Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

An Approach for Secured Transmission of Data using Fractal based Chaos

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 4
Year of Publication: 2012
Authors:
Jyotsna Shaw
Olivia Saha
Atal Chaudhuri

Jyotsna Shaw, Olivia Saha and Atal Chaudhuri. Article: An Approach for Secured Transmission of Data using Fractal based Chaos. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(4):13-17, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Jyotsna Shaw and Olivia Saha and Atal Chaudhuri},
	title = {Article: An Approach for Secured Transmission of Data using Fractal based Chaos},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {4},
	pages = {13-17},
	month = {November},
	note = {Full text available}
}

Abstract

Cryptography today is assumed as the study of techniques and applications of securing the integrity and authenticity of transfer of information under difficult circumstances. This paper presents an innovative concept on Encryption/Decryption application that is able to work with image files, data files and audio files. The method of encryption is simple but competent enough to fit the needs of the day. This paper presents Chaos based cryptography where the chaos is generated by using the concept of Fractals . The technique uses a key of variable length which generates a 128 bit message digest using MD5 hash algorithm. Then the generated hash value used as a seed to generate fractals using Julia Set algorithm and this is used as a chaos for the respective files. The final encryption is performed through XOR operation on each block of data to generate the cipher file which is to be transmitted.

References

  • G. R. Blakley, "Safeguarding cryptographic keys," AFIPS Conference Proceedings, vol. 48, pp. 313–317, 1979.
  • M. Naor and A. Shamir, ³Visual cryptography,´ Advances in Cryptography-EURO CRYPT 94,Perugia, Italy, pp. 1-12, May 1994.
  • H. Dobbertin. Cryptanalysis of MD5 compress, presented at the rump session of Eurocrypt'96.
  • R. L. Rivest. The MD5 message-digest algorithm, Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
  • http://en. wikipedia. org/wiki/MD5
  • P. Davern and M. Scott. Fractal based image. Information Hiding, First International Workshop, Lecture Notes in Computer Science, pages 279–294, 1996.
  • J. Puate and F. Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proceedings of SPIE Photonics East'96 Symposium, Boston, Massachusetts, 1996.
  • Andy Wilson, "Tips and Tricks: XOR Encryption" http://www. andyw. com/director/xor. asp,1998.
  • Threshold Cryptography Based on Blakley Secret Sharing,?Ilker Nadi Bozkurt, Kamer Kaya, Ali Ayd?n Selc¸uk
  • C. Asmuth and J. Bloom. A modular approach to key safeguarding. IEEE Trans. Information Theory, 29(2):208–210, 1983.
  • William Stallings, "Cryptography and Network Security, Principles and Practice", Third Edition, Pearson education, 2005
  • J. Puate and F. Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proceedings of SPIE Photonics East'96 Symposium, Boston, Massachusetts, 1996.
  • E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
  • H. Dobbertin. Cryptanalysis of MD5 compress, presented at the rump session of Eurocrypt'96.
  • R. L. Rivest. The MD5 message-digest algorithm, Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
  • Wikipedia,"Encryption", http://en. wikipedia. org /wiki/Encryption, modified on 13 December 2006.
  • Freeman J. , Neely R. , and Megalo L. "Developing Secure Systems: Issues and Solutions". IEEE Journal of Computer and Communication, Vol. 89, PP. 36-45. 1998
  • Andy Wilson, "Tips and Tricks: XOR Encryption" http://www. andyw. com/director/xor. asp,1998.
  • Di_e, W. , and Hellman, M. New directions in cryptography. IEEE Trans. Inform. Theory IT-22, (Nov. 1976), 644-654.
  • G. Jakimoski and L. Kocarev, Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps, IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, Vol. 48, No. 2, pp. 163-169, February 2001.
  • K. Kelber and W. Schwarz, General Design Rules for Chaos-Based Encryption Systems , International Symposium on Nonlinear, Theory and Its Applications (NOLTA2005), pp. 465-468, Bruges, Belgium, 18-21 October, 2005.