SlideShare uma empresa Scribd logo
1 de 24
PERFORMANCE EVALUVATION OF
    CHAOTIC ENCRYPTION




              GUIDE: PROF JOHN SINGH
                       SITE
               ANCY MARIAM BABU
                    10MCA0010
OBJECTIVES

 The main objectives are:
   To analyze the        confidentiality, integrity of the
    transmitting video data
   To analyze the efficiency of each chaotic algorithm
   To observe the encryption speed , power consumption
    and CPU utilization of the system.
INTRODUCTION

 What is cryptography?
 The objectives of cryptography
 What is chaos?
 Chaotic cryptography
   Chaotic encryption
   Chaotic decryption
CRYPTOGRAPHY

       Cryptography is science of
        secure information.
       Components:
         Encryption
         Decryption

       Objectives:
         Confidentiality
         Authentication
         Integrity
CHAOS

 The term ‘CHAOS’ defined: the state of
  randomness or confusion.
 Chaos theory
   A field of study in mathematics
   Study the behavior of dynamic systems
    with initial condition
CHAOTIC CRYPTIGRAPHY-
            HISTORY
 IN 1950, SHANNON MENTIONED CHAOS
    CAN USEDD FOR CRYPTOGRAPHY
   AT 1980, SHANNON DEVELOPED
    CHAOTIC THEORY
   1N 1990, FIRST CHAOTIC BASED CIPHER
   1N 1998, CHAOTIC ENCRYPTON
    DEVELOPED BY BAPTISTA
   IN 2000, CHAOS STARTED TO USE
    WIDELY
CHAOTIC CRYPTOGRAPHY

 Type of fast and secure cryptographic method
 Usually chaotic signals are noisy like and
  chaotic systems are initially sensitive.
 Substantial reduction in encryption and
  decryption time.
 Components
   Chaotic encryption and decryption
CHAOTIC ENCRYPTION
 Known as Baptista's method .
 Encryption process
   Define mapping scheme of trajectory
   Choose initial condition and parameter key
   Set initial condition as current trajectory
   Iterate the chaotic equation until the trajectory
    reaches the destination site for each symbol.
   Store the number of iterations as a cipher
   Encrypt the next message with current
    trajectory
   Produce cipher and repeat the process
CHAOTIC DECRYPTION

 Decryption process
   Set the initial condition and parameters and apply the
    same mapping scheme for decryption.
   Iterate the chaotic equation by the cipher (number of
    iterations).
   Find out the site that the trajectory belonged to and
    store the symbol of the site as message symbol.
   Decrypts next symbol by iterating the current trajectory
    and producing the next message symbol and so on.
EXISTING METHODS

 Selected algorithms are
   CVES
   SEA
   NCA
   EES
ALGORITHMS

 CVEA
  Proposed by Shu Jun Lia, Xuan Zhengb, Xuanqin Moua and
     Yuanlong Caia
    Universal hasty encryption scheme
    Method: encrypt the video using plain cluster
    The encryption procedure: one plain-cluster is encrypted by
     stream sub cipher and followed by block sub cipher.
    Decryption: the encrypted plain-cluster is firstly decrypted
     by block sub-cipher
      Pre decrypted plain cluster is encrypted by stream sub
        cipher.
ALGORITHMS
 SEA
  Low cast targeted encryption
  Operates on several word sizes, texts and key
  Based on Feistel theory with random round of
   varying numbers.
 NCA
  Use power function and the tangent function
  Proposed by Hogan Gao, Yisheng Zhang, Shuyun
   Liang, Dequn Li.
  Two parts of analysis:
    Logistic map analysis
    NCA map design
ALGORITHM

 EES
  Approved by U.S department of commerce in
   1994.
  Considerable feature is a key escrowed method
   enabling for detecting attacker
  Symmetric key encryption method
  Both SKIPJACK and LEAF creation methods are
   used for the encryption or decryption.
RESULTS AND DISCUSSION

 Performance analysis of selected chaotic
  encryption technique
 Parameters used:
   Encryption speed
   CPU utilization
   Power consumption
 Tool used:
   CPU meter
   Encryption –decryption tools
   Laptop with IV CPU 2.4GHz
PARAMETERS

 ENCRYPTION SPEED:
   Throughput of the encryption indicate speed of
    encryption.
 CPU utilization:
   CPU utilization means the CPU processing time.
   It indicates the load on the CPU
 Power consumption:
   CPU cycle measurement.
   Depends on the load on CPU
ENCRYPTION SPEED
45
                               comparison of different encryption in
                               terms of encryption time and packet
40                             size:

35
                               CVES
30


25

                               SEA
20


15

                               NCA
10


 5

                               EES
 0
     THROUGHPUT
POWER CONSUMPTION

2000


1800


1600


1400                                                    comparison of different encryption in terms of
                                                        encryption time and packet size:
1200                                                    CVES

1000                                                    SEA

800                                                     NCA

600                                                     EES


400


 200


   0
       49   100   247   694   963   3341.19   5310.88
TOOLS

 CPU meter       Encryption decryption
                   tool
Snapshots of encryption
 USING CERTAIN TOOLS FOR
       ENCRYPTION
SNAPSHOTS FOR ENCRYPTED DATA
CONCLUSION

 Chaotic cryptography provides higher security
  and efficiency to resist the attack.
 CVES and NCA – better encryption speed
 EES needs more time to encrypt
 All the algorithm ranges security from high to
  middle level.
REFFEERENCE
 Gary C. Kessler 1998, An overview of cryptography, Auerbach
    (September 1998) pp 3-4.
   Jon Collas 2009, introduction to cryptography, pgp
    cooperation pp7-29
   Deckert Florian , 23 march 2007, A brief history of
    cryptography, slide share.net 1 April 2010
   J Wei, X Liao, K Wong, T Xiang 2006, A new chaotic
    cryptosystem, chaos Solutions & Fractals – Elsevier pp 4-10
   M.K.HO (Archon) 2001 chaotic encryption standard-
    history, chaotic encryption webmaster
   Stephen R. Addison, John E. Gray 2006 Chaos and encryption:
    problems and potential , IEEE 2006 , pp 275
REFFERENCE
 T Yang 2004, A Survey of chaotic secure communication
  system , international journal of computational
  cognitive, yangsky.com
 Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai
  February 2002, chaotic encryption scheme for real time
  digital video, electronic imaging 2002, vol: 4666, pp149-
  160
 Yaobin Mao and Guanrong Chen, chaos based image
  encryption, 725 publications/journal pp8-20
 G. Alvartz and Shujun Li, 2009, Crypt analyzing a
  nonlinear chaotic algorithm(NCA) for image
  encryption, communication in nonlinear science and
  numerical simulations vol:14 pp 3743-3759
Performance evluvation of chaotic encryption technique

Mais conteúdo relacionado

Mais procurados

Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography2510stk
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 

Mais procurados (20)

Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Steganography
SteganographySteganography
Steganography
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 

Destaque

A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionsadique_ghitm
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networksTrinity Dwarka
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemMohit Chimankar
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосProject KRIT
 
On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...Mostafa Shokrian Zeini
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSwolfSSL
 
Evaluation & control
Evaluation & control Evaluation & control
Evaluation & control Fawad Ahmad
 
Technical Seminar PPT
Technical Seminar PPTTechnical Seminar PPT
Technical Seminar PPTKshitiz_Vj
 
DNA SEQUENCING METHOD
DNA SEQUENCING METHODDNA SEQUENCING METHOD
DNA SEQUENCING METHODMusa Khan
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisIOSR Journals
 
INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
 INTRODUCTION INFORMATION RETRIEVAL EVALUVATION INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
INTRODUCTION INFORMATION RETRIEVAL EVALUVATIONPremsankar Chakkingal
 

Destaque (20)

A hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryptionA hybrid genetic algorithm and chaotic function model for image encryption
A hybrid genetic algorithm and chaotic function model for image encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Jammer
JammerJammer
Jammer
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Advance Computer networks
Advance Computer networksAdvance Computer networks
Advance Computer networks
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication system
 
Sacolloq
SacolloqSacolloq
Sacolloq
 
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаосМ.Г.Гоман (2000) – Динамика нелинейных систем и хаос
М.Г.Гоман (2000) – Динамика нелинейных систем и хаос
 
On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...On the fractional order extended kalman filter and its application to chaotic...
On the fractional order extended kalman filter and its application to chaotic...
 
Secure modem design
Secure modem designSecure modem design
Secure modem design
 
Secure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLSSecure Communication: Usability and Necessity of SSL/TLS
Secure Communication: Usability and Necessity of SSL/TLS
 
Evaluation & control
Evaluation & control Evaluation & control
Evaluation & control
 
Genetic engineering and recombinant DNA technology
Genetic engineering and recombinant DNA  technologyGenetic engineering and recombinant DNA  technology
Genetic engineering and recombinant DNA technology
 
P1151351311
P1151351311P1151351311
P1151351311
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Genome Mapping
Genome MappingGenome Mapping
Genome Mapping
 
Technical Seminar PPT
Technical Seminar PPTTechnical Seminar PPT
Technical Seminar PPT
 
DNA SEQUENCING METHOD
DNA SEQUENCING METHODDNA SEQUENCING METHOD
DNA SEQUENCING METHOD
 
Image encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysisImage encryption using chaotic sequence and its cryptanalysis
Image encryption using chaotic sequence and its cryptanalysis
 
INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
 INTRODUCTION INFORMATION RETRIEVAL EVALUVATION INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
INTRODUCTION INFORMATION RETRIEVAL EVALUVATION
 

Semelhante a Performance evluvation of chaotic encryption technique

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Nikhil Jain
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE Mohammed Abdul Lateef
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMcscpconf
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network securityMahipesh Satija
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityMahipesh Satija
 

Semelhante a Performance evluvation of chaotic encryption technique (20)

Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
 Cryptography and network security Cryptography and network security
Cryptography and network security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Performance evluvation of chaotic encryption technique

  • 1. PERFORMANCE EVALUVATION OF CHAOTIC ENCRYPTION GUIDE: PROF JOHN SINGH SITE ANCY MARIAM BABU 10MCA0010
  • 2. OBJECTIVES  The main objectives are:  To analyze the confidentiality, integrity of the transmitting video data  To analyze the efficiency of each chaotic algorithm  To observe the encryption speed , power consumption and CPU utilization of the system.
  • 3. INTRODUCTION  What is cryptography?  The objectives of cryptography  What is chaos?  Chaotic cryptography  Chaotic encryption  Chaotic decryption
  • 4. CRYPTOGRAPHY  Cryptography is science of secure information.  Components:  Encryption  Decryption  Objectives:  Confidentiality  Authentication  Integrity
  • 5. CHAOS  The term ‘CHAOS’ defined: the state of randomness or confusion.  Chaos theory  A field of study in mathematics  Study the behavior of dynamic systems with initial condition
  • 6. CHAOTIC CRYPTIGRAPHY- HISTORY  IN 1950, SHANNON MENTIONED CHAOS CAN USEDD FOR CRYPTOGRAPHY  AT 1980, SHANNON DEVELOPED CHAOTIC THEORY  1N 1990, FIRST CHAOTIC BASED CIPHER  1N 1998, CHAOTIC ENCRYPTON DEVELOPED BY BAPTISTA  IN 2000, CHAOS STARTED TO USE WIDELY
  • 7. CHAOTIC CRYPTOGRAPHY  Type of fast and secure cryptographic method  Usually chaotic signals are noisy like and chaotic systems are initially sensitive.  Substantial reduction in encryption and decryption time.  Components  Chaotic encryption and decryption
  • 8. CHAOTIC ENCRYPTION  Known as Baptista's method .  Encryption process  Define mapping scheme of trajectory  Choose initial condition and parameter key  Set initial condition as current trajectory  Iterate the chaotic equation until the trajectory reaches the destination site for each symbol.  Store the number of iterations as a cipher  Encrypt the next message with current trajectory  Produce cipher and repeat the process
  • 9. CHAOTIC DECRYPTION  Decryption process  Set the initial condition and parameters and apply the same mapping scheme for decryption.  Iterate the chaotic equation by the cipher (number of iterations).  Find out the site that the trajectory belonged to and store the symbol of the site as message symbol.  Decrypts next symbol by iterating the current trajectory and producing the next message symbol and so on.
  • 10. EXISTING METHODS  Selected algorithms are  CVES  SEA  NCA  EES
  • 11. ALGORITHMS  CVEA  Proposed by Shu Jun Lia, Xuan Zhengb, Xuanqin Moua and Yuanlong Caia  Universal hasty encryption scheme  Method: encrypt the video using plain cluster  The encryption procedure: one plain-cluster is encrypted by stream sub cipher and followed by block sub cipher.  Decryption: the encrypted plain-cluster is firstly decrypted by block sub-cipher  Pre decrypted plain cluster is encrypted by stream sub cipher.
  • 12. ALGORITHMS  SEA  Low cast targeted encryption  Operates on several word sizes, texts and key  Based on Feistel theory with random round of varying numbers.  NCA  Use power function and the tangent function  Proposed by Hogan Gao, Yisheng Zhang, Shuyun Liang, Dequn Li.  Two parts of analysis:  Logistic map analysis  NCA map design
  • 13. ALGORITHM  EES  Approved by U.S department of commerce in 1994.  Considerable feature is a key escrowed method enabling for detecting attacker  Symmetric key encryption method  Both SKIPJACK and LEAF creation methods are used for the encryption or decryption.
  • 14. RESULTS AND DISCUSSION  Performance analysis of selected chaotic encryption technique  Parameters used:  Encryption speed  CPU utilization  Power consumption  Tool used:  CPU meter  Encryption –decryption tools  Laptop with IV CPU 2.4GHz
  • 15. PARAMETERS  ENCRYPTION SPEED:  Throughput of the encryption indicate speed of encryption.  CPU utilization:  CPU utilization means the CPU processing time.  It indicates the load on the CPU  Power consumption:  CPU cycle measurement.  Depends on the load on CPU
  • 16. ENCRYPTION SPEED 45 comparison of different encryption in terms of encryption time and packet 40 size: 35 CVES 30 25 SEA 20 15 NCA 10 5 EES 0 THROUGHPUT
  • 17. POWER CONSUMPTION 2000 1800 1600 1400 comparison of different encryption in terms of encryption time and packet size: 1200 CVES 1000 SEA 800 NCA 600 EES 400 200 0 49 100 247 694 963 3341.19 5310.88
  • 18. TOOLS  CPU meter  Encryption decryption tool
  • 19. Snapshots of encryption  USING CERTAIN TOOLS FOR ENCRYPTION
  • 21. CONCLUSION  Chaotic cryptography provides higher security and efficiency to resist the attack.  CVES and NCA – better encryption speed  EES needs more time to encrypt  All the algorithm ranges security from high to middle level.
  • 22. REFFEERENCE  Gary C. Kessler 1998, An overview of cryptography, Auerbach (September 1998) pp 3-4.  Jon Collas 2009, introduction to cryptography, pgp cooperation pp7-29  Deckert Florian , 23 march 2007, A brief history of cryptography, slide share.net 1 April 2010  J Wei, X Liao, K Wong, T Xiang 2006, A new chaotic cryptosystem, chaos Solutions & Fractals – Elsevier pp 4-10  M.K.HO (Archon) 2001 chaotic encryption standard- history, chaotic encryption webmaster  Stephen R. Addison, John E. Gray 2006 Chaos and encryption: problems and potential , IEEE 2006 , pp 275
  • 23. REFFERENCE  T Yang 2004, A Survey of chaotic secure communication system , international journal of computational cognitive, yangsky.com  Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai February 2002, chaotic encryption scheme for real time digital video, electronic imaging 2002, vol: 4666, pp149- 160  Yaobin Mao and Guanrong Chen, chaos based image encryption, 725 publications/journal pp8-20  G. Alvartz and Shujun Li, 2009, Crypt analyzing a nonlinear chaotic algorithm(NCA) for image encryption, communication in nonlinear science and numerical simulations vol:14 pp 3743-3759