Top Banner
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Volume 3 Issue 7, July 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC BY Image Encryption Using AES with Modified Transformation Harleen Kaur 1 , Reena Mehla 2 1 Student, Department of Electronics & Communication, Kurukshetra University, India 2 Assitant Professor, Department of Electronics & Communication, Kurukshetra University, India Abstract: With the increased growth of internet, extensive exchange of data over the network has been made. Safe storage of digital images and secure transmission over the network is always been required, so as to protect the confidential data from unauthorized access. High transmission rate of the images using limited bandwidth makes the standard algorithms unsuitable for encryption. The work proposed in this paper is focussed on a new algorithm, which requires less encryption time, less computational power requirement and maintain a sufficient level of security. This paper proposes a modified version of AES. Various modifications have been made in the transformation steps of AES. Experimental results for encryption time using proposed AES have been shown and compared with original AES. Keywords: Advanced Encryption Standard (AES), Image Encryption, Computational time analysis, Modified mixing column transformation, Modified shift row transformation 1. Introduction With the development of internet technology, applications such as multimedia data, video conferencing, broadcasting are being used more and more. For image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms are mostly used in text data. For multimedia data these algorithms are not suitable for real-time applications. This paper proposes a new modified version of AES algorithm. The modification is made on the various transformation steps in AES algorithm. Basically the modification is focussed on Shift row transformation, mixing column transformation and key expansion modification. 2. AES Algorithm AES algorithm uses three cryptographic keys of 128, 192, 256 bits and accordingly AES is referred to as AES-128, AES-192, AES-256, operates in 10 rounds. At the beginning of encryption, the input bytes are mapped to state array. In the end, the final value is mapped to output array bytes. AES has the following transformation steps: 1. Sub Byte Transformation 2. Shift Rows Transformation 3. Mix Column Transformation 4. Add Round Key Transformation A. Sub Byte Transformation In this step each byte of state is substituted using S-box, which is constructed by multiplicative inverse and affine transformations. Here S-box is used as a look up table. B. Shift Rows Transformation In this step the bytes are shifted cyclically to the left. The first row is kept un-shifted. Second, third and fourth rows are shifted cyclically 1, 2, 3 bytes to the left respectively. C. Mix Column Transformation This transformation step operates on state column-by- column. Each column is treated as a four term polynomial. Every column is considered as GF (2 8 ) polynomial and multiplied by polynomial a(x) modulo x 4 +1, where a(x) = {03}x 3 +{01}x 2 +{01}x+{02} D. Add Round Key Transformation In this step simple XOR operation is done between each byte of state and each byte of sub key. Key expansion transformation: AES algorithm takes the encryption key and performs a key expansion transformation to generate sub keys. Key expansion generates 11 sub key arrays of 16 words of 8 bits denoted by w i (except w 0 ), previous w i-1, Rcon and S-box are used. Rcon[i]=[RC[i],0,0,0] with RC[1]=2*RC[i-1] Table 1: Rcon Values i RC[i] 1 01 2 02 3 04 4 08 5 10 6 20 7 40 8 80 9 1b 10 36 11 6c 12 d8 13 a6 14 4d Above table shows the different round constant values for RC[i], i=1 to 14 Paper ID: 020141015 360
4

Image Encryption Using AES with Modified … image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms

Mar 09, 2018

Download

Documents

ngokhanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Image Encryption Using AES with Modified … image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms

International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

Impact Factor (2012): 3.358

Volume 3 Issue 7, July 2014 www.ijsr.net

Licensed Under Creative Commons Attribution CC BY

Image Encryption Using AES with Modified Transformation

Harleen Kaur1, Reena Mehla2

1Student, Department of Electronics & Communication, Kurukshetra University, India 2Assitant Professor, Department of Electronics & Communication, Kurukshetra University, India

Abstract: With the increased growth of internet, extensive exchange of data over the network has been made. Safe storage of digital images and secure transmission over the network is always been required, so as to protect the confidential data from unauthorized access. High transmission rate of the images using limited bandwidth makes the standard algorithms unsuitable for encryption. The work proposed in this paper is focussed on a new algorithm, which requires less encryption time, less computational power requirement and maintain a sufficient level of security. This paper proposes a modified version of AES. Various modifications have been made in the transformation steps of AES. Experimental results for encryption time using proposed AES have been shown and compared with original AES. Keywords: Advanced Encryption Standard (AES), Image Encryption, Computational time analysis, Modified mixing column transformation, Modified shift row transformation 1. Introduction With the development of internet technology, applications such as multimedia data, video conferencing, broadcasting are being used more and more. For image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms are mostly used in text data. For multimedia data these algorithms are not suitable for real-time applications. This paper proposes a new modified version of AES algorithm. The modification is made on the various transformation steps in AES algorithm. Basically the modification is focussed on Shift row transformation, mixing column transformation and key expansion modification. 2. AES Algorithm AES algorithm uses three cryptographic keys of 128, 192, 256 bits and accordingly AES is referred to as AES-128, AES-192, AES-256, operates in 10 rounds. At the beginning of encryption, the input bytes are mapped to state array. In the end, the final value is mapped to output array bytes. AES has the following transformation steps: 1. Sub Byte Transformation 2. Shift Rows Transformation 3. Mix Column Transformation 4. Add Round Key Transformation A. Sub Byte Transformation In this step each byte of state is substituted using S-box, which is constructed by multiplicative inverse and affine transformations. Here S-box is used as a look up table. B. Shift Rows Transformation In this step the bytes are shifted cyclically to the left. The first row is kept un-shifted. Second, third and fourth rows are shifted cyclically 1, 2, 3 bytes to the left respectively.

C. Mix Column Transformation This transformation step operates on state column-by-column. Each column is treated as a four term polynomial. Every column is considered as GF (28) polynomial and multiplied by polynomial a(x) modulo x4+1, where a(x) = {03}x3+{01}x2+{01}x+{02} D. Add Round Key Transformation In this step simple XOR operation is done between each byte of state and each byte of sub key. Key expansion transformation: AES algorithm takes the encryption key and performs a key expansion transformation to generate sub keys. Key expansion generates 11 sub key arrays of 16 words of 8 bits denoted by wi (except w0), previous wi-1, Rcon and S-box are used. Rcon[i]=[RC[i],0,0,0] with RC[1]=2*RC[i-1]

Table 1: Rcon Values i RC[i] 1 01 2 02 3 04 4 08 5 10 6 20 7 40 8 80 9 1b 10 36 11 6c 12 d8 13 a6 14 4d

Above table shows the different round constant values for RC[i], i=1 to 14

Paper ID: 020141015 360

Page 2: Image Encryption Using AES with Modified … image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms

3 PensiinexprenWbestdeexthsepisecoalTtrreatcrteenchpihi 4 Wimcodefoenthmcost M Inthfirothle M Infoof M Inap

. Related

ankesh [1] ncryption of gimple and pronformation isxchange. Secrocess. Seshncryption me

With the advaneen increasedtrong algoriemonstrated xpansion. Thihis encryptionet of image pixels, the key ensitivity. Foonfidential dalgorithm. Kam

The modificaransformationesults in termttacks. Chin-ryptosystem technique and ncryption techhaotic map. Mixel permutatiigh level of se

4. Propose

With the incremages over onferencing aemands a stocussed on mncryption comhe level of

modification isolumn transfoteps of AES.

Modified shift

n proposed AEhan the shiftinirst element oows of the stahird rows are eft.

Modified key e

n proposed Aormed from inf algorithm.

Modified mix c

n proposed AEpplying mixin

Work

proposed pgrey scale imovides acceptas the main curity of colha pallavi [2ethod based oncement of ted. For confidithm is rea new algo

is algorithm isn is done by pixels and 12changes, this

or confidentiata transmissiomali [4] propation is don. This modms of secur-Chen Changthat makes thvector quantizhnique based

Mitra [7] usedions. Permutaecurity.

d Work

eased use of the netwo

and secure dtrong algoritmodifying thmputational tif encryptions done on theormation and

rows transfor

ES, if the firstng is same as tf the state arr

ate array are kshifted cyclic

expansion tran

AES the Rcon nitial key itsel

column transf

ES transpose ng column ope

Internatio

Licens

pixel shufflinmages. The ide

able security aim of the

loured image2] proposed on random pechnology, us

dential transmequired. Suborithm baseds a modified vperforming X28 bits key. modified alg

ial video con, it is requirposed a modine by adjusified algorith

rity or externg [5] proposhe use of imzation. Fridricon two dime

d combinationation of pixels

f internet andork, for condata transmisthm. The prhe original Aime requireme

n remains me shift row tra

key expansio

rmation:

t element of stthat of originaray is odd, thakept un-shiftedcally one and

nsformation:

value is not lf. This impro

formation:

of state matrieration.

onal JournaISSN

Impac

Volume

sed Under Cre

ng methodea so proposelevel. Securit

electronices is a diffi

a new imixel permutatse of internet

mission of dabramanyamd on AESversion of AESXOR betweenFor every seorithm gives honferencing

red to use a strification in Asting shifthm gives benal unauthorsed an effic

mage compresch [6] presentensional stand of bit, block

s and blocks g

d transmissionnfidential vsion, the sys

roposed workAES so thatent decreasesmaintained.ansformation,on transforma

tate array is eal AES. But, ifan first and fod and second

d two bytes to

constant butoves the reliab

ix is taken be

al of SciencN (Online): 23ct Factor (201

e 3 Issue 7, www.ijsr.ne

eative Commo

for ed is ty of data

ficult mage tion. has

ata a [3]

key S. In n the et of high and

rong AES.

row etter rized cient sion

ted a dard and

gives

n of ideo stem k is

the but The mix

ation

ven, f the

ourth and

o the

it is bility

efore

5

To

A

Fthwhthhinhaait

ce and Rese19-7064

12): 3.358

July 2014et ons Attribution

5. Experim

The proposedof different siz

Bea

S

Figure1:

A. Histogram

For security ohe encrypted

with the originhow the pixelshe encrypted

histogram of thnformation t

histogram of oalgorithm covand complicatts encrypted v

Bea

S

earch (IJSR

n CC BY

mental Resu

algorithm haszes.

ach Scene Enc

Sunflower Enc

Toy Enc

Original and

Analysis

f information image bears

nal image. Hiss of the imag

d is fairly unhe original imo the third

original and envered all the ted the relatioversion.

ach Scene Enc

Sunflower Enc

R)

ults

s been tested f

crypted Beach

crypted Sunflo

crypted Toy

Encrypted Im

in the image little or no ststogram of the

ge are distribuniform and d

mage and it doeperson. Figu

ncrypted imaginformation o

on between o

crypted Beach

crypted Sunflo

for various im

h Scene

ower

mage Samples

it is requiredtatistical simile image illust

uted. Histogramdifferent fromes not provideure 2 showsge. The encrypof original imriginal image

h Scene

ower

mages

d that larity trates m of

m the e any the ption mage e and

Paper ID: 020141015 361

Page 3: Image Encryption Using AES with Modified … image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms

B Hseacexdidesuifdesuse

C AprenenexticoreA

Figure 2: Hi

B. Key Sensitiv

High key sensecurity of the ccess the inxperimented fifference in tecryption ofuccessfully. Tf there is evenecryption keuccessful decensitivity of th

C. Computation

Another factoroposed algorncryption of tncryption of xperimented fme taken for ompared withesults show th

AES.

Toy Enc

istogarm of O

vity Analysis

itivity is requimage so thatnformation. for different kthe encryptionf the imageThe strength on a single bit

ey, the algorcryption. Figuhe algorithm.

Figure 3: K

nal Time Ana

or that evalurithm is the cothe image. Reimages are

for various imencryption b

h the original hat the encryp

Internatio

Licens

crypted Toy

Original and En

uired by cryptt unauthorizedThe propose

keys. If there in key and dee could notof the algoritht change in thrithm does nure 3 illustrat

Key Sensitivity

alysis:

uates the efomputation timesults for the tconsidered. T

mages of differby using propo

AES algorithption time red

onal JournaISSN

Impac

Volume

sed Under Cre

ncrypted Imag

tosystems ford people coulded algorithms negligible sm

ecryption keyt be perform

hm is justifiedhe encryptionnot performtes the high

y

fficiency ofme it takes fortime taken forThe algorithmrent sizes andosed algorithmhm. Experimeduces in propo

al of SciencN (Online): 23ct Factor (201

e 3 Issue 7, www.ijsr.ne

eative Commo

ge

r the d not

m is mall

y the med

d by, and the key

the r the r the m is d the m is ental osed

I

6

Tmbesthsthth

7

TWrpwDfto

R

[

[

[

[

[

[

[

ce and Rese19-7064

12): 3.358

July 2014et ons Attribution

TaImage Size on

Disk Toy

(104 KB) Beach Scene

(280 KB) Sunflower (760 KB)

6. Conclus

The proposedmodified AESbe observedencryption timsensitivity of the modified

sensitivity andhe proposedhan the origin

7. Future S

The field of iWith the everrevolution inprevious workwork can be eDES or RSA,further be impo make the W

References

1] Pankesh,InternationComputerDecember

2] Sesha PPermutatiInternation8887), Vo

3] B.SubramBabu , Im2011 SecApplicatio

4] Seyed HShakerianVersion oAlgorithm141-145.

5] Chin-ChenChen, “ACryptosys58(2001),

6] Jiri FridrDimensionBifurcatio

7] Mitra, Y.VImage EPermutatiComputer

earch (IJSR

n CC BY

able 2: EncrypEncryption T

sec) With

6.955

8.671

19.079

sion

d work in thS. On the basi

that the mme than the orthe algorithm

AES secured less compuAES with m

nal AES.

Scope

image procesr increasing aimage proces

k should furtenhanced if th

so that the eproved more. T

Wi-Fi service m

Image Encrynal Journal r Sciencer 2012, pp. 27

Pallavi Indraon Based Inal Journal of

olume 28- No.manyam, Vivemage Encryptond Internations of Informa

Hossein Kaman, Mohsen Rof Advanced

m for Image E

n Chang, MA New Encrstems” ,The Jo 83-91.

rich, Symmetnal Chaotic M

on and Chaos, V. Subba Raoncryption apon Techniqur Science, Vol

R)

ption Time anTime (in AES

En

4

3

92

his paper mis of experime

modified algoriginal AES alis also discus

e against bruutation time rmodified trans

sing is growidvancement issing, it is dther be refine

he proposed Afficiency of thThe proposed

more secure.

yption Usingof Advanc

and Softwa79-282. akanti and mage Encrypf Computer Ap. 8, August 20ek M. Chhabrtion On AESonal Confereation Technolali, Maysam Rahmani, “Ad Encryption Encryption”, I

Min-Shian Hwryption Algoournal of Syst

tric Ciphers Maps, InternaVol 8, 1998.

o and S.R.M. pproach usinues, Internatil. 1, No. 2, pp

nalysis cryption Time WProposed AES

4.3102

4.8913

16.3566

makes the usental results itrithm takeslgorithm. Thessed, which mute attacks.requirement msformations b

ing at a fastin technology

demanded thated. The prop

AES is hybridhe algorithms

d AES can be

g Pixel Shuffce Researchare Enginee

P.S. Avadhption Technipplications (0

011. ria, T.G. Sha

S Key Expanence on Emerlogy, pp. 217-

Hedayati, RA New Mod

Standard BICEIE, Vol 1

wang, Tung-Sorithm for Imtems and Softw

Based on Tational Journa

Parsanna, Ang Combinatiional Journa. 1306-4428, 2

With S

e of t can

less e key

makes Key

make better

rate. y and t the

posed with

s can used

fling, h in ering,

hani, ique,

0975-

ankar sion, rging -220. Reza

dified Based

, pp.

Shou mage ware

Two- al of

New ional l of 2006

Paper ID: 020141015 362

Page 4: Image Encryption Using AES with Modified … image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms

International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064

Impact Factor (2012): 3.358

Volume 3 Issue 7, July 2014 www.ijsr.net

Licensed Under Creative Commons Attribution CC BY

Author Profile Harleen Kaur, Student (M.Tech), Doon Valley Institute of Engineering and Technology, Kurukshetra University, Haryana, India. Reena Mehla, M.Tech (ECE), Assistant Professor, Doon Valley Institute of Engineering and Technology, Kurkshetra University, Haryana, India

Paper ID: 020141015 363