Abstract
In this paper, we propose a new modified version of Advanced Encryption Standard (AES) using chaotic key generator for satellite imagery security. We analyze and examine the Modified AES and chaotic key generator to enhance the key space and sensitivity, performance, and security level for reducing the risk of different attacks. The chaotic key generator utilizes multiple chaotic maps named as Logistic, Henon, Tent, Cubic, Sine and Chebyshev. The proposed algorithm presents numerous interesting and attractive features, such as a high level of security, large enough key-space with improved key sensitivity, pixel distributing uniformity and an acceptable encryption and decryption speed. The presented algorithm is ideal for real-time applications to deal with redundant, bulky, complex and stubborn satellite imagery.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ray, A.W.: Remote Sensing and Transportation Security. Pecora 15/Land Satellite Information IV/ISPRS Commission I/FIEOS Conference Proceedings (2002)
Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C. Wiley and Sons, Chichester (1996)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Upper Saddle River (1999)
Stinson, D.R.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall/CRC, Boca Raton (2002)
Gaj, K., Chodowiec, P.: Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. CT-RSA, 84–99 (2001)
Hodjat, A., Verbauwhede, I.: A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. In: Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 308–309 (2004)
Janvinen, K., Tominisko, M., Skytta, J.: A Fully Pipelined Memorlyess 17, 8 Gpbs AES-128 encryptor. In: International Symposium of Field programmable Gate arrays, pp. 207–215 (2003)
Mclone, M., McCanny, J.V.: Rijindael FPGA Implementations Utilizing Look-Up Tables. Journal VLSI signal process, system 34, 261–275 (2003)
Federal Information Processing Standards Publication, FIPS PUB 197: Advanced Encryption Standard (AES) NIST (2001)
Bourbakis, N., Dollas, A.: Scan-Based Compression-Encryption Hiding for Video on Demand. IEEE Multimedia Mag. 10, 79–87 (2003)
Shiguo, L., Jinsheny, S., Zhiquan, W.: A Block Cipher Based a Suitable of the Chaotic Standard Map. Chaos, Solutions and Fractals 26, 117–129 (2005)
Shujun, L., Xuan, Z., Xuanqin, M., Yuanlong, C.: Chaotic encryption scheme for real time digital video. In: Real-Time Imaging, SPIE, vol. 4666, pp. 149–160 (2002)
Usama, M., Khan, M.K.: Classical and Chaotic Encryption Techniques for the Security of Satellite Images. In: International Symposium on Biometrics and Security Technologies, pp. 1–6 (2008)
Jiang, Z.P.: A Note on Chaotic Secure Communication Systems. IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications 49, 92–96 (2002)
Mohammad, Z.H., Parvez, M.S.: A Cost Effective Symmetric Key Crypto-graphic Algorithm for Small Amount of Data. In: Proceedings of the 9th IEEE International Multi-topic Conference, pp. 1–6 (2005)
Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A., El Naschie, M.S.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solutions and Fractals 35, 408–419 (2008)
Fridrich, J.: Image Encryption based on Chaotic Maps. In: IEEE International Conference on Systems, Man, and Cybernetics, Computational Cybernetics and Simulations, vol. 2, pp. 1105–1110 (1997)
Fridrich, J.: Symmetric Ciphers based on Two-Dimensional Chaotic Map. Int. J. Bifurcation and Chaos 8, 1259–1284 (1998)
Li, S., Mou, X., Cai, Y.: Improving Security of a Chaotic Encryption Approach. Physics Letters A 290, 127–133 (2001)
Baptista, M.S.: Cryptography with Chaos. Physics Letters A 240, 50–54 (1998)
Kotulski, Z., Szczepanski, J.: Discrete Chaotic Cryptography (DCC): New Method for Secure Communication. In: Proc. NEEDS 1997 (1997)
Matthews, R.: The Derivation of a Chaotic Encryption Algorithm. Cryptologia XII, 29–42 (1989)
Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991)
Kotulski, Z., Szczepanski, J., Gorski, K., Paszkiewicz, A., Zugaj, A.: Application of Discrete Chaotic Dynamical Systems in Cryptography–DCC Method. Int. J. Bifurcat. Chaos 9, 1121–1135 (1999)
Alvarez, E., Fernandez, A., Garcia, P., Jimenez, J., Marcano, A.: New Approach to Chaotic Encryption Physics Letters A 263, 373–375 (1999)
Wong, W.K., Lee, L.P., Wong, K.W.: A modified chaotic cryptographic method. Computer Physics Communication 138, 234–236 (2000)
Wong, K.W.: A Fast Chaotic Cryptography Scheme with Dynamic Look-up Table. Physics Letters A 298, 238–242 (2002)
Wong, K.W., Ho, S.W., Yung, C.K.: A Chaotic Cryptography Scheme for Generating Short Ciphertext Physics Letters A 310, 67–73 (2003)
Pareek, N.K., Patidar, V., Sud, K.K.: Discrete Chaotic Cryptography Using External Key. Physics Letters A 309, 75–82 (2003)
Shannon, C.E.: A Mathematical Theory of Communication. Bell System Tech. J. 27, 379–423 (1948)
Xiang, T., Liao, X.F., Tang, G.P., Chen, Y., Wong, K.W.: A Novel Block Cryptosystem Based on Iterating a Chaotic Map. Physics Letters A 349, 109–115 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bin Muhaya, F., Usama, M., Khan, M.K. (2009). Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. In: Huang, DS., Jo, KH., Lee, HH., Kang, HJ., Bevilacqua, V. (eds) Emerging Intelligent Computing Technology and Applications. ICIC 2009. Lecture Notes in Computer Science, vol 5754. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04070-2_107
Download citation
DOI: https://doi.org/10.1007/978-3-642-04070-2_107
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04069-6
Online ISBN: 978-3-642-04070-2
eBook Packages: Computer ScienceComputer Science (R0)