Vishwas C. G. M.

Work place: J.N.N. College of Engineering / Department of Information Science & Engineering, Shivamogga-577204, Karnataka, India

E-mail: vishwascgm@jnnce.ac.in

Website:

Research Interests: Information-Theoretic Security, Information Security

Biography

Vishwas C. G. M. is currently working as Assistant Professor in the Department of Information Science & Engineering at Jawaharlal Nehru New College of Engineering (J.N.N.C.E), Shivamogga, Karnataka, India. He completed his Bachelor's in Computer Science & Engineering and Master's in Computer Science & Engineering from J.N.N.C.E in 2000 and 2003, respectively. He is interested in research areas including Information Security and Cryptography.

Author Articles
Chaotic Map based Random Binary Key Sequence Generation

By Vishwas C. G. M. R. Sanjeev Kunte

DOI: https://doi.org/10.5815/ijcnis.2024.04.07, Pub. Date: 8 Aug. 2024

Image encryption is an efficient mechanism by which digital images can be secured during transmission over communication in which key sequence generation plays a vital role. The proposed system consists of stages such as the generation of four chaotic maps, conversion of generated maps to binary vectors, rotation of Linear Feedback Shift Register (LFSR), and selection of generated binary chaotic key sequences from the generated key pool. The novelty of this implementation is to generate binary sequences by selecting from all four chaotic maps viz., Tent, Logistic, Henon, and Arnold Cat map (ACM). LFSR selects chaotic maps to produce random key sequences. Five primitive polynomials of degrees 5, 6, 7, and 8 are considered for the generation of key sequences. Each primitive polynomial generates 61 binary key sequences stored in a binary key pool. All 61 binary key sequences generated are submitted for the NIST and FIPS tests. Performance analysis is carried out of the generated binary key sequences. From the obtained results, it can be concluded that the binary key sequences are random and unpredictable and have a large key space based on the individual and combination of key sequences. Also, the generated binary key sequences can be efficiently utilized for the encryption of digital images.

[...] Read more.
Encryption Using Binary Key Sequences in Chaotic Cryptosystem

By Vishwas C. G. M. R. Sanjeev Kunte Varun Yarehalli Chandrappa

DOI: https://doi.org/10.5815/ijcnis.2023.04.05, Pub. Date: 8 Aug. 2023

Transmission of images on the network is considered insecure which has security-related issues. In this paper, to provide security to digital images, an encryption system that uses four chaotic maps for binary key sequence generation is proposed. The system consists of stages namely, confusion, generation of random binary chaotic key sequence, pseudo-random number generation (RN), and diffusion. Keys for encryption are chosen randomly based on a pseudo random generator from the selected chaotic maps by the linear feedback shift register (LFSR). The algorithm achieves good results in terms of NPCR, UACI, and entropy values. The developed cryptosystem resists differential attacks, is sensitive to minor alterations in the keys, and has a large key space.

[...] Read more.
Other Articles