z-logo
open-access-imgOpen Access
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Author(s) -
Abeer Fadhil Shimal,
Baydaa H. Helal,
Ashwaq T. Hashim
Publication year - 2021
Publication title -
international journal of power electronics and drive systems/international journal of electrical and computer engineering
Language(s) - English
Resource type - Journals
eISSN - 2722-2578
pISSN - 2722-256X
DOI - 10.11591/ijece.v11i5.pp3996-4007
Subject(s) - encryption , algorithm , computer science , block cipher , cipher , key (lock) , key schedule , histogram , block cipher mode of operation , pixel , cryptography , theoretical computer science , mathematics , image (mathematics) , differential cryptanalysis , artificial intelligence , computer security , operating system
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by taking N unused pixels from the permuted blocks as polynomial coefficients. Finally, the third level a proposed secret-key block cipher called extended of tiny encryption algorithm (ETEA) is used. The proposed ETEA algorithm increased the block size from 64-bit to 256-bit by using F-function in type three Feistel network design. The key schedule generation is very straightforward through admixture the entire major subjects in the identical manner for every round. The proposed ETEA algorithm is word-oriented, where wholly internal operations are executed on words of 32 bits. So, it is possible to efficiently implement the proposed algorithm on smart cards. The results of the experimental demonstration that the proposed encryption algorithm for all methods are efficient and have high security features through statistical analysis using histograms, correlation, entropy, randomness tests, and the avalanche effect.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here