2014 IEEE 12th International New Circuits and Systems Conference (NEWCAS) 2014
DOI: 10.1109/newcas.2014.6934068
|View full text |Cite
|
Sign up to set email alerts
|

A chess-based chaotic block cipher

Abstract: This paper presents a new and efficient block cipher encryption system, which includes confusion as well as diffusion processes. While the confusion process is based on the Lorenz chaotic generator, the diffusion process is chess-based. By utilizing the chess horse movement rules, the diffusion process increases the encryption complexity and improves the differential attack measures. Furthermore, combining chaotic and chessbased algorithms increases the length of the encryption key and, hence, makes brute forc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Whereas Zhang et al [26] used compressive sensing along with Arnold's map in order to encrypt color images into grey images, Zhang et al [27] used a coupled logistic map, self adaptive permutation, substitution boxes and combined global diffusion to perform the encryption. Finally, AbdEl Haleem et al [28] used a chess-based algorithm to perform the permutation process and the Lorenz system to perform the substitution process. In summary, permutations and substitutions can be performed using chaotic systems, non-chaotic algorithms or a combination of both.…”
Section: Introductionmentioning
confidence: 99%
“…Whereas Zhang et al [26] used compressive sensing along with Arnold's map in order to encrypt color images into grey images, Zhang et al [27] used a coupled logistic map, self adaptive permutation, substitution boxes and combined global diffusion to perform the encryption. Finally, AbdEl Haleem et al [28] used a chess-based algorithm to perform the permutation process and the Lorenz system to perform the substitution process. In summary, permutations and substitutions can be performed using chaotic systems, non-chaotic algorithms or a combination of both.…”
Section: Introductionmentioning
confidence: 99%
“…Typical scheme for image encryption is that it contains substitution and permutation stages aiming at fulfilling confusion and diffusion characteristics which are due to Shannon [11]. The latter or permutation stage alters the places by employing chaotic or non-chaotic generators [12], [13], [14]. The former or substitution stage alters the pixels values employing a generator of pseudo random number or two other techniques [15], [16], [17].…”
Section: Introductionmentioning
confidence: 99%