A Chaos-Based Encryption Algorithm for Database System
Keywords:Database, encryption, security, chaos maps, Kaplan–Yorke map, Arnold Cat Map
This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is based primarily on two well-known security properties: confusion and diffusion. A random number generator was depended on to produce the keys for the algorithm of encryption and decryption. The encryption of the Arabic language in addition to the English language was done, besides it can encrypt a table, individual row and individual column. The suggested algorithm was obeyed and analyzed by different tests involving brute force attack analyses, statistical attack analyses (security analysis histogram, correlation coefficient analysis and information entropy analysis), key sensitivity analysis, differential attack analysis, and mean square error analysis. This algorithm passed all the applied analyses well-deservedly, which indicates that the presented encryption algorithm has a high security level due to its large key space and high sensitivity to the change in the cipher keys.
P. Singh and K. Kaur, “Database security using encryption,” 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015, pp. 353–358, DOI: 10.1109/ABLAZE.2015.7155019.
J J. S. Teh, M. Alawida, and Y. C. Sii, “Implementation and practical problems of chaos-based cryptography revisited,” Journal of Information Security and Applications, 2020, vol. 50, no. 102421, pp. 102421, DOI: 10.1016/j.jisa.2019.102421.
X.-H. Wu and X.-J. Ming, “Research of the Database Encryption Technique Based on Hybrid Cryptography,” 2010 International Symposium on Computational Intelligence and Design, 2010, pp. 68–71, DOI: 10.1109/ISCID.2010.105.
Manivannan and R. Sujarani, “Light weight and secure database encryption using TSFS algorithm,” 2010 Second International conference on Computing, Communication and Networking Technologies, 2010, pp. 1–7, DOI: 10.1109/ICCCNT.2010.5591778.
S. M. Darwish, A. A. El-Zoghabi, and M. A. Abdewi, “Database encryption using fuzzy chaotic,” International Journal of Future Computer and Communication, 2014, vol. 3, no. 6, pp. 436–443, DOI: 10.7763/IJFCC.2014.V3.343.
V. V. Galushka, A. R. Aydinyan, O. L. Tsvetkova, V. A. Fathi, and D. V. Fathi, “System of end-to-end symmetric database encryption,” Journal of Physics: Conference Series, 2018, vol. 1015, p. 042003, DOI: 10.1088/1742-6596/1015/4/042003.
R. N. AL-Zubaidy and E. Al-Bahrani, “New Key Generation Algorithm based on Dynamical Chaotic Substitution Box,” 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), 2018, pp. 93–98, DOI: 10.1109/NTCCIT.2018.8681187.
A. A. Maryoosh, “A new block cipher algorithm for image encryption based on chaotic system and S-Box”, International Journal of Civil Engineering and Technology , 2018, vol. 9, no. 13, pp. 318–327.
M. H. P. Ranmuthugala and C. Gamage, “Chaos theory based cryptography in digital image distribution,” in 2010 International Conference on Advances in ICT for Emerging Regions (ICTer), 2010, pp. 32–39, DOI: 10.1109/ICTER.2010.5643275.
F. Chen, K.-W. Wong, X. Liao, and T. Xiang, “Period distribution of generalized discrete Arnold cat map,” Theoretical Computer Science, vol. 552, pp. 13–25, 2014, DOI: https://doi.org/10.1016/j.tcs.2014.08.002.
X. Jin, Y. Chen, S. Ge, K. Zhang, X. Li, Y. Li, Y. Liu, K. Guo, Y. Tian, G. Zhao, X. Zhang, and Z. Wang, Color Image Encryption in CIE L*a*b* Space, International Conference on Applications and Techniques in Information Security (ATIS), 2015, vol. 557, pp. 74–85, DOI: https://doi.org/10.1007/978-3-662-48683-2_8.
N. H. Ghayad and E. A. Albahrani, “A combination of two-dimensional hénon map and two-dimensional rational map as key number generator,” in 2019 First International Conference of Computer and Applied Sciences (CAS), 2019 pp. 107–112, DOI: 10.1109/CAS47993.2019.9075731.
Albahrani, A. A. Maryoosh, and S. H. Lafta, “Block image encryption based on modified playfair and chaotic system,” Journal of Information Security and Applications, 2020, vol. 51, no. 102445, pp. 1–9, DOI: https://doi.org/10.1016/j.jisa.2019.102445.
K. A. Hussein, S. A. Mahmood, and M. A. Abbass, “A new permutation-substitution scheme based on Henon chaotic map for image encryption,” in 2019 2nd Scientific Conference of Computer Sciences (SCCS), 2019, pp. 63–68, DOI: 10.1109/SCCS.2019.8852590.
S. Mahmood and M. S. M. Rahim, “Novel method for image security system based on improved SCAN method and pixel rotation technique,” Journal of Information Security and Applications, 2018, vol. 42, pp. 57–70, DOI: https://doi.org/10.1016/j.jisa.2018.08.001.
Albahrani and R. N. Kadhum, “A New Cipher Based on Feistel Structure and Chaotic Maps”, Baghdad Science Journal, 2019, vol. 16, no. 1, pp. 270–280, DOI: https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270.
B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, “A novel image encryption based on hash function with only two-round diffusion process,” Multimedia Systems, 2014, vol. 20, no. 1, pp. 45–64, DOI: https://doi.org/10.1007/s00530-013-0314-4.
B. D. Parameshachari, Kiran, P. Rashmi, M. C. Supriya, Rajashekarappa, H. T. Panduranga, “Controlled partial image encryption based on LSIC and chaotic map,” in Proceedings of the 3rd International Conference on Cryptography, Security and Privacy – ICCSP ’19, 2019, pp. 60–63, DOI: https://doi.org/10.1145/3309074.3309107.
J. Xu, B. Zhao, and Z. Wu, “Research on color image encryption algorithm based on bit-plane and Chen chaotic system,” Entropy (Basel), 2022, vol. 24, no. 2, p. 186, DOI: 10.3390/e24020186.
How to Cite
Copyright (c) 2023 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.