Abstract

This paper is presenting design and implementation of Threefish block cipher on grayscale images. Despite the fact that Threefish block cipher is one of the best secure algorithms, most studies concerning Threefish have focused on hardware implementation and have not commonly been applied on image encryption due to huge amount of data. The main contribution here was to reduce the time and the amount of data to be encrypted while maintaining encryption performance. This objective was achieved by encrypting just the most significant bits of image pixels. A 256-bit plain text blocks of the Threefish was constructed from 2n most significant bits of the pixels, where 0<n<3. Furthermore, Threefish block cipher was applied when n=3 to analyze the impact of uninvolving some bits in encryption process on the encryption performance. The results indicated that the encryption achieved good encryption quality when n=1, but it might cause some loss in decryption. In contrast, the encryption achieved high encryption quality when n=2, almost as good as the encryption of the whole pixel bits. Furthermore, the encryption time and the amount of data to be encrypted were decreased 50% as n decreased by 1. It was concluded that encrypting half of the pixel bits reduces both time and data, as well as significantly preserves the encryption quality. Finally, although the proposed method passed the statistical analysis, further work is needed to find a method resistant to the differential analysis.

Highlights

  • Sensitive data is required to be transmitted in an inexplicable form by the intruders [1]

  • More than 10 PNG grayscale images were used to analyze the security of the proposed method using MATLAB

  • Threefish256 block cipher was applied when n=3 to analyze the impact of uninvolving some bits in encryption process on the encryption performance

Read more

Summary

Introduction

Sensitive data is required to be transmitted in an inexplicable form by the intruders [1]. It is a system that mainly consists of four elements: encryption function, decryption functions, protocol, and key These four elements determine the category and the strength of cryptographic system [2]. Cryptographic system, in addition, can be classified into stream cipher and block cipher according to the input type of the data that will be encrypted. The DES (Data Encryption Standard), AES (Advance encryption Standard), Blowfish, Twofish, and Threefish, are symmetric block cipher algorithms, while RC5 (Rivest Cipher) is symmetric stream cipher algorithm. Both RSA (Rivest Shamir Adleman) and ECC

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call