International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Impact Factor (2012): 3.358 Volume 3 Issue 7, July 2014 www.ijsr.net Licensed Under Creative Commons Attribution CC BY Image Encryption Using AES with Modified Transformation Harleen Kaur 1 , Reena Mehla 2 1 Student, Department of Electronics & Communication, Kurukshetra University, India 2 Assitant Professor, Department of Electronics & Communication, Kurukshetra University, India Abstract: With the increased growth of internet, extensive exchange of data over the network has been made. Safe storage of digital images and secure transmission over the network is always been required, so as to protect the confidential data from unauthorized access. High transmission rate of the images using limited bandwidth makes the standard algorithms unsuitable for encryption. The work proposed in this paper is focussed on a new algorithm, which requires less encryption time, less computational power requirement and maintain a sufficient level of security. This paper proposes a modified version of AES. Various modifications have been made in the transformation steps of AES. Experimental results for encryption time using proposed AES have been shown and compared with original AES. Keywords: Advanced Encryption Standard (AES), Image Encryption, Computational time analysis, Modified mixing column transformation, Modified shift row transformation 1. Introduction With the development of internet technology, applications such as multimedia data, video conferencing, broadcasting are being used more and more. For image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms are mostly used in text data. For multimedia data these algorithms are not suitable for real-time applications. This paper proposes a new modified version of AES algorithm. The modification is made on the various transformation steps in AES algorithm. Basically the modification is focussed on Shift row transformation, mixing column transformation and key expansion modification. 2. AES Algorithm AES algorithm uses three cryptographic keys of 128, 192, 256 bits and accordingly AES is referred to as AES-128, AES-192, AES-256, operates in 10 rounds. At the beginning of encryption, the input bytes are mapped to state array. In the end, the final value is mapped to output array bytes. AES has the following transformation steps: 1. Sub Byte Transformation 2. Shift Rows Transformation 3. Mix Column Transformation 4. Add Round Key Transformation A. Sub Byte Transformation In this step each byte of state is substituted using S-box, which is constructed by multiplicative inverse and affine transformations. Here S-box is used as a look up table. B. Shift Rows Transformation In this step the bytes are shifted cyclically to the left. The first row is kept un-shifted. Second, third and fourth rows are shifted cyclically 1, 2, 3 bytes to the left respectively. C. Mix Column Transformation This transformation step operates on state column-by- column. Each column is treated as a four term polynomial. Every column is considered as GF (2 8 ) polynomial and multiplied by polynomial a(x) modulo x 4 +1, where a(x) = {03}x 3 +{01}x 2 +{01}x+{02} D. Add Round Key Transformation In this step simple XOR operation is done between each byte of state and each byte of sub key. Key expansion transformation: AES algorithm takes the encryption key and performs a key expansion transformation to generate sub keys. Key expansion generates 11 sub key arrays of 16 words of 8 bits denoted by w i (except w 0 ), previous w i-1, Rcon and S-box are used. Rcon[i]=[RC[i],0,0,0] with RC[1]=2*RC[i-1] Table 1: Rcon Values i RC[i] 1 01 2 02 3 04 4 08 5 10 6 20 7 40 8 80 9 1b 10 36 11 6c 12 d8 13 a6 14 4d Above table shows the different round constant values for RC[i], i=1 to 14 Paper ID: 020141015 360
4
Embed
Image Encryption Using AES with Modified … image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Volume 3 Issue 7, July 2014 www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Image Encryption Using AES with Modified Transformation
Harleen Kaur1, Reena Mehla2
1Student, Department of Electronics & Communication, Kurukshetra University, India 2Assitant Professor, Department of Electronics & Communication, Kurukshetra University, India
Abstract: With the increased growth of internet, extensive exchange of data over the network has been made. Safe storage of digital images and secure transmission over the network is always been required, so as to protect the confidential data from unauthorized access. High transmission rate of the images using limited bandwidth makes the standard algorithms unsuitable for encryption. The work proposed in this paper is focussed on a new algorithm, which requires less encryption time, less computational power requirement and maintain a sufficient level of security. This paper proposes a modified version of AES. Various modifications have been made in the transformation steps of AES. Experimental results for encryption time using proposed AES have been shown and compared with original AES. Keywords: Advanced Encryption Standard (AES), Image Encryption, Computational time analysis, Modified mixing column transformation, Modified shift row transformation 1. Introduction With the development of internet technology, applications such as multimedia data, video conferencing, broadcasting are being used more and more. For image security, encryption is used. Various algorithms for encryption have been proposed such as AES, RSA, IDEA [1, 2]. These algorithms are mostly used in text data. For multimedia data these algorithms are not suitable for real-time applications. This paper proposes a new modified version of AES algorithm. The modification is made on the various transformation steps in AES algorithm. Basically the modification is focussed on Shift row transformation, mixing column transformation and key expansion modification. 2. AES Algorithm AES algorithm uses three cryptographic keys of 128, 192, 256 bits and accordingly AES is referred to as AES-128, AES-192, AES-256, operates in 10 rounds. At the beginning of encryption, the input bytes are mapped to state array. In the end, the final value is mapped to output array bytes. AES has the following transformation steps: 1. Sub Byte Transformation 2. Shift Rows Transformation 3. Mix Column Transformation 4. Add Round Key Transformation A. Sub Byte Transformation In this step each byte of state is substituted using S-box, which is constructed by multiplicative inverse and affine transformations. Here S-box is used as a look up table. B. Shift Rows Transformation In this step the bytes are shifted cyclically to the left. The first row is kept un-shifted. Second, third and fourth rows are shifted cyclically 1, 2, 3 bytes to the left respectively.
C. Mix Column Transformation This transformation step operates on state column-by-column. Each column is treated as a four term polynomial. Every column is considered as GF (28) polynomial and multiplied by polynomial a(x) modulo x4+1, where a(x) = {03}x3+{01}x2+{01}x+{02} D. Add Round Key Transformation In this step simple XOR operation is done between each byte of state and each byte of sub key. Key expansion transformation: AES algorithm takes the encryption key and performs a key expansion transformation to generate sub keys. Key expansion generates 11 sub key arrays of 16 words of 8 bits denoted by wi (except w0), previous wi-1, Rcon and S-box are used. Rcon[i]=[RC[i],0,0,0] with RC[1]=2*RC[i-1]
ial video con, it is requirposed a modine by adjusified algorith
rity or externg [5] proposhe use of imzation. Fridricon two dime
d combinationation of pixels
f internet andork, for condata transmisthm. The prhe original Aime requireme
n remains me shift row tra
key expansio
rmation:
t element of stthat of originaray is odd, thakept un-shiftedcally one and
nsformation:
value is not lf. This impro
formation:
of state matrieration.
onal JournaISSN
Impac
Volume
sed Under Cre
ng methodea so proposelevel. Securit
electronices is a diffi
a new imixel permutatse of internet
mission of dabramanyamd on AESversion of AESXOR betweenFor every seorithm gives honferencing
red to use a strification in Asting shifthm gives benal unauthorsed an effic
mage compresch [6] presentensional stand of bit, block
s and blocks g
d transmissionnfidential vsion, the sys
roposed workAES so thatent decreasesmaintained.ansformation,on transforma
tate array is eal AES. But, ifan first and fod and second
d two bytes to
constant butoves the reliab
ix is taken be
al of SciencN (Online): 23ct Factor (201
e 3 Issue 7, www.ijsr.ne
eative Commo
for ed is ty of data
ficult mage tion. has
ata a [3]
key S. In n the et of high and
rong AES.
row etter rized cient sion
ted a dard and
gives
n of ideo stem k is
the but The mix
ation
ven, f the
ourth and
o the
it is bility
efore
5
To
A
Fthwhthhinhaait
ce and Rese19-7064
12): 3.358
July 2014et ons Attribution
5. Experim
The proposedof different siz
Bea
S
Figure1:
A. Histogram
For security ohe encrypted
with the originhow the pixelshe encrypted
histogram of thnformation t
histogram of oalgorithm covand complicatts encrypted v
Bea
S
earch (IJSR
n CC BY
mental Resu
algorithm haszes.
ach Scene Enc
Sunflower Enc
Toy Enc
Original and
Analysis
f information image bears
nal image. Hiss of the imag
d is fairly unhe original imo the third
original and envered all the ted the relatioversion.
ach Scene Enc
Sunflower Enc
R)
ults
s been tested f
crypted Beach
crypted Sunflo
crypted Toy
Encrypted Im
in the image little or no ststogram of the
ge are distribuniform and d
mage and it doeperson. Figu
ncrypted imaginformation o
on between o
crypted Beach
crypted Sunflo
for various im
h Scene
ower
mage Samples
it is requiredtatistical simile image illust
uted. Histogramdifferent fromes not provideure 2 showsge. The encrypof original imriginal image
h Scene
ower
mages
d that larity trates m of
m the e any the ption mage e and
Paper ID: 020141015 361
B Hseacexdidesuifdesuse
C AprenenexticoreA
Figure 2: Hi
B. Key Sensitiv
High key sensecurity of the ccess the inxperimented fifference in tecryption ofuccessfully. Tf there is evenecryption keuccessful decensitivity of th
C. Computation
Another factoroposed algorncryption of tncryption of xperimented fme taken for ompared withesults show th
AES.
Toy Enc
istogarm of O
vity Analysis
itivity is requimage so thatnformation. for different kthe encryptionf the imageThe strength on a single bit
ey, the algorcryption. Figuhe algorithm.
Figure 3: K
nal Time Ana
or that evalurithm is the cothe image. Reimages are
for various imencryption b
h the original hat the encryp
Internatio
Licens
crypted Toy
Original and En
uired by cryptt unauthorizedThe propose
keys. If there in key and dee could notof the algoritht change in thrithm does nure 3 illustrat
Key Sensitivity
alysis:
uates the efomputation timesults for the tconsidered. T
mages of differby using propo
AES algorithption time red
onal JournaISSN
Impac
Volume
sed Under Cre
ncrypted Imag
tosystems ford people coulded algorithms negligible sm
ecryption keyt be perform
hm is justifiedhe encryptionnot performtes the high
y
fficiency ofme it takes fortime taken forThe algorithmrent sizes andosed algorithmhm. Experimeduces in propo
al of SciencN (Online): 23ct Factor (201
e 3 Issue 7, www.ijsr.ne
eative Commo
ge
r the d not
m is mall
y the med
d by, and the key
the r the r the m is d the m is ental osed
I
6
Tmbesthsthth
7
TWrpwDfto
R
[
[
[
[
[
[
[
ce and Rese19-7064
12): 3.358
July 2014et ons Attribution
TaImage Size on
Disk Toy
(104 KB) Beach Scene
(280 KB) Sunflower (760 KB)
6. Conclus
The proposedmodified AESbe observedencryption timsensitivity of the modified
sensitivity andhe proposedhan the origin
7. Future S
The field of iWith the everrevolution inprevious workwork can be eDES or RSA,further be impo make the W
References
1] Pankesh,InternationComputerDecember
2] Sesha PPermutatiInternation8887), Vo
3] B.SubramBabu , Im2011 SecApplicatio
4] Seyed HShakerianVersion oAlgorithm141-145.
5] Chin-ChenChen, “ACryptosys58(2001),
6] Jiri FridrDimensionBifurcatio
7] Mitra, Y.VImage EPermutatiComputer
earch (IJSR
n CC BY
able 2: EncrypEncryption T
sec) With
6.955
8.671
19.079
sion
d work in thS. On the basi
that the mme than the orthe algorithm
AES secured less compuAES with m
nal AES.
Scope
image procesr increasing aimage proces
k should furtenhanced if th
so that the eproved more. T
Wi-Fi service m
Image Encrynal Journal r Sciencer 2012, pp. 27
Pallavi Indraon Based Inal Journal of
olume 28- No.manyam, Vivemage Encryptond Internations of Informa
Hossein Kaman, Mohsen Rof Advanced
m for Image E
n Chang, MA New Encrstems” ,The Jo 83-91.
rich, Symmetnal Chaotic M
on and Chaos, V. Subba Raoncryption apon Techniqur Science, Vol
R)
ption Time anTime (in AES
En
4
3
92
his paper mis of experime
modified algoriginal AES alis also discus
e against bruutation time rmodified trans
sing is growidvancement issing, it is dther be refine
he proposed Afficiency of thThe proposed
more secure.
yption Usingof Advanc
and Softwa79-282. akanti and mage Encrypf Computer Ap. 8, August 20ek M. Chhabrtion On AESonal Confereation Technolali, Maysam Rahmani, “Ad Encryption Encryption”, I
Min-Shian Hwryption Algoournal of Syst
tric Ciphers Maps, InternaVol 8, 1998.
o and S.R.M. pproach usinues, Internatil. 1, No. 2, pp
nalysis cryption Time WProposed AES
4.3102
4.8913
16.3566
makes the usental results itrithm takeslgorithm. Thessed, which mute attacks.requirement msformations b
ing at a fastin technology
demanded thated. The prop
AES is hybridhe algorithms
d AES can be
g Pixel Shuffce Researchare Enginee
P.S. Avadhption Technipplications (0
011. ria, T.G. Sha
S Key Expanence on Emerlogy, pp. 217-
Hedayati, RA New Mod
Standard BICEIE, Vol 1
wang, Tung-Sorithm for Imtems and Softw
Based on Tational Journa
Parsanna, Ang Combinatiional Journa. 1306-4428, 2
With S
e of t can
less e key
makes Key
make better
rate. y and t the
posed with
s can used
fling, h in ering,
hani, ique,
0975-
ankar sion, rging -220. Reza
dified Based
, pp.
Shou mage ware
Two- al of
New ional l of 2006
Paper ID: 020141015 362
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Volume 3 Issue 7, July 2014 www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Author Profile Harleen Kaur, Student (M.Tech), Doon Valley Institute of Engineering and Technology, Kurukshetra University, Haryana, India. Reena Mehla, M.Tech (ECE), Assistant Professor, Doon Valley Institute of Engineering and Technology, Kurkshetra University, Haryana, India