IJCNIS Vol. 10, No. 4, 8 Apr. 2018
Cover page and Table of Contents: PDF (size: 2027KB)
Cryptography, chaotic function, fuzzy logic and Genetic Algorithm
As the result of increasing use of internet in daily communication and the importance of information security during data storage and transmission process, we propose iterative Chaotic Genetic-fuzzy Encryption Technique(C-GET) in order to enhance secured encryption technique and less predictable. In this technique,binarize any digital data type. The main encryption stages of C-GET are chaotic map functions, fuzzy logic and genetic operations. Mathematic operations and rotation are also included that increase encryption quality. Images are used for testing propose. For testing C-GET,digitalimagesareusedbecause they become an important resource of communication. The original and reconstructed data are identical. Experimental results show that C-GET technique has multilayer protection stages against various attacks and a powerful security based on the multi-stages, multiple parameters, fuzzy logic and genetic operations. Decrypted data is nearly randomness and has negligible correlation with secret data.
Hamdy M. Mousa, "Chaotic Genetic-fuzzy Encryption Technique", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.4, pp.10-19, 2018. DOI:10.5815/ijcnis.2018.04.02
[1]William Stallings, "Cryptography and Network Security: Principles and Practice", Prentice Hall, 2011.
[2]Keith M. Martin,” Everyday Cryptography Fundamental Principles and Applications”, Oxford University Press Inc., New York, 2012.
[3]B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.
[4]R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Crypto-systems,” Communication ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[5]Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, “Security in Computing”, FIFTH EDITION,Pearson Education, Inc., 2015.
[6]Janailin Warjri and Dr. E. George Dharma Prakash Raj,” KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69”, I. J. Computer Network and Information Security, vol., 10, pp. 37-43, 2013.
[7]Sajasi, S.; Eftekhari Moghadam, A. M.,"A high quality image hiding scheme based upon noise visibility function and an optimal chaotic based encryption method", IEEE, AI & Robotics and 5thRoboCup Iran Open International Symposium (RIOS), 2013.
[8]Subhajit Das, Satyendra Nath Mandal, Sunil Karforma, “Fuzzy-GA Combined Approach in Image Encryption” International Journal of Computer Sciences and Engineering (www.ijcseonline.org) Vol.-4(6), pp. 137-142, Aug 2016.
[9]Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen,"The New Block Cipher Design (Tigris Cipher)", IJCNIS, vol.7, no.12, pp. 10-18, 2015.
[10]Ahmed Y. Mahmoud, Alexander G. Chefranov, "A Hill Cipher Modification Based on Eigenvalues Extension with Dynamic Key Size HCM-EXDKS", IJCNIS, vol.6, no.5, pp.57-65, 2014.
[11]Hinal M. Mudia and Pallavi V. Chavan, “Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme”, Procedia Computer Science 78, pp. 632 – 639, 2016.
[12]K. Ganesh Kumarand D. Arivazhagan” New Cryptography Algorithm with Fuzzy Logic for Effective Data Communication”, Indian Journal of Science and Technology, Vol. 9(48), pp. 1-6, December 2016.
[13]Musheer Ahmad, Hamed D. Alsharari and Munazza Nizam, “Security Improvement of an Image Encryption Based on mPixel-Chaotic-Shuffle and Pixel-Chaotic-Diffusion”, arXiv: 1403.6626 [cs.CR], 2014. (https://arxiv.org/ftp/arxiv/papers/1403/1403.6626.pdf)
[14]GAMIL R.S. QAID1, SANJAY N. TALBAR, “Encrypting Image by Using Fuzzy Logic Algorithm”, International Journal of Image Processing and Vision Sciences (IJIPVS), Vol-2, Iss-1, pp. 25-29, 2013.
[15]Mani. K, Viswambari. M, "Enhancing the Security in Cryptosystems Based on Magic Rectangle", International Journal of Computer Network and Information Security, Vol.9, No.4, pp. 37-47, 2017.
[16]Naveed Ahmed Azam,”A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding”, Security and Communication Networks, pp. 1-9 Volume 2017.
[17]Michael Fran?ois, Thomas Grosges, Dominique Barchiesi, Robert Erra, “Image Encryption Algorithm Based on a Chaotic Iterative Process”, Applied Mathematics (http://www.SciRP.org /journal/am), 3, pp. 1910-1920, 2012.
[18]Jawad Ahmad and Fawad Ahmed, “Efficiency Analysis and Security Evaluation of Image Encryption Schemes”, International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 12 No. 04, pp. 19-31, 2012.
[19]Noorul Hussain Ubaidur Rahman, Chithralekha Balamurugan and Rajapandian Mariappan,”A Novel DNA Computing based Encryption and Decryption Algorithm”, Procedia Computer Science 46 pp. 463 –475, 2015. (International Conference on Information and Communication Technologies (ICICT 2014)
[20]Fatma E. Ibrahim, M. I. Moussa and H. M. Abdalkader, “A Symmetric Encryption Algorithm based on DNA Computing”, International Journal of Computer Applications (0975 – 8887) Volume 97– No.16, pp. 41-45, July 2014.
[21]Zhang, Q., Guo, L. and Wei, X., “Image encryption using DNA addition combining with chaotic maps”, Mathematical and Computer Modelling 52, pp. 2028-2035, 2010.
[22]Hamdy M. Mousa, “DNA-Genetic Encryption Technique”, I. J. Computer Network and Information Security, No. 7, pp. 1-9, 2016.
[23]Scharinger, J., “Fast encryption of image data using chaotic Kolmogorov flows”, Journal of Electronic Imaging 7, pp. 318–325, 1998.
[24]Fridrich, J., “Symmetric ciphers based on two-dimensional chaotic maps”, International Journal of Bifurcation and Chaos 8, pp. 1259–1284, 1998.
[25]Chen G, Mao Y B, Chui C K., “A symmetric image encryption scheme based on 3D chaotic cat maps”, Chaos, Solitons & Fractals 21, pp. 749-761, 2004.
[26]Mao Y, Chen G, Lian S., “A novel fast image encryption scheme based on 3D chaotic Baker maps”, International Journal of Bifurcation and Chaos 14, pp. 3613–3624, 2004.
[27]Liu H, Zhu Z, Jiang H, Wang B., “A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map”, The 9th IEEE International Conference for Young Computer Scientists, pp. 3016-3021, 2008.
[28]Huang, C. K., Nien, H. H., “Multi chaotic systems based pixel shuffle for image encryption”, Optics Communications 282, pp. 2123–2127, 2009.
[29]Edward N. Lorenz, “Deterministic nonperiodic flow”, in Journal of the Atmospheric Sciences, Vol. 20, pp.130–141, 1963.
[30]Hénon M., “A two-dimensional mapping with a strange attractor”, Communications in Mathematical Physics. 50(1), pp. 69–77, 1976.
[31]George J. Kllr and Bo Yuan, “Fuzzy Sets and Fuzzy Logic Theory .and Applications”, Prentice Hall PTR, New Jersey, 1995.
[32]Timothy J. Ross, “Fuzzy Logic with Engineering Applications”, John Wiley & Sons Ltd, 2004.
[33]David A. Coley, “AN INTRODUCTION TO GENETIC ALGORITHMS FOR SCIENTISTS AND ENGINEERS”, World Scientific Publishing Co. Pte. Ltd, 1999.
[34]Yue Wu, Joseph P. Noonan, and Sos Agaian, “NPCR and UACI Randomness Tests for Image Encryption”, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.
[35]Nisar Ahmed, Hafiz Muhammad Shahzad Asif, Gulshan Saleem,"A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.12, pp.18-29, 2016.
[36]Moore, D.S., “The basic practice of statistics”, W. H. Freeman and Company, New York, 2009.
[37]Robert M. Gray, Entropy and information theory, Springer-Verlag New York, Inc., New York, NY, 1990.