An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Cryptosystems

“ IJCSNS International Journal of Computer Science and Network Security 02/2010; 10.


Available from: Bahaa Hasan, Mar 08, 2014
  • [Show abstract] [Hide abstract]
    ABSTRACT: The authentication and key agreement (AKA) protocol of the Universal Mobile Telecommunication System (UMTS) was proposed to solve the vulnerabilities found in the Global System for Mobile Communications (GSM) systems. The UMTS-AKA provides mutual authentication, but is still vulnerable to redirection attack, denial of service attack, and man-in-the-middle attack. Apart from various attacks possibilities, the UMTS-AKA has a problem of counter synchronization, generates huge overhead, and utilizes more bandwidth and message exchanges during the authentication. An intruder may apply these attacks to impersonate the network or mischarge the mobile users. In this paper, we propose an efficient and secure AKA protocol namely ES-AKA to prevent the UMTS network against these problems and attacks. This protocol also solves the synchronization problem occurred between a mobile station MS and its home network HLR. The ES-AKA protocol generates lesser communication overhead as compared to UMTS-AKA, EXTAKA, COCKTAIL-AKA, SKA-AKA, AP-AKA, X-AKA, EURASIP-AKA, Full-AKA, and U-AKA protocols. In addition, it also generates less computation overhead than the UMTS-AKA, EXT-AKA, COCKTAIL-AKA, S-AKA, Full-AKA, and U-AKA protocols. On an average, the ES-AKA protocol reduces 62 % of the bandwidth, which is the maximum reduction of the bandwidth by any AKA protocol referred in the paper. This protocol is also able to reduce 6 % of the messages exchanged (in terms of computations) during the authentication in comparison to UMTS-AKA.
    Wireless Personal Communications 04/2015; DOI:10.1007/s11277-015-2551-7 · 0.98 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: In the digital world, security is an important issue, and encryption is one of the ways to ensure confidentiality. Especially protection of multimedia data is now becoming a big challenge to us. A large number of algorithms for data and image encryption are reported in the literature. But due to their cryptographic weakness or high computational cost, many of them are not suitable in practical applications. In this paper, we introduce an image encryption scheme where a linear transformation is performed before encryption. The encryption is done by employing Advanced Encryption Standard (AES) in Electronic Code Book mode to achieve high throughput. The results showed that the correlation between adjacent image elements was significantly reduced by employing the proposed scheme compared to other schemes. The histogram, correlation, entropy analysis as well as differential cryptanalysis have been done to justify the strength of the proposed scheme.
    09/2014; 17(3). DOI:10.1080/09720529.2014.927645
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a simple scan of plain-image pixels. In this kind of cryptosystems, due to the channel effect, a bit error(s) in the cipher-image produces, at the decryption side, a random bit error in the estimated plain-image. In this paper, we propose a cipher-block encryption algorithm in CBC (Cipher Block Chaining) mode. It consists of a permutation process on the bits achieved by a 2D-cat map, followed by a bitwise XOR operation. Here, each permuted bit (confusion phase) is immediately diffused in a simple manner in the same phase. Therefore, the confusion and diffusion effects are stronger and the cryptanalyses for permutation-only ciphers become ineffective.
    International Conference for Internet Technology and Secured Transactions (ICITST-2013), London (UK); 12/2013