SlideShare une entreprise Scribd logo
1  sur  24
PERFORMANCE EVALUVATION OF
    CHAOTIC ENCRYPTION




              GUIDE: PROF JOHN SINGH
                       SITE
               ANCY MARIAM BABU
                    10MCA0010
OBJECTIVES

 The main objectives are:
   To analyze the        confidentiality, integrity of the
    transmitting video data
   To analyze the efficiency of each chaotic algorithm
   To observe the encryption speed , power consumption
    and CPU utilization of the system.
INTRODUCTION

 What is cryptography?
 The objectives of cryptography
 What is chaos?
 Chaotic cryptography
   Chaotic encryption
   Chaotic decryption
CRYPTOGRAPHY

       Cryptography is science of
        secure information.
       Components:
         Encryption
         Decryption

       Objectives:
         Confidentiality
         Authentication
         Integrity
CHAOS

 The term ‘CHAOS’ defined: the state of
  randomness or confusion.
 Chaos theory
   A field of study in mathematics
   Study the behavior of dynamic systems
    with initial condition
CHAOTIC CRYPTIGRAPHY-
            HISTORY
 IN 1950, SHANNON MENTIONED CHAOS
    CAN USEDD FOR CRYPTOGRAPHY
   AT 1980, SHANNON DEVELOPED
    CHAOTIC THEORY
   1N 1990, FIRST CHAOTIC BASED CIPHER
   1N 1998, CHAOTIC ENCRYPTON
    DEVELOPED BY BAPTISTA
   IN 2000, CHAOS STARTED TO USE
    WIDELY
CHAOTIC CRYPTOGRAPHY

 Type of fast and secure cryptographic method
 Usually chaotic signals are noisy like and
  chaotic systems are initially sensitive.
 Substantial reduction in encryption and
  decryption time.
 Components
   Chaotic encryption and decryption
CHAOTIC ENCRYPTION
 Known as Baptista's method .
 Encryption process
   Define mapping scheme of trajectory
   Choose initial condition and parameter key
   Set initial condition as current trajectory
   Iterate the chaotic equation until the trajectory
    reaches the destination site for each symbol.
   Store the number of iterations as a cipher
   Encrypt the next message with current
    trajectory
   Produce cipher and repeat the process
CHAOTIC DECRYPTION

 Decryption process
   Set the initial condition and parameters and apply the
    same mapping scheme for decryption.
   Iterate the chaotic equation by the cipher (number of
    iterations).
   Find out the site that the trajectory belonged to and
    store the symbol of the site as message symbol.
   Decrypts next symbol by iterating the current trajectory
    and producing the next message symbol and so on.
EXISTING METHODS

 Selected algorithms are
   CVES
   SEA
   NCA
   EES
ALGORITHMS

 CVEA
  Proposed by Shu Jun Lia, Xuan Zhengb, Xuanqin Moua and
     Yuanlong Caia
    Universal hasty encryption scheme
    Method: encrypt the video using plain cluster
    The encryption procedure: one plain-cluster is encrypted by
     stream sub cipher and followed by block sub cipher.
    Decryption: the encrypted plain-cluster is firstly decrypted
     by block sub-cipher
      Pre decrypted plain cluster is encrypted by stream sub
        cipher.
ALGORITHMS
 SEA
  Low cast targeted encryption
  Operates on several word sizes, texts and key
  Based on Feistel theory with random round of
   varying numbers.
 NCA
  Use power function and the tangent function
  Proposed by Hogan Gao, Yisheng Zhang, Shuyun
   Liang, Dequn Li.
  Two parts of analysis:
    Logistic map analysis
    NCA map design
ALGORITHM

 EES
  Approved by U.S department of commerce in
   1994.
  Considerable feature is a key escrowed method
   enabling for detecting attacker
  Symmetric key encryption method
  Both SKIPJACK and LEAF creation methods are
   used for the encryption or decryption.
RESULTS AND DISCUSSION

 Performance analysis of selected chaotic
  encryption technique
 Parameters used:
   Encryption speed
   CPU utilization
   Power consumption
 Tool used:
   CPU meter
   Encryption –decryption tools
   Laptop with IV CPU 2.4GHz
PARAMETERS

 ENCRYPTION SPEED:
   Throughput of the encryption indicate speed of
    encryption.
 CPU utilization:
   CPU utilization means the CPU processing time.
   It indicates the load on the CPU
 Power consumption:
   CPU cycle measurement.
   Depends on the load on CPU
ENCRYPTION SPEED
45
                               comparison of different encryption in
                               terms of encryption time and packet
40                             size:

35
                               CVES
30


25

                               SEA
20


15

                               NCA
10


 5

                               EES
 0
     THROUGHPUT
POWER CONSUMPTION

2000


1800


1600


1400                                                    comparison of different encryption in terms of
                                                        encryption time and packet size:
1200                                                    CVES

1000                                                    SEA

800                                                     NCA

600                                                     EES


400


 200


   0
       49   100   247   694   963   3341.19   5310.88
TOOLS

 CPU meter       Encryption decryption
                   tool
Snapshots of encryption
 USING CERTAIN TOOLS FOR
       ENCRYPTION
SNAPSHOTS FOR ENCRYPTED DATA
CONCLUSION

 Chaotic cryptography provides higher security
  and efficiency to resist the attack.
 CVES and NCA – better encryption speed
 EES needs more time to encrypt
 All the algorithm ranges security from high to
  middle level.
REFFEERENCE
 Gary C. Kessler 1998, An overview of cryptography, Auerbach
    (September 1998) pp 3-4.
   Jon Collas 2009, introduction to cryptography, pgp
    cooperation pp7-29
   Deckert Florian , 23 march 2007, A brief history of
    cryptography, slide share.net 1 April 2010
   J Wei, X Liao, K Wong, T Xiang 2006, A new chaotic
    cryptosystem, chaos Solutions & Fractals – Elsevier pp 4-10
   M.K.HO (Archon) 2001 chaotic encryption standard-
    history, chaotic encryption webmaster
   Stephen R. Addison, John E. Gray 2006 Chaos and encryption:
    problems and potential , IEEE 2006 , pp 275
REFFERENCE
 T Yang 2004, A Survey of chaotic secure communication
  system , international journal of computational
  cognitive, yangsky.com
 Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai
  February 2002, chaotic encryption scheme for real time
  digital video, electronic imaging 2002, vol: 4666, pp149-
  160
 Yaobin Mao and Guanrong Chen, chaos based image
  encryption, 725 publications/journal pp8-20
 G. Alvartz and Shujun Li, 2009, Crypt analyzing a
  nonlinear chaotic algorithm(NCA) for image
  encryption, communication in nonlinear science and
  numerical simulations vol:14 pp 3743-3759
Performance evluvation of chaotic encryption technique

Contenu connexe

Tendances

Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography2510stk
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 

Tendances (20)

Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Steganography
SteganographySteganography
Steganography
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 

En vedette

A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionsadique_ghitm
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networksTrinity Dwarka
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemMohit Chimankar
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосProject KRIT
 
On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...Mostafa Shokrian Zeini
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSwolfSSL
 
Evaluation & control
Evaluation & control Evaluation & control
Evaluation & control Fawad Ahmad
 
Technical Seminar PPT
Technical Seminar PPTTechnical Seminar PPT
Technical Seminar PPTKshitiz_Vj
 
DNA SEQUENCING METHOD
DNA SEQUENCING METHODDNA SEQUENCING METHOD
DNA SEQUENCING METHODMusa Khan
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisIOSR Journals
 
INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
 INTRODUCTION INFORMATION RETRIEVAL EVALUVATION INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
INTRODUCTION INFORMATION RETRIEVAL EVALUVATIONPremsankar Chakkingal
 

En vedette (20)

A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Jammer
JammerJammer
Jammer
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication system
 
Sacolloq
SacolloqSacolloq
Sacolloq
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...
 
Secure modem design
Secure modem designSecure modem design
Secure modem design
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLS
 
Evaluation & control
Evaluation & control Evaluation & control
Evaluation & control
 
Genetic engineering and recombinant DNA technology
Genetic engineering and recombinant DNA  technologyGenetic engineering and recombinant DNA  technology
Genetic engineering and recombinant DNA technology
 
P1151351311
P1151351311P1151351311
P1151351311
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Genome Mapping
Genome MappingGenome Mapping
Genome Mapping
 
Technical Seminar PPT
Technical Seminar PPTTechnical Seminar PPT
Technical Seminar PPT
 
DNA SEQUENCING METHOD
DNA SEQUENCING METHODDNA SEQUENCING METHOD
DNA SEQUENCING METHOD
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysis
 
INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
 INTRODUCTION INFORMATION RETRIEVAL EVALUVATION INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
 

Similaire à Performance evluvation of chaotic encryption technique

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Nikhil Jain
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE Mohammed Abdul Lateef
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMcscpconf
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 

Similaire à Performance evluvation of chaotic encryption technique (20)

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 

Dernier

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Dernier (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Performance evluvation of chaotic encryption technique

  • 1. PERFORMANCE EVALUVATION OF CHAOTIC ENCRYPTION GUIDE: PROF JOHN SINGH SITE ANCY MARIAM BABU 10MCA0010
  • 2. OBJECTIVES  The main objectives are:  To analyze the confidentiality, integrity of the transmitting video data  To analyze the efficiency of each chaotic algorithm  To observe the encryption speed , power consumption and CPU utilization of the system.
  • 3. INTRODUCTION  What is cryptography?  The objectives of cryptography  What is chaos?  Chaotic cryptography  Chaotic encryption  Chaotic decryption
  • 4. CRYPTOGRAPHY  Cryptography is science of secure information.  Components:  Encryption  Decryption  Objectives:  Confidentiality  Authentication  Integrity
  • 5. CHAOS  The term ‘CHAOS’ defined: the state of randomness or confusion.  Chaos theory  A field of study in mathematics  Study the behavior of dynamic systems with initial condition
  • 6. CHAOTIC CRYPTIGRAPHY- HISTORY  IN 1950, SHANNON MENTIONED CHAOS CAN USEDD FOR CRYPTOGRAPHY  AT 1980, SHANNON DEVELOPED CHAOTIC THEORY  1N 1990, FIRST CHAOTIC BASED CIPHER  1N 1998, CHAOTIC ENCRYPTON DEVELOPED BY BAPTISTA  IN 2000, CHAOS STARTED TO USE WIDELY
  • 7. CHAOTIC CRYPTOGRAPHY  Type of fast and secure cryptographic method  Usually chaotic signals are noisy like and chaotic systems are initially sensitive.  Substantial reduction in encryption and decryption time.  Components  Chaotic encryption and decryption
  • 8. CHAOTIC ENCRYPTION  Known as Baptista's method .  Encryption process  Define mapping scheme of trajectory  Choose initial condition and parameter key  Set initial condition as current trajectory  Iterate the chaotic equation until the trajectory reaches the destination site for each symbol.  Store the number of iterations as a cipher  Encrypt the next message with current trajectory  Produce cipher and repeat the process
  • 9. CHAOTIC DECRYPTION  Decryption process  Set the initial condition and parameters and apply the same mapping scheme for decryption.  Iterate the chaotic equation by the cipher (number of iterations).  Find out the site that the trajectory belonged to and store the symbol of the site as message symbol.  Decrypts next symbol by iterating the current trajectory and producing the next message symbol and so on.
  • 10. EXISTING METHODS  Selected algorithms are  CVES  SEA  NCA  EES
  • 11. ALGORITHMS  CVEA  Proposed by Shu Jun Lia, Xuan Zhengb, Xuanqin Moua and Yuanlong Caia  Universal hasty encryption scheme  Method: encrypt the video using plain cluster  The encryption procedure: one plain-cluster is encrypted by stream sub cipher and followed by block sub cipher.  Decryption: the encrypted plain-cluster is firstly decrypted by block sub-cipher  Pre decrypted plain cluster is encrypted by stream sub cipher.
  • 12. ALGORITHMS  SEA  Low cast targeted encryption  Operates on several word sizes, texts and key  Based on Feistel theory with random round of varying numbers.  NCA  Use power function and the tangent function  Proposed by Hogan Gao, Yisheng Zhang, Shuyun Liang, Dequn Li.  Two parts of analysis:  Logistic map analysis  NCA map design
  • 13. ALGORITHM  EES  Approved by U.S department of commerce in 1994.  Considerable feature is a key escrowed method enabling for detecting attacker  Symmetric key encryption method  Both SKIPJACK and LEAF creation methods are used for the encryption or decryption.
  • 14. RESULTS AND DISCUSSION  Performance analysis of selected chaotic encryption technique  Parameters used:  Encryption speed  CPU utilization  Power consumption  Tool used:  CPU meter  Encryption –decryption tools  Laptop with IV CPU 2.4GHz
  • 15. PARAMETERS  ENCRYPTION SPEED:  Throughput of the encryption indicate speed of encryption.  CPU utilization:  CPU utilization means the CPU processing time.  It indicates the load on the CPU  Power consumption:  CPU cycle measurement.  Depends on the load on CPU
  • 16. ENCRYPTION SPEED 45 comparison of different encryption in terms of encryption time and packet 40 size: 35 CVES 30 25 SEA 20 15 NCA 10 5 EES 0 THROUGHPUT
  • 17. POWER CONSUMPTION 2000 1800 1600 1400 comparison of different encryption in terms of encryption time and packet size: 1200 CVES 1000 SEA 800 NCA 600 EES 400 200 0 49 100 247 694 963 3341.19 5310.88
  • 18. TOOLS  CPU meter  Encryption decryption tool
  • 19. Snapshots of encryption  USING CERTAIN TOOLS FOR ENCRYPTION
  • 21. CONCLUSION  Chaotic cryptography provides higher security and efficiency to resist the attack.  CVES and NCA – better encryption speed  EES needs more time to encrypt  All the algorithm ranges security from high to middle level.
  • 22. REFFEERENCE  Gary C. Kessler 1998, An overview of cryptography, Auerbach (September 1998) pp 3-4.  Jon Collas 2009, introduction to cryptography, pgp cooperation pp7-29  Deckert Florian , 23 march 2007, A brief history of cryptography, slide share.net 1 April 2010  J Wei, X Liao, K Wong, T Xiang 2006, A new chaotic cryptosystem, chaos Solutions & Fractals – Elsevier pp 4-10  M.K.HO (Archon) 2001 chaotic encryption standard- history, chaotic encryption webmaster  Stephen R. Addison, John E. Gray 2006 Chaos and encryption: problems and potential , IEEE 2006 , pp 275
  • 23. REFFERENCE  T Yang 2004, A Survey of chaotic secure communication system , international journal of computational cognitive, yangsky.com  Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai February 2002, chaotic encryption scheme for real time digital video, electronic imaging 2002, vol: 4666, pp149- 160  Yaobin Mao and Guanrong Chen, chaos based image encryption, 725 publications/journal pp8-20  G. Alvartz and Shujun Li, 2009, Crypt analyzing a nonlinear chaotic algorithm(NCA) for image encryption, communication in nonlinear science and numerical simulations vol:14 pp 3743-3759