Skip to main content

Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption

  • Conference paper
Emerging Intelligent Computing Technology and Applications (ICIC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5754))

Included in the following conference series:

Abstract

In this paper, we propose a new modified version of Advanced Encryption Standard (AES) using chaotic key generator for satellite imagery security. We analyze and examine the Modified AES and chaotic key generator to enhance the key space and sensitivity, performance, and security level for reducing the risk of different attacks. The chaotic key generator utilizes multiple chaotic maps named as Logistic, Henon, Tent, Cubic, Sine and Chebyshev. The proposed algorithm presents numerous interesting and attractive features, such as a high level of security, large enough key-space with improved key sensitivity, pixel distributing uniformity and an acceptable encryption and decryption speed. The presented algorithm is ideal for real-time applications to deal with redundant, bulky, complex and stubborn satellite imagery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ray, A.W.: Remote Sensing and Transportation Security. Pecora 15/Land Satellite Information IV/ISPRS Commission I/FIEOS Conference Proceedings (2002)

    Google Scholar 

  2. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley and Sons, Chichester (1996)

    MATH  Google Scholar 

  3. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  4. Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Upper Saddle River (1999)

    Google Scholar 

  5. Stinson, D.R.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall/CRC, Boca Raton (2002)

    Google Scholar 

  6. Gaj, K., Chodowiec, P.: Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. CT-RSA, 84–99 (2001)

    Google Scholar 

  7. Hodjat, A., Verbauwhede, I.: A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. In: Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 308–309 (2004)

    Google Scholar 

  8. Janvinen, K., Tominisko, M., Skytta, J.: A Fully Pipelined Memorlyess 17, 8 Gpbs AES-128 encryptor. In: International Symposium of Field programmable Gate arrays, pp. 207–215 (2003)

    Google Scholar 

  9. Mclone, M., McCanny, J.V.: Rijindael FPGA Implementations Utilizing Look-Up Tables. Journal VLSI signal process, system 34, 261–275 (2003)

    Article  Google Scholar 

  10. Federal Information Processing Standards Publication, FIPS PUB 197: Advanced Encryption Standard (AES) NIST (2001)

    Google Scholar 

  11. Bourbakis, N., Dollas, A.: Scan-Based Compression-Encryption Hiding for Video on Demand. IEEE Multimedia Mag. 10, 79–87 (2003)

    Article  Google Scholar 

  12. Shiguo, L., Jinsheny, S., Zhiquan, W.: A Block Cipher Based a Suitable of the Chaotic Standard Map. Chaos, Solutions and Fractals 26, 117–129 (2005)

    Article  MATH  Google Scholar 

  13. Shujun, L., Xuan, Z., Xuanqin, M., Yuanlong, C.: Chaotic encryption scheme for real time digital video. In: Real-Time Imaging, SPIE, vol. 4666, pp. 149–160 (2002)

    Google Scholar 

  14. Usama, M., Khan, M.K.: Classical and Chaotic Encryption Techniques for the Security of Satellite Images. In: International Symposium on Biometrics and Security Technologies, pp. 1–6 (2008)

    Google Scholar 

  15. Jiang, Z.P.: A Note on Chaotic Secure Communication Systems. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 49, 92–96 (2002)

    Article  Google Scholar 

  16. Mohammad, Z.H., Parvez, M.S.: A Cost Effective Symmetric Key Crypto-graphic Algorithm for Small Amount of Data. In: Proceedings of the 9th IEEE International Multi-topic Conference, pp. 1–6 (2005)

    Google Scholar 

  17. Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A., El Naschie, M.S.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solutions and Fractals 35, 408–419 (2008)

    Article  MATH  Google Scholar 

  18. Fridrich, J.: Image Encryption based on Chaotic Maps. In: IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulations, vol. 2, pp. 1105–1110 (1997)

    Google Scholar 

  19. Fridrich, J.: Symmetric Ciphers based on Two-Dimensional Chaotic Map. Int. J. Bifurcation and Chaos 8, 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  20. Li, S., Mou, X., Cai, Y.: Improving Security of a Chaotic Encryption Approach. Physics Letters A 290, 127–133 (2001)

    Article  MathSciNet  Google Scholar 

  21. Baptista, M.S.: Cryptography with Chaos. Physics Letters A 240, 50–54 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  22. Kotulski, Z., Szczepanski, J.: Discrete Chaotic Cryptography (DCC): New Method for Secure Communication. In: Proc. NEEDS 1997 (1997)

    Google Scholar 

  23. Matthews, R.: The Derivation of a Chaotic Encryption Algorithm. Cryptologia XII, 29–42 (1989)

    Google Scholar 

  24. Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991)

    Google Scholar 

  25. Kotulski, Z., Szczepanski, J., Gorski, K., Paszkiewicz, A., Zugaj, A.: Application of Discrete Chaotic Dynamical Systems in Cryptography–DCC Method. Int. J. Bifurcat. Chaos 9, 1121–1135 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  26. Alvarez, E., Fernandez, A., Garcia, P., Jimenez, J., Marcano, A.: New Approach to Chaotic Encryption Physics Letters A 263, 373–375 (1999)

    Google Scholar 

  27. Wong, W.K., Lee, L.P., Wong, K.W.: A modified chaotic cryptographic method. Computer Physics Communication 138, 234–236 (2000)

    Article  Google Scholar 

  28. Wong, K.W.: A Fast Chaotic Cryptography Scheme with Dynamic Look-up Table. Physics Letters A 298, 238–242 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  29. Wong, K.W., Ho, S.W., Yung, C.K.: A Chaotic Cryptography Scheme for Generating Short Ciphertext Physics Letters A 310, 67–73 (2003)

    MATH  MathSciNet  Google Scholar 

  30. Pareek, N.K., Patidar, V., Sud, K.K.: Discrete Chaotic Cryptography Using External Key. Physics Letters A 309, 75–82 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  31. Shannon, C.E.: A Mathematical Theory of Communication. Bell System Tech. J. 27, 379–423 (1948)

    MATH  MathSciNet  Google Scholar 

  32. Xiang, T., Liao, X.F., Tang, G.P., Chen, Y., Wong, K.W.: A Novel Block Cryptosystem Based on Iterating a Chaotic Map. Physics Letters A 349, 109–115 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bin Muhaya, F., Usama, M., Khan, M.K. (2009). Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. In: Huang, DS., Jo, KH., Lee, HH., Kang, HJ., Bevilacqua, V. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2009. Lecture Notes in Computer Science, vol 5754. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04070-2_107

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04070-2_107

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04069-6

  • Online ISBN: 978-3-642-04070-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics