Abstract
Ensuring data security and integrity is crucial for achieving the highest level of protection and performance in modern cyber-physical systems (CPS). Authenticated encryption with associated data (AEAD) is an efficient and secure way to encrypt data that ensures confidentiality and authenticity. The proposed work focuses on image encryption using the TinyJAMBU cipher within the AEAD scheme. In this paper, image encryption using the TinyJAMBU cipher with software and hardware modeling has been proposed, and image encryption evaluation over standard matrices has been performed. The hardware architecture for TinyJAMBU has been implemented on the Xilinx Virtex-7 FPGA device. The implementation results are compared with the realization of other contemporary ciphers that make TinyJAMBU-128’s implementation better in terms of look-up tables (LUTs), slice utilization, and power consumption. In the experimentation phase, the results of TinyJAMBU-128/192/256 for image encryption have been compared with existing image encryption techniques. It has been observed that, compared to other implementations, the proposed image encryption application using TinyJAMBU provides better results for PSNR, MSE, RMSE, and UACI.
Similar content being viewed by others
Data availability
The codes/data referenced in this research may be available for public access. Interested researchers may request access from the corresponding author for academic usage, subject to approval.
References
Abdulgadir, A., Lin, S., Farahmand, F., Kaps, JP., Gaj, K.: Side-channel resistant implementations of a novel lightweight authenticated cipher with application to hardware security. In: Proceedings of the 2021 on great lakes symposium on VLSI. Virtual Event, USA, pp. 229–234 (2021)
Assche, G.V., Keer, R.V.: Xoodyak, a lightweight cryptographic scheme. IACR Transactions on Symmetric Cryptology (2020)
Bakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665–673 (2013)
Banik, S., Chakraborti, A., Inoue, A., Iwata, T., Minematsu, K., Nandi, M., Peyrin, T., Sasaki, Y., Sim, SM., Todo, Y.: GIFT-COFB. Cryptology ePrint Archive (2020)
Bao, Z., Chakraborti, A., Datta, N., Guo, J., Nandi, M., Peyrin, T., Yasuda, K.: PHOTON-beetle authenticated encryption and hash family. NIST Lightweight Compet Round 1, 115 (2019)
Beierle, C., Biryukov, A., dos Santos, LC., Großschädl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q.: Lightweight AEAD and hashing using the sparkle permutation family. IACR Transactions on Symmetric Cryptology, pp. 208–261 (2020)
Beyne, T., Chen, Y.L., Dobraunig, C., Mennink, B.: Multi-user security of the Elephant v2 authenticated encryption mode. In: Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29-October 1, 2021, pp. 155–178. Springer, Revised Selected Papers (2022)
Buchanan, WJ., Maglaras, L.: Review of the NIST light-weight cryptography finalist. arXiv preprint arXiv:2303.14785 (2023)
Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R., Unterluggauer, T.: ISAP v2. 0. IACR Transactions on Symmetric Cryptology (2020)
Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: ASCON v1. 2: lightweight authenticated encryption and hashing. J. Cryptol. 34, 1–42 (2021)
Duka, AV.: Software implementation and benchmarking of TinyJAMBU on programmable logic controllers. In: The 16th International Conference Interdisciplinarity in Engineering: Inter-Eng 2022 Conference Proceedings. pp. 889–899. Springer (2022)
ElBeltagy, M., Alexan, W., Elkhamry, A., Moustafa, M., Hussein, HH.: Image encryption through Rössler system, PRNG S-Box and Recamán’s sequence. In: 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0716–0722. IEEE (2022)
Harb, S., Ahmad, MO., Swamy, M.: A high-speed FPGA implementation of AES for large scale embedded systems and its applications. In: 2022 13th International Conference on Information and Communication Systems (ICICS), pp. 59–64. IEEE (2022)
Hasan, M., Chang, D.: Lynx: family of lightweight authenticated encryption schemes based on tweakable blockcipher. Cryptology ePrint Archive (2023)
Hell, M., Johansson, T., Maximov, A., Meier, W., Sönnerup, J., Yoshida, H.: Grain-128AEADv2-a lightweight AEAD stream cipher. The NIST Lightweight Cryptography Standardization Process (2019)
Hemmati, A., Rahmani, A.M.: The internet of autonomous things applications: a taxonomy, technologies, and future directions. Internet Things 20, 100635 (2022)
Hussain, S., Jamal, S.S., Shah, T., Hussain, I.: A power associative loop structure for the construction of non-linear components of block cipher. IEEE Access 8, 123492–123506 (2020). https://doi.org/10.1109/ACCESS.2020.3005087
Jangir, A., Pandey, J.G.: GIFT cipher usage in image data security: hardware implementations, performance and statistical analyses. J. Real Time Image Process. 18(6), 2551–2567 (2021)
Katagi, M., Moriai, S., et al.: Lightweight Cryptography for the Internet of Things, pp. 7–10. Sony corporation (2008)
Kaur, M., Alzubi, AA., Singh, D., Kumar, V., Lee, HN.: Lightweight biomedical image encryption approach. IEEE Access (2023)
Khairallah, M., Khairallah, M.: Romulus: lightweight AEAD from tweakable block ciphers. Hardware oriented authenticated encryption based on tweakable block ciphers, pp. 115–134 (2022)
Kitahara, T., Hira, R., Hara-Azumi, Y., Miyahara, D., Li, Y., Sakiyama, K.: Optimized software implementations of ASCON, Grain-128AEAD, and TinyJambu on ARM Cortex-M0. In: 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW), pp. 316–322. https://doi.org/10.1109/CANDARW57323.2022.00030 (2022)
Mishra, Z., Mishra, S., Acharya, B.: High throughput novel architecture of SIT Cipher for IoT application. In: Nanoelectronics, Circuits and Communication Systems: Proceeding of NCCS 2019, pp. 267–276. Springer (2021)
Mondal, B., Singh, J.P.: A lightweight image encryption scheme based on chaos and diffusion circuit. Multimed. Tools Appl. 81(24), 34547–34571 (2022)
Muhajer, S.S.: A Review of DES and AES algorithms for image encryption. Al-Qadisiyah J. Pure Sci. 27, 48–56 (2023). https://doi.org/10.29350/qjps.2022.27.1.1512
Naito, Y., Matsui, M., Sugawara, T., Suzuki, D.: SAEB: a lightweight blockcipher-based AEAD Mode of Operation. Cryptology ePrint Archive (2019)
Poojary, A., Kiran Kumar, V., Nagesh, H.: FPGA implementation novel lightweight MBRISI cipher. J. Ambient Intell. Humaniz. Comput. 14, 1–13 (2022)
Rashidi, B.: Flexible and high-throughput structures of camellia block cipher for security of the internet of things. IET Comput. Digit. Tech. 15(3), 171–184 (2021)
Report GVR IoT Device Management Market Size & Share Report, 2030. https://www.grandviewresearch.com/industry-analysis/iot-device-management-market (2018)
Roy, S., Shrivastava, M., Pandey, CV., Nayak, SK., Rawat, U.: IEVCA: an efficient image encryption technique for IOT applications using 2-D Von-Neumann cellular automata-multimedia tools and applications (2021). https://doi.org/10.1007/s11042-020-09880
Singh, P., Agrawal, B., Chaurasiya, R.K., Acharya, B.: Low-area and high-speed hardware architectures of klein lightweight block cipher for image encryption. J. Electron. Imaging 32(1), 013012–013012 (2023)
Som, S., Kotal, A., Mitra, A., Palit, S., Chaudhuri, B.B.: A Chaos based partial image encryption scheme. In: 2014 2nd International Conference on Business and Information Management (ICBIM). Durgapur, India, pp. 58–63. (2014). https://doi.org/10.1109/ICBIM.2014.6970933
Weber, A.G.: The USC-SIPI Image Database: Version 5, Original Release: October 1997. University of Southern California, Department of Electrical Engineering, Signal and Image Processing Institute (2019)
Wu, H., Huang, T.: TinyJAMBU: a family of lightweight authenticated encryption algorithms (version 2). Submission to the NIST Lightweight Cryptography Standardization Process (2021)
Yan, L., Li, L., Guo, Y.: DBST: a lightweight block cipher based on dynamic S-box. Front. Comput. Sci. 17(3), 173805 (2023)
Yang, G., Shi, Z., Chen, C., Xiong, H., Li, F., Hu, H., Wan, Z.: Hardware optimizations of fruit-80 stream cipher: smaller than grain. ACM Trans. Reconfig. Technol. Syst. 16, 1–32 (2022)
Yang, H., Wong, K.W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)
Yousaf, A., Razaq, A., Baig, H.: A lightweight image encryption algorithm based on patterns in Rubik’s revenge cube. Multimed. Tools Appl. 81(20), 28987–28998 (2022)
Yousaf, M.A., Alolaiyan, H., Ahmad, M., Dilbar, M., Razaq, A.: Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access 8, 39781–39792 (2020). https://doi.org/10.1109/ACCESS.2020.2975880
Zhang, L., Wu, R., Zhang, Y., Zheng, Y., Wu, W.: LLLWBC: a new low-latency light-weight block cipher. In: International Conference on Information Security and Cryptology, pp. 23–42. Springer (2023)
Zhang, X., Tang, S., Li, T., Li, X., Wang, C.: GFRX: a new lightweight block cipher for resource-constrained IoT nodes. Electronics 12(2), 405 (2023)
Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)
Acknowledgements
Jugal Gandhi would like to acknowledge the fellowship support provided by CSIR-HRDG through CSIR-GATE-SRF.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jhawar, K., Gandhi, J., Shekhawat, D. et al. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher. J Real-Time Image Proc 21, 32 (2024). https://doi.org/10.1007/s11554-024-01416-w
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11554-024-01416-w