Lightweight encryption scheme based on a new NLFSR

被引:1
|
作者
Kumari, Punam [1 ]
Mondal, Bhaskar [1 ]
机构
[1] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna 800005, India
关键词
Feedback shift register; NLFSR; Randomness; Pseudorandom; PRNG; Lightweight encryption; Security; IMAGE ENCRYPTION; STREAM CIPHER; LIZARD; MAP;
D O I
10.1007/s11042-024-18222-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new nonlinear feedback shift register (NLFSR) in the Galois configuration to generate the pseudorandom number sequences (PRNS) for a lightweight encryption scheme. In the NLFSR, the feedback function is applied to each state, not only the last bit of NLFSR. In the proposed design the size of the feedback is reduced using Galois configuration. The NLFSR is tested with NIST Statistical Test Suite to evaluate its quality randomness. The new NLFSR is used as an pseudorandom number generator to design a new lightweight image encryption algorithm. The encryption process can be represent in two phases permutation and diffusion. In the first phase, two different PRNSs generated by the new NLFSR for permute the row and column pixels of the plain image (PI). Then convert the permuted image into a 1D binary vector. In the diffusion phase, DNA arithmetic is applied between the 1D and another PRNS generated by the same NLFSR with different key. Several security analysis tests are performed on the proposed scheme (like histogram analysis, entropy, correlation coefficient, NPCR, UACI, MSE, and PSNR ) to test the security strength of the encryption method. It was found that the new NLFSR had passes all the tests in NIST Statistical Test Suite, and the test results of the encryption scheme are also acceptable and shows potential security strength.
引用
收藏
页码:64919 / 64943
页数:25
相关论文
共 50 条
  • [21] HEliOS: Huffman Coding Based Lightweight Encryption Scheme for Data Transmission
    Islam, Mazharul
    Nurain, Novia
    Kaykobad, Mohammad
    Chellappan, Sriram
    Al Islam, A. B. M. Alim
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 70 - 79
  • [22] A lightweight chaos-based encryption scheme for IoT healthcare systems
    Clemente-Lopez, Daniel
    Rangel-Magdaleno, Jose de Jesus
    Munoz-Pacheco, Jesus Manuel
    INTERNET OF THINGS, 2024, 25
  • [23] Lightweight secure image encryption scheme based on chaotic differential equation
    Javeed, Adnan
    Shah, Tariq
    Attaullah
    CHINESE JOURNAL OF PHYSICS, 2020, 66 : 645 - 659
  • [24] A lightweight tree based one-key broadcast encryption scheme
    Asano, Tomoyuki
    Kamio, Kazuya
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (07) : 2019 - 2028
  • [25] Lightweight, dynamic and efficient image encryption scheme
    Hassan Noura
    Ali Chehab
    Mohamad Noura
    Raphaël Couturier
    Mohammad M. Mansour
    Multimedia Tools and Applications, 2019, 78 : 16527 - 16561
  • [26] Lightweight, dynamic and efficient image encryption scheme
    Noura, Hassan
    Chehab, Ali
    Noura, Mohamad
    Couturier, Raphael
    Mansour, Mohammad M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (12) : 16527 - 16561
  • [27] A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data
    Tahir, Shahzaib
    Ruj, Sushmita
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    Glackin, Cornelius
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (04) : 530 - 544
  • [28] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57
  • [29] A New Biometric Identity Based Encryption Scheme
    Sarier, Neyire Deniz
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2061 - 2066
  • [30] A New Encryption Scheme based on Hybrid Problems
    Sahu, Hemlal
    Sharma, B. K.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 524 - 527