“…In the systems that were based on chaotic systems, key space increases by increasing the number of parameters and the chaotic system size. In this approach, the key space is (10 14 ) 6 which is nearly equal to 2 279 and it's sufficient to resist each type of brute-force attacks. Table 2 shows the key space compared to some related works.…”
Section: Key Space Analysesmentioning
confidence: 99%
“…Qi Zhang et al [5] implemented an algorithm for image encryption based upon chaotic sequences that have been created by the Lorenz system. Kayhan C. and Erol K. [6] was proposed an innovative image encryption method based on the Lorenz chaotic system and pixel shuffling. For the pixel shuffling process, they have used two initial vectors, one of columns and another of rows.…”
In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The proposed scheme was based on multiple stages of confusion and diffusion. The diffusion process was implemented twice, first, by permuting the pixels of the plain image by using an Arnold cat map and, the second time by permuting the plain image pixels via the proposed permutation algorithm. The confusion process was performed many times, by performing the XOR operation between the two resulted from permuted images, subtracted a random value from all pixels of the image, as well as by implementing the mix column on the resulted image, and by used the Lorenz key to obtain the encrypted image. The security analysis tests that used to exam the results of this encryption method were information entropy, key space analysis, correlation, histogram analysis UACI, and NPCR have shown that the suggested algorithm has been resistant against different types of attacks.
“…In the systems that were based on chaotic systems, key space increases by increasing the number of parameters and the chaotic system size. In this approach, the key space is (10 14 ) 6 which is nearly equal to 2 279 and it's sufficient to resist each type of brute-force attacks. Table 2 shows the key space compared to some related works.…”
Section: Key Space Analysesmentioning
confidence: 99%
“…Qi Zhang et al [5] implemented an algorithm for image encryption based upon chaotic sequences that have been created by the Lorenz system. Kayhan C. and Erol K. [6] was proposed an innovative image encryption method based on the Lorenz chaotic system and pixel shuffling. For the pixel shuffling process, they have used two initial vectors, one of columns and another of rows.…”
In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The proposed scheme was based on multiple stages of confusion and diffusion. The diffusion process was implemented twice, first, by permuting the pixels of the plain image by using an Arnold cat map and, the second time by permuting the plain image pixels via the proposed permutation algorithm. The confusion process was performed many times, by performing the XOR operation between the two resulted from permuted images, subtracted a random value from all pixels of the image, as well as by implementing the mix column on the resulted image, and by used the Lorenz key to obtain the encrypted image. The security analysis tests that used to exam the results of this encryption method were information entropy, key space analysis, correlation, histogram analysis UACI, and NPCR have shown that the suggested algorithm has been resistant against different types of attacks.
“…In order to prove robust chaos encryption system, there are many tests to check. Histogram results and correlation values have shown that encryption of images can be unpredictable [23]. However, all those studies have come out a security issue that one can reach the digital data easier via internet and hardware or analog circuit-based solutions can serve better solutions, when they are used in real-time basis in order to prevent that online insecurity.In a recent study [24], Kurt and Bingol has proposed a new circuit, namely R2L2D circuit.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.