A novel clock-glitch-attack-proof image encryption algorithm implemented on FPGA

被引:0
|
作者
Talal Bonny
Farah AlMutairi
Wafaa Al Nassan
机构
[1] University of Sharjah,Department of Computer Engineering
来源
关键词
Switching-type chaotic oscillator; Autonomous and non-autonomous chaotic oscillator; FPGA;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, chaotic systems are widely used in engineering applications. They play a vital role, particularly in cryptography and secure communication systems. This paper proposed an image encryption scheme based on the chaotic oscillator and highlights the risk of using non-autonomous chaotic oscillators as a source of entropy to construct the encryption key. In this study, we propose a symmetric image encryption scheme consisting of two main phases: position permutation and value transformation using XOR bitwise operation. The encryption key is utilized twice, once in the position permutation phase and then again in the value transformation phase. Our analysis of the proposed algorithm reveals that the majority of the computational time required for image encryption is attributed to the position permutation phase. To determine the appropriate number of iterations needed for each image size, we examine the three factors of correlation between adjacent pixels, entropy, and computational time, specifically focusing on the shuffling step. This analysis leads to significant improvements in our initial computational time, reducing it by up to ten times. To evaluate the encryption scheme, we employ two types of chaotic oscillators, autonomous and non-autonomous, across six different image sizes. We consider various metrics such as computational time, correlation between adjacent pixels, and entropy of the ciphered image. Additionally, we implement the non-autonomous chaotic oscillator on an FPGA to assess its vulnerability to a clock glitch attack, which affects the system’s randomness. Based on our experimental results, we observe that both oscillators can effectively serve as a source of entropy for cryptographic applications.
引用
收藏
页码:18881 / 18906
页数:25
相关论文
共 50 条
  • [41] A NOVEL IMAGE ENCRYPTION ALGORITHM BASED ON LOGISTIC AND HENON MAP
    Jiang, Yan
    Li, Bo
    2016 13TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2016, : 66 - 69
  • [42] A novel bit permutation-based image encryption algorithm
    Raza, Saiyma Fatima
    Satpute, Vishal
    NONLINEAR DYNAMICS, 2019, 95 (02) : 859 - 873
  • [43] A novel image encryption algorithm based on SPWLCM and DNA coding
    Zhang, Shijie
    Liu, Lingfeng
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2021, 190 : 723 - 744
  • [44] A novel image encryption algorithm based on pseudo DNA coding
    Mao, Yanbin
    Zhang, Xuanping
    Yang, Xiaogang
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2015, 49 (09): : 91 - 98
  • [45] An efficient image encryption algorithm based on a novel chaotic map
    Chengqi Wang
    Xiao Zhang
    Zhiming Zheng
    Multimedia Tools and Applications, 2017, 76 : 24251 - 24280
  • [46] A novel batch image encryption algorithm using parallel computing
    Song, Wei
    Zheng, Yu
    Fu, Chong
    Shan, Pufang
    INFORMATION SCIENCES, 2020, 518 : 211 - 224
  • [47] An efficient image encryption algorithm based on a novel chaotic map
    Wang, Chengqi
    Zhang, Xiao
    Zheng, Zhiming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) : 24251 - 24280
  • [48] A novel grayscale image encryption algorithm based on logistic map
    Sui Liansheng
    Wang Wengang
    Duan Kuaikuai
    Zhang Zhiqiang
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 221 - +
  • [49] A novel bit permutation-based image encryption algorithm
    Saiyma Fatima Raza
    Vishal Satpute
    Nonlinear Dynamics, 2019, 95 : 859 - 873
  • [50] A Novel Algorithm for Block Encryption of Digital Image Based on Chaos
    Peng, Jun
    Zhang, Du
    Liao, Xiaofeng
    INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2011, 5 (01) : 59 - 74