Abstract
With the evolution and the development of data-processing tools and their pervasive scopes of applications, the need for data protection today has become a crucial necessity in order to reduce the number of incidents caused by non-authorized data accesses and to prevent malicious usage. With the purpose of maintaining a significantly high level of security, cryptography englobes the entirety of methods as well as a couple of techniques and tools aimed to assure data confidentiality. Indeed, this work’s main focus is a new approach based on a four-square encryption accompanied by a zigzag transformation. This approach allows us to provide the appropriate settings for the four-square technique and the new conception of a transformation that manages future plans. These last are immune to brute attacks and statistic attacks. Considering all of that, this exhaustive study will emphasize the reliability of this approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tong, X., Cui, M., Wang, Z.: A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J. Opt. Commun. 282, 2722–2728 (2009)
Borujeni, S.E., Eshghi, M.: Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J. Telecommun. Syst. (2011)
Wang, X.Y., Guo, K.: A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 76, 1943–1950 (2014)
Hua, Z.Y., Zhou, Y.C., Pun, C.M., Philip Chen, C.L.: 2D Sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)
Tong, X.G., Wang, Z., Zhang, M., Liu, Y., Xu, H., Ma, J.: An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn. 80, 1493–1508 (2015)
Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. J. Opt. Commun. 285, 29–37 (2012)
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.H.: A novel text encryption algorithm based on the two-square cipher and Caesar cipher, pp. 78–88 (2018)
Ling, C., Wu, X., Sun, S.: A general efficient method for chaotic signal estimation. IEEE Trans. Signal Process. 47, 1424–1428 (1999)
Wu, X., Hu, H., Zhang, B.: Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22, 359–366 (2004)
Skrobek, A.: Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363, 84–90 (2007)
Patidar, V., Pareek, N., Sud, K.: Communications in nonlinear science and numerical simulation 14, 3056 (2009)
Parvaz, R., Zarebnia, M.: A combination chaotic system and application in color image encryption. Optics Laser Technol. 101, 30–41 (2018)
Norouzi, B., et al.: A novel image encryption based on hash function with only two-round diffusion process. Multimedia Syst. (2013)
Weidenmuller, H.A., Mitchell, G.E.: Random matrices and chaos in nuclear physics: nuclear structure. Rev. Mod. Phys. 81(2), 539–589 (2009)
Lu, L., Luan, L., Meng, L., Li, C.R.: Study on spatiotemporal chaos tracking synchronization of a class of complex network. Nonlinear Dyn. 70(1), 89–95 (2012)
Lesne, A.: Chaos in biology. Riv. Biol. 99(3), 467–481 (2006)
Liu, C.X., Lu, J.J.: A novel fractional-order hyperchaotic system and its circuit realization. Int. J. Mod. Phys. B 24(10), 1299–1307 (2010)
Hilborn, R.C.: Chaos and nonlinear dynamics: an introduction for scientists and engineers, 2nd edn. Oxford University Press, USA (2001)
Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdiscip. J. Nonlinear Sci. 18 (2008)
Hayat, U., Azam, N.A.: A novel image encryption scheme based on an elliptic curve. Signal Process. 155, 391–402 (2019)
Koppula, V., Waters, B.: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: IACR Cryptology ePrint Archive, p. 847 (2018)
Håstad, J.: Solving simultaneous modular equations of low degree. SIAM J. Comput. 17(2), 336–341 (1988)
Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28, 270–299 (1984)
Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Grayscale image encryption using shift bits operations. In: International Conference on Intelligent Systems and Computer Vision, ISCV (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Elazzaby, F., El Akkad, N., Kabbaj, S. (2020). A New Encryption Approach Based on Four-Square and Zigzag Encryption (C4CZ). In: Bhateja, V., Satapathy, S., Satori, H. (eds) Embedded Systems and Artificial Intelligence. Advances in Intelligent Systems and Computing, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0947-6_56
Download citation
DOI: https://doi.org/10.1007/978-981-15-0947-6_56
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0946-9
Online ISBN: 978-981-15-0947-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)