Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images

Authors: Hossam El-din H. Ahmed, Hamdy M. Kalash, Osama S. Farag Allah

Abstract:

This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.

Keywords: Block cipher, Image encryption, Encryption quality, and Security analysis.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1085754

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2353

References:


[1] National Bureau of standards. "Data Encryption Standard," Federal Information processing standards Publication 46, US Government Printing Office, Washington, D.C., 1977.
[2] W. Stallings., "Network and Internetwork Security: Principles and Practice," Prentice-Hall, New Jersey, 1995.
[3] Bruce Schneier, "Applied Cryptography - Protocols, algorithms, and source code in C," John Wiley & Sons, Inc., New York, second edition, 1996.
[4] R.L. Rivest, M.J.B. Robshaw, R.Sidney, and Y.L. Yin, "The RC6TM Block cipher," v.1.1, August 20, 1998. Available at ww.rsa.com/rsalabs/aes/.
[5] Ronald L. Rivest, "RC5 Encryption Algorithm," Dr Dobbs Journal, vol. 226, pp. 146-148, Jan. 1995.
[6] RSA Security. "The RC6 Block cipher," Cryptographic Technique Specifications.
[7] RSA Security. "The RC6 Block cipher," Self Evaluation Report.
[8] Osama S. Farag Allah, Abdul Hamid M. Ragib, and Nabil A. Ismali, "Enhancements and Implementation of RC6 Block Cipher for Data Security". IEEE Catalog Number: 01CH37239, Published 2001.
[9] R.L. Rivest, M.J.B. Robshaw, R.Sidney, and Y.L. Yin, "Some Comments on the First Round AES Evaluation of RC6," available at http:// csrc.nist.gov/encryption/aes/round1/pubcmnts.htm.
[10] Harley R. Myler and Arthur R. Weeks, "The Pocket Handbook of Image Processing Algorithms in C," Prentice-Hall, New Jersey, 1993.
[11] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, ''Implementation of RC5 Block Cipher Algorithm for Digital Images''. Proceeding of The 5th Central European Conference on Cryptography (Moravia Crypt 2005), 15-17 June, 2005, Brno, The Czech Republic.
[12] Ibrahim E. Ziedan, Mohammed M. Fouad, and Doaa H. Salem. "Application of data encryption standard to bitmap and JPEG images," in Proc. 12th National Radio Science Conference (NRSC2003), pp. C16/1-C16/8, 2003.
[13] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, ''Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images.'' Journal of Optical Engineering, vol. 45, 2006
[14] Shujun Li, Guanrong Chen and Xuan Zheng, "Chaos-based encryption for digital images and videos," chapter 4 in Multimedia Security Handbook, February 2004.
[15] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah, "An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Encryption and Decryption''. Accepted for publication in An International Journal of Computing and Informatics, 2007.
[16] Yaobin Mao and Guanrong Chen, "Chaos-based image encryption," in Eduardo Bayro-Corrochano, editor, Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neural Computing and Robotics. Springer-Verlag, Heidelberg, April 2004.
[17] Yaobin Mao, Guanrong Chen, and Shiguo Lian, "A symmetric image encryption scheme based on 3D chaotic Cat maps," Chaos, Solitons and Fractals 21, pages 749-761, 2004.
[18] Business Software Alliance, Matt Blaze et al., "Minimum key length for symmetric ciphers to provide adequate commercial security," available at: http://www.bsa.org/bsa/cryptologists.html
[19] Shannon CE., "Communication theory of secrecy system," Bell Syst Tech J 1949; 28:656-715.