Section B

Development of Standard Hill Technology for Image Encryption over a 256-element Body

Abdellatif JarJar 1 , *
Author Information & Copyright
1Moulay Rachid High School, Taza Morocco, abdoujjar@gmail.com
*Corresponding Author: Abdellatif JarJar, Moulay Rachid High School, Taza Morocco, abdoujjar@gmail.com

© Copyright 2021 Korea Multimedia Society. This is an Open-Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Received: Jan 02, 2021; Revised: Mar 04, 2021; Accepted: Mar 22, 2021

Published Online: Mar 31, 2021

Abstract

This document traces the new technologies development based on a deep classical Hill method improvement. Based on the chaos, this improvement begins with the 256 element body construction, which is to replace the classic ring used by all encryption systems. In order to facilitate the application of algebraic operators on the pixels, two substitution tables will be created, the first represents the discrete logarithm, while the second represents the discrete exponential. At the same time, a large invertible matrix whose structure will be explained in detail will be the subject of the advanced classical Hill technique improvement. To eliminate any linearity, this matrix will be accompanied by dynamic vectors to install an affine transformation. The simulation of a large number of images of different sizes and formats checked by our algorithm ensures the robustness of our method.

Keywords: Chaotic map; 256-Bady; Discrete exponential; Discrete logarithm

I. INTRODUCTION

The operation of digital data and its transmission through the network are uncertain operations and are vulnerable to various attacks, cryptography is becoming the most effective means for data security. In the literature, almost all classical methods are still vulnerable to statistical and differential attacks.

2.1. Conventional Hill technique

This technique, discovered by HILL [1],[2] in 1929, was only applicable to the text. It is based on two main steps. The first step is to divide the message to be encrypted into n character (natural number) blocks, and the second step is in a carefully selected ring as usuallyZ/26ZorZ/256Z) The difficulty of constructing a large invertible matrix prompts researcher to only Use a matrix with n ≥ 4. Equation 1 fully describes this standard technique

{ C i ' = K C i }       i 1 .
(1)

With(Ci)is the clear block, (Ci')is the encrypted block, and (K) is the encryption key. Each (Ci) block is translated to an element of a well selected (Gt) ring. In such a case, the encryption matrix (K) is assigned coefficients in the same ring (Gt). Due to the high degree of linearity, this technique is always exposed to selected plain text and known statistical attacks. On the other hand, the high correlation between adjacent pixels and diagonal pixels of the image makes this technique unsuitable for image encryption. Finally, there is no chain in the encryption system, so this method is vulnerable to differential attacks. The decryption operation is described by next equation.

{ C i = K 1 C i ' }         i 1.
(2)
2.2. Hill’s classic method survey

Several successive developments in the methodology have taken place over time, but all using a reference ring such as (G256) or(G26) which significantly reduces the number of invertible matrixes and increases the risk of brutal attacks.

A first improvement [3-4-5] consists in modifying at each iteration; the encryption matrix by a secret permutation (h) and fixed in the ring (G256) , on the rows or on the columns. This improvement is given by the equation 3

{ C 1 ' = K 1 C 1 C i ' = h ( K i 1 ) C i         i 2 ,
(3)

where h (Ki−1) is the transform of the matrix (Ki−1)by fixed permutation (h). Other improvements accompany the static encryption matrix of a translation vector(T) , and this to overcome the problem of uniform blocks [67] and null blocks, still others modify the translation vector at each iteration by a linear transformation provided by a fixed matrix (Q) of size (n, n), not necessarily inversible. This method is described by equation 4.

{ C 1 ' = K C 1 T 1 , T i = Q T i 1 W i t h         i 2 , C i + 1 ' = K C i T i       i 1.
(4)

These improvements overcome statistical attacks and selected text attacks, but due to the lack of clear links between the original pixels, encrypted pixels, and encryption keys, they are still vulnerable to differential attacks. However, unless there is a strong correlation between the adjacent pixels of the image and the diagonal, all these methods are still powerless. Recently, the algorithm based on the classic chaotic method has exploded, and the chaotic suite [89] has been created to increase the key space, thereby protecting the method from brutal attacks. Unfortunately, due to the difficulty of calculating the inverse of higher-order matrices, these methods still use general non-invertible matrices with n>4 [10],[11], which poses complexity problems. So far, all encryption algorithms have considered the pixel values of the image in ring G256, and the number of invertible matrices of size (n, n) with coefficient G256 is given by the following formula [12], [13].

2.3. Our contribution

Faced with the great difficulty of inverting in large-size matrices, the researchers were content to handle matrices of sizes generally less than five, in the classic ring (G256) To correct this anomaly, our contribution provides a convincing solution by treating all pixel values as elements of one of the constructed subjects. Working in the body greatly increases the number of invertible matrices and provides protection. To facilitate algebraic calculations, two chaos tables will be generated.

  • Discrete logarithmic table

  • Discrete exponential table

Moreover, taking advantage of the properties of the involuntary matrices, a new technique for constructing invertible matrices of random size will be determined.

II. THE PROPOSED METHOD

This new technology that works at the pixel level is explained in the following aspects, and its value is regarded as an element of the built company.

jmis-8-1-45-g1
Fig. 1. Steps of realization of the algorithm.
Download Original Figure

Finally, a detailed analysis of our methodology performance will be discussed and compared with other reference systems.

Step 1: Chaotic sequences Development

Our algorithm uses two of the most famous and widely used chaotic maps in cryptography.

(1) The Logistics’ Map

Due to its high sensitivity to initial conditions, chaos is largely utilized symmetric cryptography for the construction of cipher keys [14],[15],[16].

{ u 0 ] 0 , 5    1 [             ,       μ [ 3 , 75      4 ] , u n + 1 = μu n ( 1 u n ) .
(5)
(2) HENON’S Map

Henon’s chaotic two-dimensional map was first discovered in 1978. It is described by equation below.

{ v 0     , w 0   a = 0.3   ,   b [ 1.07             1.4 ] v n + 1 = 1 + w n a v n 2 w n + 1 = b v n
(6)

We can convert the two-dimensional map expression to a one-dimensional map that is easy to implement in the encryption system. This formula is described by next equation.

{ v 0     , v 1       i n   [ 0     1 ]   a   = 0.3 ,   b [ 1.07 1.4 ] v n + 2 = 1 a v n + 1 2 + b v n
(7)
(3) Chaotic used vector design

Our work requires the construction of three chaotic vectors(CL), (KR) and (KL) with a coefficient of(G256), and the binary (CR) vector will be regarded as the control vector. This construct is seen by the following algorithm:

A l g 2 { f o r     i = 1   t o   3 n m C L ( i ) =   m o d ( E ( u ( i ) + 2 v ( i ) 3 * 10 11 , 254 ) + 1 ) K L ( i ) =   m o d ( E ( w ( i ) + u ( i ) + v ( i ) 3 * 10 11 , 253 ) + 2 ) K R ( i ) = E ( K L ( i ) + C L ( i ) 2 ) i f   u ( i ) v ( i ) + w ( i ) 2   t h e n C R ( i ) = 0   e l s e   C R ( i ) = 1 e n d   i f N e x t   i

We note that

  i 1     3 n m { C L ( i ) 0 K L ( i ) 0 K R ( i ) 0

These elements are all non-zero; as a result, they are invertible within the built body.

Step 2: F256 Body Construction

The most important step is to create an entity with 256 elements, which will replace the classical (G256) in the calculation.

(1) Mathematical overview

For it

Let

F 256 = { h ( x ) F [ x ] d ° h 7 }

Let p(x) eighth-order polynomial and irreducible in F[x]. We define two internal composition laws described by the following formula on such a set.

{ F i r s t   I n t e r n a l   C o m p o s i t i o n   L a w h ( x ) k ( x ) = ( h ( x ) + k ( x ) )   m o d u l o   2 , S e c o n d   I n t e r n a l   C o m p o s i t i o n   L a w h ( x ) k ( x ) = ( h ( x ) k ( x ) )   m o d u l o   p ( x ) .
(8)

It is easy to prove that these two internal composition laws provide the (F256,,⊕; ⊗) with a commutative finite body structure with 256 elements.

(2) F256 Elements Representation

Any element of the F256 body can be represented in five different forms:

a) Polynomial Writing

We know that

F 256 = { h ( x ) F [ x ] d ° h 7 } .
(9)

Consequently, any element can be written in the form of a polynomial of degree at most equal to 7 with (G2) components. For example:

h ( x ) =   x 6 + x 4 + x 3 + x 2 + 1   ,       q ( x ) = x 2 + x
b) Vector Writing

Any element of the body F256 can be represented as a size vector (1, 8) with a coefficient in (G2)

c) Binary Writing

By simple conversion from vector writing to binary writing, any element of such a subject can be written in binary form

d) Integers Writing

All body elements are displayed in 8 bits, consequently their value is located between 0 and 255. So, we have

F 256 = { 0 , 1 , 2 , 3 , , 255 }

This notation can be extended to the coefficient matrix in F256. For example:

M = ( x 2 + x + 1 x x 3 + x 2 x 6 + x 4 + 1 ) M = ( 7 2 12 81 )
e) Discrete Exponential Writing

Note that, (F256,, ⊕;⊗) is a finite body, consequently, the set (F256*,)is a cyclic group. As a result, it is generated by a single element g(x) closely related to the constructor polynomial p(x). This can be illustrated by the following formula:

F 256 * = { h ( x ) F [ x ]     t h a t   d   ° h 7   , a n d     h ( x ) 0 } = F 256 { 0 }
{ h F 256 * ! i [ 0           254 ]   :   h ( x ) = g ( x ) i   m o d   ( p ( x ) ) ,     b y   c o n v e n t i o n                       g ( x ) 255 = 0 ,
(9)

where i is called the exponential notation of the polynomial h (x).

W e   n o t e     t h a t                                   ;     E x p ( i ) = h ( x )

We confirm that the change of the generator g(x) will lead to a fundamental change in the sign of the exponent, which will result in serious distortion of the entire encryption system.

f) Discrete logarithm Writing

Function (Exp) is bijective, and its inverse function is the function defined by the following formula (Log):

A l 3       { f o r     i = 0         t o         254 L o g ( E x p ( i ) ) = i N e x t         i b y   c o n v e n t i o n       L o g ( 0 ) = 255

This rating will greatly facilitate algebraic calculations

(3) Algebraic operations over F256

The two algebraic operations will be defined from the two tables constructed to facilitate the calculations.

a) The multiplication

To facilitate the multiplication of F256 elements, it is recommended to use the two notations (Exp) and (Log). This technique is clarified by the equation below:

g ( x ) i g ( x ) j = {       0         i f       i = 255     o r       j = 255 , e l s e g ( x ) [ mod ( i + j ,           255 ) ] .
(10)

So, we can deduce the equation below

{ x i x j = { 0     i f         x i = 0       o r       x j = 0 E x p ( mod ( L o g ( x i ) + L o g ( x j ) , 256 ) )
(11)

Please note that multiplication is closely related to the choice of generator g(x)

b) F256 Inverse of elements

The calculation of the inverse of the elements of the basic set is very important and very useful in the decryption process.

i. Inverse for addition

We know that

x F 256           x x = 0.
(12)
ii. Inverse for multiplication
  x   F 256 *       x 1 = E x p ( 255 L o g ( x ) ) .
(13)

Note that any non-zero element is invertible in F256.

(4) Matrix analysis in body F256

Every matrix used in this system are all in coefficients in F256

a) Image of a vector by a matrix (3,3)

The multiplication of a size matrix (3,3) and a size vector (1,3) is determined by the following formula below

   ( a b c d e f g h i ) ( α β δ ) = ( a α b β c δ d α e β f δ g α h β i δ )       ( a b c d e f g h i ) ( α β δ )     =               ( a α b β c δ d α e β f δ g α h β i δ ) .
(14)
b) Second order determinant

The determinant of a second order matrix is defined by the equation below.

|   a b c d | = a d c b ,
(15)
S o T h e   m a t i x   A   o f   s i z e   ( l , l )   i s   i n v e r s i b l e   d e t ( A ) 0.

This greatly increases the number of invertible matrices. We know that the number of invertible size matrix (p, p) in F256 is:

δ = i = 1 p 1 ( 2 p 2 i ) 2 100 .
(16)

This proves that the brutal attacks on the matrices in F256 of higher order are remote.

III. INSTALL THE NEW CRYPTOSYSTEM

Throughout the document, the pixel intensity values of the color image pixels will be considered as elements of F256. Our method is articulated on the following points.

(1) Original image Vectorization

After extraction of the three color channels (RGB) and their conversion into vectors (Vr),(Vg),(Vb), a cohabitation is carried to form the vector X(x1,x2,… …..,x3nm). To apply Hill’s new method, the vector (X) must be cut into blocks of the size of (rh) calculated from the chaotic map and the original image size.

(2) (rh) value Determination
r h = ( m o d ( E ( 10 10 ( 1 n m i = 2 n m u ( i ) + sup ( w ( i ) , v ( i ) ) 2 ) ) , 6 ) + 15 ) .  
(17)

So, we can conduct as:

15 r h 20.
(18)
(3) Size vector image Adaptation

In order to implement the new technology, we need to cut the image vector (X) into large and small blocks (2rh). This operation follows the following formula:

{ l e t         3 n m s     [ 2 r h ] l = 3 n m s t = l 2 r h ,
(19)

The vector (X) must be imputed by (s) pixels by the following method:

A l G 8       { f o r       i = 1     t o     l X T ( i ) = X ( i ) N e x t   i
I f   s 0 ,   t h e n           { A m p u t a t e d   p i x e l   s t o r a g e f o r   i = 1     t o     s i f   C R ( i + l ) = 0   t h e n X D ( i ) = X ( i + l ) C L ( i + l ) e l s e X D ( i ) = X ( i + l ) K L ( i + l ) e n d   i f N e x t     i e n d   i f .
(20)

We noticed that this decomposition is completely controlled by the decision vector (CR)

(4) (2rh)-Bit Blocks Decomposition

In parallel, convert two chaotic vectors (KR) and (KL) into matrices (MR) and (ML) of size (t, 2rh) following Fig. 2. After adjusting the size of the image vector, convert the latter to a matrix (MC) of size (t, 2rh) as shown in Fig. 3.

jmis-8-1-45-g2
Fig. 2. Converting two chaotic vectors.
Download Original Figure
jmis-8-1-45-g3
Fig. 3. Image vector decomposition.
Download Original Figure
(5) Initialization Vector Design

First, the(VI) initialization vector of size (1, 2rh)) must be recalculated to change the value of the starting block. Ultimately, the (VI) value is provided by the next algorithm

A l g 9       {               f o r     i = 2   t o   t V I ( i ) = 0 f o r   j = 2   t o   2 r h V I ( i ) = V I ( i )     M C ( i , j )           N e x t   j , i                    

To surpass the uniform image problem (Black,White …) the setup value (VI) will be combined with the chaotic vector (TT) specified by the following algorithm.

A l g 10 {               f o r     i = 1   t o   2 r h V I ( i ) = V I ( i )     C L ( i )           N e x t   i                    

The value calculated from the clear image and the chaotic map, will only be used to change the value of the start pixel and restart the encryption process.

A l g 11   {               f o r     i = 1   t o   2 r h C M ( 1 , i ) = C M ( 1 , i ) V I ( i )               N e x t   i                    

IV. NEW IMPROVEMENT CLASSICAL HILL TECHNIQUE

The difficulty of reversing large matrices forces researchers to use matrices with sizes generally less than 5. However, due to linearity, classical HILL methods are still subject to statistical attacks. Our algorithm overcomes this anomaly by constructing an arbitrarily large invertible matrix, accompanied by chaotic vectors generated from the chaotic map used under binary chaotic vector control.

4.1. Encryption matrix construction

According to our technical steps, it will be easier to construct a large invertible matrix based on involute blocks and non-empty eigenvalue matrices

4.4.1 Involutive matrix

A is an involutive matrix if and only if we have

A = ( A 1 A 2 A 3 A 4 )   A i   o f   s i z e   ( r h , r h )     w i t h   ( r )   G 256 *

We got

A 2 = ( A 1 A 2 A 3 A 4 ) ( A 1 A 2 A 3 A 4 ) = ( A 1 2 A 3 A 2 A 2 A 1 A 4 A 2 A 1 A 3 A 3 A 4 A 4 2 A 2 A 3 ) = ( I 0 0 I ) .   I : I d e n t i t y   M a t r i x
(21)

Since matrix A is involutive, we get

{   A 1 2 A 2 A 3 = I ,               A 2 A 1 A 4 A 2 = 0 ,     A 1 A 3 A 3 A 4 = 0 , A 4 2 A 2 A 3 = I .
(22)

So,

{ A 2 A 3 = I A 1 2 = ( I A 1 ) ( I A 1 ) , A 2 A 3 = I A 4 2 = ( I A 4 ) ( I A 4 ) .
(23)

Since A1 matrix is given randomly, other matrices can be selected by the following formula

{ A 2 = k ( I A 1 ) , A 3 = k 1 ( I A 1 ) , ( k F 256 * ) k 1 = E x p ( 255   L o g ( k ) ) , A 4 = A 1 = A 1 , A 1 0   a n d   A 1 I .  
(24)

Or we can take as:

{ A 2 = k ( I A 1 ) , A 3 = k 1 ( I A 1 ) , A 4 = A 1 = A 1 , S o     A = ( A 1 k ( I A 1 ) k 1 ( I A 1 ) A 1 ) .
(25)
4.1.2. D matrix building

The eigenvalue(D) matrix has the form as:

D = ( e 1 0 0 e 2 r h )     i 1     r     e i F 256. *
(26)

The number of matrices (D) is much higher than 216rh.

Finally, the new Hill matrix will have the following form

H = A D A .
(27)
X = ( ( H ( X ) ) M K ) M R .
(28)

V. ORIGINAL IMAGE ENCRYPTION

After preparing the original image and constructing all the parameters, the following figure will explain the encryption process in detail.

jmis-8-1-45-g4
Fig. 4. Clear image encryption.
Download Original Figure

(Π) Spread function, used to increase the impact of avalanche effects and protect the system from any difference. It is defined by the following formula:

Π ( C M ( i + 1 : ) ) = M C ( i : ) C M ( i + 1 : ) .
(29)

VI. DECRYPTING THE ENCRYPTED IMAGE

Our technique is a symmetric encryption system using a spread function, which forces us to start the decryption process from the last block to the first block, and then recalculate the initialization vector to extract the exact value of the first block. The figure below illustrates the decryption process

jmis-8-1-45-g5
Fig. 5. Decryption process.
Download Original Figure

A decryption function can be described as:

{ I m p r o v e d   H i l l   i n v e r s e   f u n c t i o n X = ( ( H ( X ) ) M K ) M R X E x p ( 255 L o g ( M R ) = ( ( H ( X ) ) M K ) ( X E x p ( 255 L o g ( M R ) M K ) = H ( X ) ( X ) = H 1 ( ( X E x p ( 255 L o g ( M R ) M K ) )
{ R e v e r s e   d i f f u s i o n W e   h a v e   C M ( i + 1 : ) = Π ( M C ( i : ) ) C M ( i + 1 : )   M C ( i : ) =   Π 1 ( C M ( i + 1 : )   C M ( i + 1 : ) )

VII. Simulation Result

The polynomial p(x)=x8 + x7 + x2 + x + 1 is irreducible and eighth order on F [x], so it is a candidate for this study in the construction of the simulation body F256. In addition, the polynomial g(x) = x is a generator of such agents. Under these conditions, the (TS) dispersion index table is shown below.

jmis-8-1-45-g10
Table 1. Discrete exponential table.
Download Original Figure

Example:

T S ( 10 , 3 ) = E x p ( 163 ) = 253.

So

L o g ( 253 ) = 163

By applying inverse permutation, a table of discrete logarithms can be derived from a table of discrete exponents. The two tables are used mutually in the field (F256).

152 1 =   E x p   ( 255 L o g   ( 152 ) ) =   E x p   ( 255 80 )   = E x p ( 174 ) = 179.

So

{ 183 250 = E x p ( mod ( L o g ( 152 ) + L o g ( 250 ) , 255 ) )                             = E x p ( 80 + 163 ) = E x p ( 243 ) = 31

In matrix notation,

M = ( x 2 + x + 1 x x 3 + x 2 x 6 + x 4 + 1 ) M = ( 7 2 12 81 ) .

So

E x p ( M ) = ( 123 4 211 183 ) , a n d     L o g ( M ) = ( 106 1 101 251 ) .

VIII. INVESTIGATION OF CRYPTO SYSTEM PERFORMANCE

In this section, all the experiments were performed on a large color image database and using a corei7 personal computer, 16Gb memory, 500 Gb hard disk under the matlab software running under windows 7. Some of the most used reference images in cryptography and tested by our approach.

jmis-8-1-45-g11
Table 2. Images encrypted by our approach.
Download Original Figure
1) Key-space analysis

In our example simulation we took as encryption key

u 0 = 0 , 7655412001 ,   μ = 3.89231541 , f o r   l o g i s t i c   m a p ,   v 0 = 0.865421331 ,   v 1 = 0 , 563215 , b = 1 , 3561   f o r   H e n o n   m a p
T h e   g l o b a l   K e y   s p a c e   2 180 2 100 .
2) Secret key’s sensitivity Analysis

The high sensitivity of the encryption keys used in our system indicates that a very slight degradation of the encryption key automatically leads to an image that is so different from the original image. This confirmation can be viewed below the scheme in the next figure:

jmis-8-1-45-g6
Fig. 6. Secret key’s sensitivity.
Download Original Figure

We note that a 10−15 change in a single encryption parameter of this technology is incapable of restoring the clear image by the same decryption process.

2) Strength analysis of the new generation

Our design has given a new opportunity to survive and to partner with the strongest members in the hope of rebuilding a new population more adapted to intruder aggression. To do that, we randomly selected an image and studied the strength of the original populations and the new generation, with the following results:

3) Statistics attack security
a) Histogram analysis

The histogram gives the distribution of the pixel intensity level of any original image passed under our algorithm, showing the concentration near certain intensity values and sometimes the maximum value, while the histograms of all encrypted images are uniformly distributed Yes, this eliminates any statistical histogram attacks.

b) Entropy Analysis

Entropy information is very important in measuring the randomness of the encrypted image. It is defined by the following equation: (MC) image of size (n,m), we pose(t = nm), so

H ( M C ) = 1 t i = 1 t p ( i ) log 2 ( p ( i ) ) ,
(29)

where p(i) is the probability of occurrence of level (i) in the image of the selected database. If H(MC) is close to the value 8 (8−bit coded image), the completely random aspect of the encrypted image is ensured. The following table illustrates the entropy of some reference images tested by our method:

jmis-8-1-45-g12
Table 3. Encrypted image histogram.
Download Original Figure
jmis-8-1-45-g13
Table 4. Entropy of some tested images.
Download Original Figure
c) Correlation analysis

The correlation is given by:

r = cov ( x , y ) V ( x ) V ( y ) .
(30)

The following table illustrates the entropy of some reference images tested by our method:

jmis-8-1-45-g14
Table 5. Correlation of some tested images.
Download Original Figure
5) Differential analysis

Let be two encrypted images, whose corresponding free-to-air images differ by only one bit, from (C1)and(C2), respectively. The expressions of these two statistical constants (NPCR)and (UACI) are given by equations below

                N P C R = ( 1 n m i , j = 1 n m D ( i , j ) ) * 100 ,     with           D ( i , j ) = { 1         i f             C 1 ( i , j ) C 2 ( i , j ) , 0         i f               C 1 ( i , j ) = C 2 ( i , j ) .
(31)

The UACI mathematical analysis

U A C I = ( 1 n m i , j = 1 n m A b s ( C 1 ( i , j ) C 2 ( i , j ) ) ) * 100.
(32)
a) Signal-To-Peak Noise Ratio (PSNR)
i. MSE

Mean Square Error (MSE): This is the cumulative square deviation between the original image and other noisy images. When the MSE level decreases, the error also decreases. This constant measure the distance between the pixels of the clear image and the encrypted image. Calculated by the next equation.

M S E = i , j ( P ( i , j ) C ( i , j ) 2 ,
(33)

where (P(i, j)): pixel of the clear image and (C(i, j)): pixel of the cypher image.

ii. PSNR

Since many signals have a large dynamic range, PSNR is usually expressed on a logarithmic decibel scale. The next equation gives the PSNR mathematical analysis of the image:

P S N R = 20 L o g 10 ( I m a x M S E ) .
(34)
jmis-8-1-45-g15
Table 6. Differential parameters..
Download Original Figure
b) Avalanche effect

Our algorithm uses a strong link between encrypted pixels and pixels with clear policies. As a result, as data propagates through the structure of the algorithm, gradual changes become increasingly important. The avalanche effect is the number of bits that have been changed if a single bit in the original image is changed. The mathematical expression of this avalanche effect is given by

A E = ( i b i t   c h a n g e i b i t   t o t a l ) * 100.
(35)
jmis-8-1-45-g16
Table 7. Avalanche effect.
Download Original Figure
c) Performance time

In our technique, the encryption and decryption times are very similar and vary in the interval [0.05, 0.1].

jmis-8-1-45-g17
Table 8. Performance time.
Download Original Figure
d) Speed analysis

To approve and document the quality of our methodology in a timely fashion. And finally, thanks to these properties, we have selected the “Lena” grayscale image with three different sizes (256×256) (512×512) and (1024×1024). The results are presented in Table 9.

jmis-8-1-45-g18
Table 9. Execution time (in second).
Download Original Figure

We compared the results with two classic algorithms, AES and DES, and can determine that the execution time is reasonable. The test was conducted on other images of different sizes, and we obtained an acceptable score. This is due to the low algorithm complexity of the algorithm implemented in our strategy.

IX. MATH SECURITY

Our algorithm uses a large symmetric key that is extremely sensitive to initial conditions and control parameters. This ensures that small interference in the key will regenerate a new subject and a new calculation table. In addition, the complexity of using discrete logarithms in calculations increases the difficulty of attacking our systems. The construction of the key matrix is closely linked to the chaotic maps used, which eliminates any brutal attacks.

X. CONCLUSION

Hill’s conventional system is very easy to install in the color image encryption system, as long as the inversion matrix is determined in the carefully selected ring. But due to linearity, this technique is still vulnerable to statistics and brute force attacks. Carried on instead of the classic Z/256Z ring. Similarly, the construction of a large-sized invertible matrix has been introduced based on the involution block, and the non-zero eigenvalue matrix has been described in detail. The large number of matrices built in this way ensures better protection against any brutal attack. Using logarithms and discrete exponents and translation vectors to overcome linear problems will increase the complexity of our method.

Acknowledgement

This article is not subsidized by any public or private organization. It is a personal work.

REFERENCES

[1].

Y. P. K. Nkandeu, A. Tiedeu, and Hill L., “Cryptography in an algebraic alphabet,” American Mathematical Monthly, vol. 1929, no. 36, pp. 306-312, 2019.

[2].

Y.P.K. Nkandeu and A. Tiedeu, “An image encryption algorithm based on substitution technique and chaos mixing,” Multimedia Tools and Applications, vol. 78, no. 8, pp. 10013-10034, 2019.

[3].

A. Jarjar, “Improvement of hill’s classical method in image cryptography,” International Journal of statistics and Applied Mathematics, vol. 2, no. 3, Part A, 2017.

[4].

Lin CH, Lee CY, Lee C. Y., “Comments on Saeednia’s improved scheme for the Hill cipher,” Journal of the Chinese Institute of Engineers, vol. 27, no. 5, pp. 743-746, 2004.

[5].

Bibhudendra Acharya1, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, “Image encryption using advanced Hill cipher algorithm,” International Journal of Recent Trends in Engineering and Technology, vol. 1, no. 1, 2009.

[6].

C. Fu, G. Y. Zhang, M. Zhu, Z. Chen, and W. M. Lei, “A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy,” Security and Communication Networks, vol. 2018, pp. 1-13, 2018.

[7].

Chang’e Dong, “Color image encryption using one-time keys and couple chaotic systems,” Signal Processing: image Communication, vol. 29, no. 5, pp. 628-640, 2014.

[8].

Xing-Yuan Wang, Sheng-Xian Gu, and Ying-Qian Zhang, “Novel image encryption algorithm based on cycle shift and chaotic system,” Optics and Lasers in Engineering, vol. 68, pp. 126-134, 2015.

[9].

Abdellatif JarJar, “Improvement of Feistel method and the new encryption scheme,” Optik, vol. 157, pp. 1319-1324, 2018.

[10].

S. Hraoui, F. Gmira, A. O. Jarar, K. Satori, A. Saaidi, “Benchmarking AES and chaos based logistic map for image encryption,” in Proceeding of ACS International Conference Computer Systems and Applications (AICCSA), 2013.

[11].

M. Essaid, I. Akharraz, and A. Saaidi, “Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps,” Journal of Information Security and Applications, vol. 47, pp. 173-187, 2019.

[12].

Pand uranga and S. Naveen Kumar, “Advanced partial image encryption using two-stage Hill cipher technique,” International Journal of Computer Applications, vol. 60, no.16, pp. 14-19, 2012.

[13].

Rifaat Zaidan Khalaf and Alharith Abdulkareem Abdullah, “Novel quantum encryption algorithm based on multiqubit quantum shift register and Hill cipher,” Advances in High Energy Physics, vol. 2014, Article ID 104325, pp. 1-5, 2014.

[14].

Rajwant Kaur, S. A. Khan, and Simranjit Kaur, “An efficient image encryption using DNA cryptography and reversible cellular automata,” International Journal of Computer Applications, vol. 182, no. 24, pp. 32-38, 2018.

[15].

Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang, and Guanrong Chen, “A chaos-based image encryption algorithm with variable control parameters,” Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773-1783, 2009.

[16].

Jan Sher Khan and J. Ahmad, “Chaos based efficient selective image encryption” Multidimensional Systems and Signal Processing, vol. 30, pp. 943–961, 2019.

Authors

Mr. Abdellatif JarJar

jmis-8-1-45-i1

is the alone author of this article, and therefore no conflict. To finalize this document, I did not receive any assistance funds from any organization. This document does not contain any studies or experiments on animals. This article does not contain any studies with animals performed by any of the authors. This article does not contain any studies with human participants or animals performed by any of the author.