decryption process of the AES algorithm, which decrypts 128-bit CT(Cipher Text) to 128-bit PT(Plain Text). Figure 2. AES Decryption 3. 1-D LOGISTIC CHAOS EQUATION Chaos signals are a kind of pseudorandom, irreversible and dynamical signals, which pose good characteristics of pseudorandom sequences. Chaotic systems are highly sensitive to initial parameters. The output sequence has good randomness, correlation, complexity and is similar to white noise. Chaotic sequence has high linear complexity and non predictability. The model here is chaos 1-D Logistic as shown in equation 1: ( + 1) = ∗ ( ) ∗ [1 − ( )] (1)
  • 3. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 21 where, ∈ (0,4) and ( ) ∈ (0,1). By initializing and (0), we can get the required chaotic signal [7]. In order to get chaotic sequences, the chaotic signal ( ) must be transformed into integer sequence ( ) using the quantization function as shown in equation 2: ( ) = 0, 0 ≤ ( , ) < 0.5 1, 0.5 ≤ ( , ) < 1 (2) where, ( , ) is the random number. 4. CROSS CHAOS SEQUENCE Chaotic map is used for randomization purpose. Cross Chaotic map is defined as per equation 3: = 1 − ∗ ; , ∈ [−1,1] = cos( ∗ ) (3) where, variables and are the control parameters of the system. But, the system will show better chaotic behaviour when = 2 and = 6. Two chaotic sequences = … and = … using initial values , and control parameters and , are generated. and are reconstructed as row and column matrix respectively. Then they are multiplied with each other, to get a new matrix . Finally, this matrix is converted to binary matrix using the same quantization equation 2. Due to increased number of parameters, this technique gives higher security as compared to 1-D logistic map [8]. 5. PROPOSED ALGORITHMS Here, we have modified the standard AES algorithm by pre-processing the key using different chaotic equations. For the experimental results, we have taken lena64.bmp as the reference image which is of size 64x64. The models for different chaos variation processes are discussed below. 5.1. Proposed Algorithm using 1-D Logistic Chaos Equation In this case, 1-D logistic chaos equation has been taken for encryption of the key used in AES algorithm. The block diagrams of modified AES encryption and decryption processes are shown in Figure 3 and Figure 4. Figure 3.1-D Logistic Chaos variation AES Encryption
  • 4. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 22 Figure 4. 1-D Logistic Chaos variation AES Decryption Figure 5(a) shows the original image which is lena64.bmp. It has been encrypted with the modified AES algorithm using the 1-D logistic chaos encrypted key (shown in Figure 5(b)). Figure 5(c) shows the reconstructed image from the modified AES algorithm. Figure 5. 1-D Logistic Chaos variation AES Process 5.2. Proposed Algorithm using Cross Chaos Equation In this case, cross chaos equation has been taken for encryption of the key used in AES algorithm. The block diagrams of modified AES encryption and decryption processes are shown in Figure 6 and Figure 7. Key Schedule Figure 6. Cross Chaos variation AES Encryption
  • 5. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 23 Figure 7. Cross Chaos variation AES Decryption Figure 8(a) shows the original lena image. It has been encrypted with the modified AES algorithm using the cross chaos encrypted key (shown in Figure 8(b)). Figure 8(c) shows the reconstructed image from the modified AES algorithm. Figure 8. Cross Chaos variation AES Process 5.3. Proposed Algorithm using Dual Equation Here, cross chaos equation along with 1-D logistic chaos equation have been taken for encryption of the key used in AES algorithm. The block diagrams of modified AES encryption and decryption processes are shown in Figure 9 and Figure 10. Figure 9. Dual variation AES Encryption
  • 6. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 24 Figure 10. Dual variation AES Decryption Figure 11(a) shows the original lena image. It has been encrypted with the modified AES algorithm using the cross chaos and 1-D logistic chaos encrypted key (shown in Figure 11(b)). Figure 11(c) shows the reconstructed image from the modified AES algorithm. Figure 11. Dual variation AES Process 5.4. Analysis of Different Proposed Algorithms We have analyzed the above discussed algorithms with the help of CPU times (in seconds). Figure 12 shows the chart for the CPU times for lena64.bmp and moon_64.bmp images in different versions of AES algorithms. 142 144 146 148 150 152 154 lena64.bmp moon_64.bmp Standard AES process 1-D Logistic Chaos variation AES process Cross Chaos variation AES process Dual variation AES process Figure 12. Chart of CPU Times From the chart, we can find the dual variation AES algorithm though takes little more time than the standard AES algorithm, is very much secured. This is because the key has been encrypted by using cross chaos and 1-D logistic chaos equations. As different unknown parameters are involved in these two chaotic equations, it is very difficult to decrypt the key.
  • 7. International Journal of Chaos, Control, Modelling and Simulation (IJCCMS) Vol.2, No.2, June 2013 25 3. CONCLUSIONS The proposed modified algorithms for the AES have been simulated and tested with different chaotic variations such as 1-D logistic chaos equation, cross chaos equation as well as combination of both. For the evaluation purpose, the CPU time has been taken as the parameter. As we are giving more security to the key used for AES algorithm, our proposed algorithms are very much secured from the unauthorized people. In future, these algorithms can be applied in some more specific fields like digital watermarking, video processing. REFERENCES [1] Behrouzan A. Forouzan (2010), Cryptography & Network Security, TMH Publisher, ISBN: 9780070660465. [2] Bruce Schneier (2009), Applied Cryptography, John Wiley & Sons Publisher, ISBN: 9780471117094 [3] Abdulkarim Amer Shtewi, Bahaa Eldin M. Hasan, Abd El Fatah .A. Hegazy (2010), “An Efficient Modified AdvancedEncryption Standard (MAES) Adapted for Image Cryptosystems”, International Journal of Computer Science and Network Security, Vol.10, No.2, pp 226- 232. [4] El-Sayed Abdoul-Moaty ElBadawy, Amro Mokhtar, Waleed A. El-Masry, Alaa El-Din Sayed Hafez (2010), “A New Chaos Advanced Encryption Standard (AES)Algorithm for Data Security”, International Conference on Signals and Electronic Systems, Poland, pp 405- 408. [5] Zhang Zhao, Sun Shiliang (2011), “Image encryption algorithm Based on Logistic chaotic system and s- box scrambling”, 4th International Congress on Image and Signal Processing, IEEE, pp: 177-181. [6] Alireza Jolfaei, Abdolrasoul Mirghadri (2011), “Image Encryption Using Chaos and Block Cipher”, Computer and Information Science, Vol. 4, No. 1, pp: 172-185. [7] Gursharanjeet Singh Kalra, Rajneesh Talwar, Dr. Harsh Sadawarti (2011), “Robust Blind Digital Image Watermarking Using DWT and Dual Encryption Technique”, 3rd International Conference on Computational Intelligence, Communication Systems and Networks, IEEE, pp: 226-230. [8] Chittaranjan Pradhan, Shibani Rath, Ajay Kumar Bisoi (2012), “Non Blind Digital Watermarking Technique Using DWT and Cross Chaos”, 2nd International Conference on Communication, Computing & Security, Elsevier, Vol. 6 pp: 897 – 904. Authors Chittaranjan Pradhan has completed his Bachelor of Engineering in Computer Science & Engineering and Master of Technology in Computer Science & Engineering. Presently, he is working as Assistant Professor in School of Computer Engineering, KIIT University, Bhubaneswar, India. He has published some innovative research papers in International Journals and Conferences. His major research areas cover Computer Security, Digital Watermarking, Image Processing, Chaos Theory and Data Mining. Ajay Kumar Bisoi obtained his Ph. D. in Particle Physics from the Utkal University, Odisha, India. Currently, he is working as Professor & Dean in School of Computer Engineering, KIIT University, Bhubaneswar, India. He is in the teaching profession since 1984. He has been a DAAD scholar at Mainz University, Germany and an Associate Member at ICTP, Italy. He has participated in many national and international forums, talks and discussions. His interest areas are: Fractal Graphics, Digital Watermarking, Chaotic Theory, Software Engineering and Computational Physics.