Journal of Applied Nonlinear Dynamics
A Novel Quasigroup Substitution Scheme for Chaos Based Image Encryption
Journal of Environmental Accounting and Management 7(4) (2018) 393412  DOI:10.5890/JAND.2018.12.007
Vinod Patidar, N. K. Pareek, G. Purohit
Department of Physics, Sir Padampat Singhania University, Bhatewar, Udaipur 313601, Rajasthan, India
Download Full Text PDF
Abstract
A During last two decades, there has been a prolific growth in the chaos based image encryption algorithms. Up to an extent these algorithms have been able to provide an alternative to exchange large media files (images and videos) over the networks in a secure way. However, there have been some issues with the implementation of chaos based image ciphers in practice. One of them is reduced/small key space due to the fact that chaotic behavior is only observed for certain range of system parameters/initial conditions of the chaotic system used in such algorithms. To overcome this difficulty, we propose a simple, efficient and robust image encryption algorithm based on combined applications of quasigroups and chaotic standard map. The proposed image cipher is based on the Shannon’s popular substitutiondiffusion architecture where a quasigroup of order 256 and chaotic standard map have been used for the substitution and permutation of image pixels respectively. Due to the introduction of quasigroup as part of the secret key along with the parameter and initial conditions of the chaotic standard map, the key space has been increased significantly. The proposed image cipher is very fast due to the fact that the substitution based on the quasigroup operations is very simple and can be executed easily through the lookup table operations on Latin squares (which are Cayley operation tables of quasigroups) and the permutation is performed rowbyrow as well as columnbycolumn using the pseudo random number sequences generated through the chaotic standard map. The security and performance have been analyzed through the histograms, correlation coefficients, information entropy, key sensitivity analysis, differential analysis, key space analysis etc. and the results prove the efficiency and robustness of the proposed image cipher against the possible security threats.
References

[1]  Fridrich, J. (1998), Symmetric ciphers based on twodimensional chaotic maps, Int. J. Bifurc. Chaos, 8(6), 12591284. 

[2]  Baptista, M. (1998), Cryptography with chaos, Phys. Lett. A, 240(12) 5054. 

[3]  Mao, Y., Chen, G., and Lian, S. (2004), A novel fast image encryption scheme based on 3D chaotic Baker maps, Int. J. Bifurc. Chaos, 14(10), 36133624. 

[4]  Chen, G., Mao, Y., and Chui, C. (2004), A symmetric image encryption scheme based on 3d chaotic cat maps, Chaos Solitons Fractals, 21, 749761. 

[5]  Zhang, L., Liao, X., and Wang, X. (2005), An image encryption approach based on chaotic maps, Chaos, Solitons & Fractals, 24(3), 759765. 

[6]  Pareek, N.K., Patidar, V., and Sud, K.K. (2006), Image encryption using chaotic logistic map, Image and Vision Computing, 24, 926934. 

[7]  Pisarchik, A.N., and Zanin, M. (2008), Image encryption with chaotically coupled chaotic maps, Physica D, 237(20), 26382648. 

[8]  Patidar, V., Pareek, N.K., and Sud, K.K. (2009), A new substitutiondiffusion based image cipher using chaotic standard and logistic maps, Comm. Nonl. Sc. Num. Sim., 14, 30563075. 

[9]  Alvarez, G. and Li, S. (2006), Some basic cryptographic requirements for chaosbased cryptosystems, Int. J. Bifurc. Chaos, 16(8), 21292151. 

[10]  Kelber, K. and Schwarz, W. (2007), Some design rules for chaosbased encryption systems, Int. J. Bifurc. Chaos, 17(10), 37033707. 

[11]  Rhouma, R., Solak, E., and Belghith, S. (2010), Cryptanalysis of a new substitutiodiffusion based image cipher, Commun. Nonlinear Sci. Numer. Simulat, 15(7), 18871892. 

[12]  Solak, E., Çokal, C., Yildiz, O.T., and Biyikoglu, T. (2010), Cryptanalysis of Fridrich's chaotic image encryption, Int. J. Bifurc. Chaos, 20(5), 14051413. 

[13]  Özkaynak, F. and Özer, A.B. (2016), Cryptanalysis of a new image encryption algorithm based on chaos, Optik  International Journal for Light and Electron Optics, 127(13), 51905192. 

[14]  Patidar, V., Pareek, N.K., Purohit, G., and Sud, K.K. (2011), A robust and secure chaotic standard map based pseudorandom permutation substitution scheme for image encryption, Optics Communications, 284, 43314339. 

[15]  Wang, X. and Xu, D. (2015), A novel image encryption scheme using chaos and Longton's ant cellular automaton, Nonlinear Dynamics, 79(4), 24492456. 

[16]  Wu, X., Wang, D., Kurths, J., and Kan, H. (2016), A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system, Information Sciences, 349350, 137153. 

[17]  AbdElHafiz, S.K., AbdElHaleem, S.H., and Radwan, A.G. (2016), Novel permutation measures for image encryption algorithms, Optics and Lasers in Engineering, 85, 7283. 

[18]  Farajallah, M. and Deforges, O. (2016), Fast and secure chaosbased cryptosystem for images, Int. J. Bifurc. Chaos, 26(2), 1650021. 

[19]  Schneier, B. (1996) Applied cryptography: protocols algorithms and source code in C, (Wiley New York) 

[20]  Dénes, J. and Keedwell, A.D. (1992), A new authentication scheme based on Latin squares, Discrete Mathematics, 106107, 157161. 

[21]  Keedwell, A.D. (1999), Crossed inverse quasigroups with long inverse cycles and applications to cryptography, Australasian Journal of Combinatorics, 20, 241250. 

[22]  Kośielny, C. (1996), A method of constructing quasigroupbased streamciphers, Applied Mathematics and Computer Science, 6, 109121. 

[23]  Kośielny, C. and Mullen G.L. (1999), A quasigroupbased publickey cryptosystem, International Journal of Applied Mathematics and Computer Science, 9(4), 955963. 

[24]  Golomb, S., Welch, L., and Dénes, J. (2001), Encryption system based on crossed inverse quasigroups, (US Patent No. WO0191368) 

[25]  Gligoroski, D. (2004), Stream cipher based on quasigroup string transformations, arXiv: cs.CR/0403043. 

[26]  Gligoroski, D. (2005), Candidate OneWay Functions and OneWay Permutations Based on Quasigroup String Transformations, arXiv:cs.CR/0510018. 

[27]  Markovski, S., Gligoroski, D., and Kocarev, L.J. (2005), Unbiased random sequences from quasigroup string transformations, in H. Gilbert, and H. Handschuh, eds., Lecture Notes in Computer Science, 3557, pp.163180 (Springer). 

[28]  Satti, M. and Kak, S. (2009), Multilevel Indexed Quasigroup Encryption for Data and Speech, IEEE Transactions on Broadcasting, 55, 270281. 

[29]  Battey, M. and Parakh, A. (2013), An efficient quasigroup block cipher, Wireless Personal Communications, 73, 6376. 

[30]  Dichtl, M. and Böffgen, P. (2012), Breaking Another QuasigroupBased Cryptographic Scheme, Cryptology ePrint Archive Report 2012/661, available online at http://eprint.iacr.org/2012/661 

[31]  Shcherbacov, V.A. (2012), Quasigroup based cryptoalgorithms, arXiv: math:GR/1201.3016v1. 

[32]  Mileva, A. (2014), New Developments in quasigroupbased cryptography, in Sattar, B., Sadkhan, A.M., Abbas, A.N. Eds. Multidisciplinary Perspectives in Cryptology and Information Security, pp. 286317 (IGI Global) 

[33]  Pflugfelder, H.O. (1991) Quasigroups and Loops: Introduction, (Quasigroups and Loops: Introduction) 

[34]  Dénes, J. and Keedwell, A.D. (1991) Latin squares: New developments in the theory Annals of Discrete Mathematics, 46, (NorthHoland: Elsevier) 

[35]  Lint, V. and Wilson, A. (1992) A Course in Combinatorics (Cambridge University Press) 

[36]  Jacobson, M.T. and Matthews, P. (1996), Generating uniformly distributed random Latin squares, J. Combinat. Desig., 4, 405437. 

[37]  Shannon, C.E. (1949), Communication theory of secrecy systems, Bell System Technical Journal, 28, 656715. 

[38]  Kośielny, C. (2002), Generating quasigroups for cryptographic applications, International Journal of Applied Mathematics and Computer Science, 12, 559569. 

[39]  Mihajloska, H., Yalcin, T., and Gligoroski, D. (2013), How lightweight is the hardware Implementation of Quasigroup Sboxes, in S. Markovski and M. Gušev, eds., Advances in Intelligent Systems and Computing ICT Innovations, pp 121127 (Springer) 