performance evluvation of chaotic encryption technique
TRANSCRIPT
PERFORMANCE EVALUVATION OF CHAOTIC ENCRYPTION
GUIDE: PROF JOHN SINGHSITE
ANCY MARIAM BABU10MCA0010
OBJECTIVES
The main objectives are: To analyze the confidentiality, integrity of the
transmitting video data To analyze the efficiency of each chaotic algorithm To observe the encryption speed , power consumption
and CPU utilization of the system.
INTRODUCTION
What is cryptography? The objectives of cryptography What is chaos? Chaotic cryptography
Chaotic encryption Chaotic decryption
CRYPTOGRAPHY
Cryptography is science of secure information.
Components: Encryption Decryption
Objectives: Confidentiality Authentication Integrity
CHAOS
The term ‘CHAOS’ defined: the state of randomness or confusion.
Chaos theory A field of study in mathematics Study the behavior of dynamic systems
with initial condition
CHAOTIC CRYPTIGRAPHY-HISTORY
IN 1950, SHANNON MENTIONED CHAOS CAN USEDD FOR CRYPTOGRAPHY
AT 1980, SHANNON DEVELOPED CHAOTIC THEORY
1N 1990, FIRST CHAOTIC BASED CIPHER 1N 1998, CHAOTIC ENCRYPTON
DEVELOPED BY BAPTISTA IN 2000, CHAOS STARTED TO USE
WIDELY
CHAOTIC CRYPTOGRAPHY
Type of fast and secure cryptographic method Usually chaotic signals are noisy like and
chaotic systems are initially sensitive. Substantial reduction in encryption and
decryption time. Components
Chaotic encryption and decryption
CHAOTIC ENCRYPTION
Known as Baptista's method . Encryption process
Define mapping scheme of trajectory Choose initial condition and parameter key Set initial condition as current trajectory Iterate the chaotic equation until the trajectory
reaches the destination site for each symbol. Store the number of iterations as a cipher Encrypt the next message with current
trajectory Produce cipher and repeat the process
CHAOTIC DECRYPTION
Decryption process Set the initial condition and parameters and apply the
same mapping scheme for decryption. Iterate the chaotic equation by the cipher (number of
iterations). Find out the site that the trajectory belonged to and
store the symbol of the site as message symbol. Decrypts next symbol by iterating the current trajectory
and producing the next message symbol and so on.
EXISTING METHODS
Selected algorithms are CVES SEA NCA EES
ALGORITHMS
CVEA Proposed by Shu Jun Lia, Xuan Zhengb, Xuanqin Moua and
Yuanlong Caia Universal hasty encryption scheme Method: encrypt the video using plain cluster The encryption procedure: one plain-cluster is encrypted by
stream sub cipher and followed by block sub cipher. Decryption: the encrypted plain-cluster is firstly decrypted
by block sub-cipher Pre decrypted plain cluster is encrypted by stream sub
cipher.
ALGORITHMS
SEA Low cast targeted encryption Operates on several word sizes, texts and key Based on Feistel theory with random round of
varying numbers.
NCA Use power function and the tangent function Proposed by Hogan Gao, Yisheng Zhang, Shuyun
Liang, Dequn Li. Two parts of analysis:
Logistic map analysis NCA map design
ALGORITHM
EES Approved by U.S department of commerce in
1994. Considerable feature is a key escrowed method
enabling for detecting attacker Symmetric key encryption method Both SKIPJACK and LEAF creation methods are
used for the encryption or decryption.
RESULTS AND DISCUSSION
Performance analysis of selected chaotic encryption technique
Parameters used: Encryption speed CPU utilization Power consumption
Tool used: CPU meter Encryption –decryption tools Laptop with IV CPU 2.4GHz
PARAMETERS
ENCRYPTION SPEED: Throughput of the encryption indicate speed of
encryption.
CPU utilization: CPU utilization means the CPU processing time. It indicates the load on the CPU
Power consumption: CPU cycle measurement. Depends on the load on CPU
ENCRYPTION SPEED
THROUGHPUT
0
5
10
15
20
25
30
35
40
45
comparison of different encryp-tion in terms of encryption time and packet size:
CVES
SEA
NCA
EES
POWER CONSUMPTION
49 100 247 694 963 3341.19 5310.880
200
400
600
800
1000
1200
1400
1600
1800
2000
comparison of different encryption in terms of encryption time and packet size:CVESSEANCAEES
TOOLS
CPU meter Encryption decryption tool
Snapshots of encryption
USING CERTAIN TOOLS FOR ENCRYPTION
SNAPSHOTS FOR ENCRYPTED DATA
CONCLUSION
Chaotic cryptography provides higher security and efficiency to resist the attack.
CVES and NCA – better encryption speed EES needs more time to encrypt All the algorithm ranges security from high to
middle level.
REFFEERENCE
Gary C. Kessler 1998, An overview of cryptography, Auerbach (September 1998) pp 3-4.
Jon Collas 2009, introduction to cryptography, pgp cooperation pp7-29
Deckert Florian , 23 march 2007, A brief history of cryptography, slide share.net 1 April 2010
J Wei, X Liao, K Wong, T Xiang 2006, A new chaotic cryptosystem, chaos Solutions & Fractals – Elsevier pp 4-10
M.K.HO (Archon) 2001 chaotic encryption standard-history, chaotic encryption webmaster
Stephen R. Addison, John E. Gray 2006 Chaos and encryption: problems and potential , IEEE 2006 , pp 275
REFFERENCE
T Yang 2004, A Survey of chaotic secure communication system , international journal of computational cognitive, yangsky.com
Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai February 2002, chaotic encryption scheme for real time digital video, electronic imaging 2002, vol: 4666, pp149-160
Yaobin Mao and Guanrong Chen, chaos based image encryption, 725 publications/journal pp8-20
G. Alvartz and Shujun Li, 2009, Crypt analyzing a nonlinear chaotic algorithm(NCA) for image encryption, communication in nonlinear science and numerical simulations vol:14 pp 3743-3759