Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 20, pp 27337–27361 | Cite as

Chaotic encryption with different modes of operation based on Rubik’s cube for efficient wireless communication

  • Mai HelmyEmail author
  • El-Sayed M. El-Rabaie
  • Ibrahim M. Eldokany
  • Fathi E. Abd El-Samie
Article
  • 133 Downloads

Abstract

A novel image encryption algorithm based on the Rubik’s cube scrambling is proposed in this paper to achieve simultaneous encryption of a group of images. This proposed encryption algorithm begins with chaotic Baker map permutation with a selected mode of operation or RC6 algorithm as a first step for encrypting the images, separately. After that, the obtained encrypted images are further encrypted in a second stage with Rubik’s cube. Chaotic or RC6 encrypted images are used as the faces of the Rubik’s cube. From the concepts of image encryption, the RC6 algorithm adds a degree of diffusion, while chaotic Baker map adds a degree of permutation. The Rubik’s cube algorithm adds more permutation to the encrypted images, simultaneously. The simulation results demonstrate that the proposed encryption algorithm is efficient, and it exhibits strong robustness and security. The encrypted images are further transmitted over a wireless channel with Orthogonal Frequency Division Multiplexing (OFDM) system, and decrypted at the receiver side. Evaluation of the quality of the decrypted images at the receiver side reveals good performance.

Keywords

Orthogonal Frequency Division Multiplexing (OFDM) Rubik’s cube Chaotic Baker map RC6 Rayleigh fading 

References

  1. 1.
    Abraham L, Daniel N (2013) Secure Image encryption algorithms: a review. Int J Sci Technol Res 2(4):80–83Google Scholar
  2. 2.
    Abraham L, Daniel N (2013) An improved color image encryption algorithm with pixel permutation and bit substitution. Int J Res Eng Technol 02(11)CrossRefGoogle Scholar
  3. 3.
    Andrews JG, Ghosh A, Muhamed R (2007) Fundamentals of WiMAX understanding broadband wireless networking. In: Prentice Hall communications engineering and emerging technologies series, p 113–145Google Scholar
  4. 4.
    Bergman C (2005) Encryption modes, Lecture, p 1-18, http://orion.math.iastate.edu/cbergman/crypto/ps files/4up/chaining.pdf
  5. 5.
    Ebrahim M, Karachi SK, Karachi UBK (2013) Symmetric algorithm survey: a comparative analysis. Int J Comput Appl 61(20):12–19Google Scholar
  6. 6.
    Eldokany I, El-Rabaie E-SM, Elhalafawy SM, Zein Eldin MA, Shahieen MH, Soliman NF, El-Bendary MAM, El-Naby MA, Al-kamali FS, Elashry IF, Abd El-Samie FE (2015) Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Communications. Springer Science + Business Media New York. 84(1):475–521.  https://doi.org/10.1007/s11277-015-2645-2 CrossRefGoogle Scholar
  7. 7.
    Elementray cryptography, Modes of operation, p 29-33, http://magma.maths.usyd.edu.au/~kohel/teaching/MATH3024/Lectures/lectures05.pdf
  8. 8.
    El-Fishawy N, Abu Zaid OM (2007) Quality of encryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms. Int J Netw Secur 5(3):241–251Google Scholar
  9. 9.
    Elkamchouchi HM, Makar MA. Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers. In: Proceedings Twenty second National Radio Science Conference (NRSC 2005), p C11, Cairo, Egypt, Mar. 15, 17, 2005Google Scholar
  10. 10.
    Hashim AT, Mahdi JA, Abdullah SH (2010) A proposed 512 bits RC6 encryption algorithm. IJCCCE 10(1):12-25Google Scholar
  11. 11.
    Joyner WD. Mathematics of the Rubik’s cube. Spring Semester, 1996–7. 1-275Google Scholar
  12. 12.
    Lawrey E (1997) The suitability of OFDM as a modulation technique for wireless telecommunications, with a CDMA comparison. Bachelor thesis, James Cook UniversityGoogle Scholar
  13. 13.
    Lawrey EP (2001) Adaptive techniques for multiuser OFDM. Ph.D. thesis, James Cook UniversityGoogle Scholar
  14. 14.
    Lawrey E. The suitability of OFDM as a modulation technique for wireless telecommunications, with a CDMA comparison. Bachelor Thesis, James Cook UniversityGoogle Scholar
  15. 15.
    Li S, Mou X, Cai Y (2001) Improving security of a chaotic encryption approach. Phys Lett A 290(3–4):127–133MathSciNetCrossRefGoogle Scholar
  16. 16.
    Li S, Zheng X, Mou X, Cai Y (2002) Chaotic encryption scheme for real-time digital video. In Proceedings of SPIE 4666: 149–160Google Scholar
  17. 17.
    Mohamed AB, Zaibi G, Kachouri A (2011) Implementation of RC5 and RC6 Bolck ciphers on digital images systems, signals and devices (SSD), 8th International Multi-Conference, Sousse, Tunisia, 12 May 2011Google Scholar
  18. 18.
    Ramia F, Qadir H (2006) GMU., RC6 implementation including key scheduling using FPGA, (ECE 646 Project)Google Scholar
  19. 19.
    Sirisha M, Lakshmi SVVS (2014) Pixel transformation based on Rubik’s cube principle. Int J Appl Innov Eng Manage 3(5):273-277Google Scholar
  20. 20.
    Swiss encryption technology, MediCrypt, Modes of operation, p 1-4, http://www.mediacrypt.com/pdf/MCmodes1204.pdf
  21. 21.
    Tan P, Beaulieu NC (2005) Precise bit error probability analysis of DCT OFDM in the presence of carrier frequency offset on AWGN channels. In: Proceedings of the IEEE Globcom 2005, p 1429–1434Google Scholar
  22. 22.
    Verma HK, Singh RK (2012) Performance analysis of RC6, Twofish and Rijndael block cipher algorithms. Int J Comput Appl 42(16):1–7Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Mai Helmy
    • 1
    Email author
  • El-Sayed M. El-Rabaie
    • 1
  • Ibrahim M. Eldokany
    • 1
  • Fathi E. Abd El-Samie
    • 1
  1. 1.Department of Electronics and Electrical Communications, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt

Personalised recommendations