A Chaos-Based Encryption Algorithm for Database System

Authors

  • Ekhlas Abbas Albahrani Department of Computer Science, Mustansiriyah University, Baghdad, Iraq
  • Sadeq H. Lafta Department of Applied Science, University of Technology – Iraq
  • Naeem Howrie Ghayad Ministry of Labour and Social Affairs, Iraq

DOI:

https://doi.org/10.13052/jcsm2245-1439.1212

Keywords:

Database, encryption, security, chaos maps, Kaplan–Yorke map, Arnold Cat Map

Abstract

This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is based primarily on two well-known security properties: confusion and diffusion. A random number generator was depended on to produce the keys for the algorithm of encryption and decryption. The encryption of the Arabic language in addition to the English language was done, besides it can encrypt a table, individual row and individual column. The suggested algorithm was obeyed and analyzed by different tests involving brute force attack analyses, statistical attack analyses (security analysis histogram, correlation coefficient analysis and information entropy analysis), key sensitivity analysis, differential attack analysis, and mean square error analysis. This algorithm passed all the applied analyses well-deservedly, which indicates that the presented encryption algorithm has a high security level due to its large key space and high sensitivity to the change in the cipher keys.

Downloads

Download data is not yet available.

Author Biographies

Ekhlas Abbas Albahrani, Department of Computer Science, Mustansiriyah University, Baghdad, Iraq

Ekhlas Abbas Albahrani was born at 1974. She had the PhD Degree in Computer science/Data Security in 2016. The Msc. in Computer science/Data Security in 2001, and Bachelor Degree in Computer science 1996 at the University of Technology/Iraq. Work teams are at University of Technology and Mustansiriyah University, Baghdad, Iraq on Cryptography research field. Academic member from 1996 to 2001 at the University of Technology/Iraq, from 2001 to 2009 at Sebha University and at Mustansiriyah University/Iraq from 2009 to 2021. She participated in different committees such as organizing symposium and conferences in computer Sciences at Mustansiriyah University and IEEE conferences. She participated in different seminars, Training courses and lectures inside Iraq. She reviewed more than 22 articles in data security for Clarivate and Scopus journals. She participated in different organizing and scientific committees of conferences in College of Education at Mustansiriyah University/Iraq. She has about 20 published research papers in Cryptography and Data Security.

Sadeq H. Lafta, Department of Applied Science, University of Technology – Iraq

Sadeq H. Lafta was born at 1972 he had his PhD Degree in Magnetic Material Science in 2016, the Msc. in Laser Physics 1998, and Bachelor Degree in Applied Physics 1995 University of Technology/Iraq. His work teams are at University of Technology in semiconductor, nanomaterials and sensor fields, Duisburg-Essen University in nano-magnetic material field and Mustansiriyah University in Cryptography research field. He was an academic member from 1998 to 2009 in Sebha University, researcher at Nanotechnology Centre and Applied Science Department/University of Technology/Iraq from 2010 to 2021. He participated in different committees such as organizing symposium and conferences in Nanotechnology Centre/University of Technology. He participated in revealing the validity of laboratory equipment and suitability for work. He participated in different seminars, Training courses and lectures inside and outside Iraq. He has different social and scientific articles in Applied Science Dep. Website. He reviewed more than 50 articles in different applied physics for Clarivate and Scopus journals. He participated in different organizing and scientific committees of conferences in Nanotechnology Centre Applied Science Dep. At University of Technology/Iraq. He has about 25 published research papers in Applied Physics and Cryptography. He has a Science Day Medal/Ministry of Higher Education/Iraq in 2016 and Inventors Medal/Ministry of Science and Technology/Iraq in 2018.

Naeem Howrie Ghayad, Ministry of Labour and Social Affairs, Iraq

Naeem Howrie Ghayad, born in 1978 in Baghdad, B.Sc. 2004 in computer science. MSc. In Computer Science from College of Education at Mustansiriyah University/Baghdad in 2019. He has 3 published papers in the field of cryptography. Now, he works in the Ministry of Labour and Social Affairs/Iraq.

References

P. Singh and K. Kaur, “Database security using encryption,” 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015, pp. 353–358, DOI: 10.1109/ABLAZE.2015.7155019.

J J. S. Teh, M. Alawida, and Y. C. Sii, “Implementation and practical problems of chaos-based cryptography revisited,” Journal of Information Security and Applications, 2020, vol. 50, no. 102421, pp. 102421, DOI: 10.1016/j.jisa.2019.102421.

X.-H. Wu and X.-J. Ming, “Research of the Database Encryption Technique Based on Hybrid Cryptography,” 2010 International Symposium on Computational Intelligence and Design, 2010, pp. 68–71, DOI: 10.1109/ISCID.2010.105.

Manivannan and R. Sujarani, “Light weight and secure database encryption using TSFS algorithm,” 2010 Second International conference on Computing, Communication and Networking Technologies, 2010, pp. 1–7, DOI: 10.1109/ICCCNT.2010.5591778.

S. M. Darwish, A. A. El-Zoghabi, and M. A. Abdewi, “Database encryption using fuzzy chaotic,” International Journal of Future Computer and Communication, 2014, vol. 3, no. 6, pp. 436–443, DOI: 10.7763/IJFCC.2014.V3.343.

V. V. Galushka, A. R. Aydinyan, O. L. Tsvetkova, V. A. Fathi, and D. V. Fathi, “System of end-to-end symmetric database encryption,” Journal of Physics: Conference Series, 2018, vol. 1015, p. 042003, DOI: 10.1088/1742-6596/1015/4/042003.

R. N. AL-Zubaidy and E. Al-Bahrani, “New Key Generation Algorithm based on Dynamical Chaotic Substitution Box,” 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), 2018, pp. 93–98, DOI: 10.1109/NTCCIT.2018.8681187.

A. A. Maryoosh, “A new block cipher algorithm for image encryption based on chaotic system and S-Box”, International Journal of Civil Engineering and Technology , 2018, vol. 9, no. 13, pp. 318–327.

M. H. P. Ranmuthugala and C. Gamage, “Chaos theory based cryptography in digital image distribution,” in 2010 International Conference on Advances in ICT for Emerging Regions (ICTer), 2010, pp. 32–39, DOI: 10.1109/ICTER.2010.5643275.

F. Chen, K.-W. Wong, X. Liao, and T. Xiang, “Period distribution of generalized discrete Arnold cat map,” Theoretical Computer Science, vol. 552, pp. 13–25, 2014, DOI: https://doi.org/10.1016/j.tcs.2014.08.002.

X. Jin, Y. Chen, S. Ge, K. Zhang, X. Li, Y. Li, Y. Liu, K. Guo, Y. Tian, G. Zhao, X. Zhang, and Z. Wang, Color Image Encryption in CIE L*a*b* Space, International Conference on Applications and Techniques in Information Security (ATIS), 2015, vol. 557, pp. 74–85, DOI: https://doi.org/10.1007/978-3-662-48683-2_8.

N. H. Ghayad and E. A. Albahrani, “A combination of two-dimensional hénon map and two-dimensional rational map as key number generator,” in 2019 First International Conference of Computer and Applied Sciences (CAS), 2019 pp. 107–112, DOI: 10.1109/CAS47993.2019.9075731.

Albahrani, A. A. Maryoosh, and S. H. Lafta, “Block image encryption based on modified playfair and chaotic system,” Journal of Information Security and Applications, 2020, vol. 51, no. 102445, pp. 1–9, DOI: https://doi.org/10.1016/j.jisa.2019.102445.

K. A. Hussein, S. A. Mahmood, and M. A. Abbass, “A new permutation-substitution scheme based on Henon chaotic map for image encryption,” in 2019 2nd Scientific Conference of Computer Sciences (SCCS), 2019, pp. 63–68, DOI: 10.1109/SCCS.2019.8852590.

S. Mahmood and M. S. M. Rahim, “Novel method for image security system based on improved SCAN method and pixel rotation technique,” Journal of Information Security and Applications, 2018, vol. 42, pp. 57–70, DOI: https://doi.org/10.1016/j.jisa.2018.08.001.

Albahrani and R. N. Kadhum, “A New Cipher Based on Feistel Structure and Chaotic Maps”, Baghdad Science Journal, 2019, vol. 16, no. 1, pp. 270–280, DOI: https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270.

B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, “A novel image encryption based on hash function with only two-round diffusion process,” Multimedia Systems, 2014, vol. 20, no. 1, pp. 45–64, DOI: https://doi.org/10.1007/s00530-013-0314-4.

B. D. Parameshachari, Kiran, P. Rashmi, M. C. Supriya, Rajashekarappa, H. T. Panduranga, “Controlled partial image encryption based on LSIC and chaotic map,” in Proceedings of the 3rd International Conference on Cryptography, Security and Privacy – ICCSP ’19, 2019, pp. 60–63, DOI: https://doi.org/10.1145/3309074.3309107.

J. Xu, B. Zhao, and Z. Wu, “Research on color image encryption algorithm based on bit-plane and Chen chaotic system,” Entropy (Basel), 2022, vol. 24, no. 2, p. 186, DOI: 10.3390/e24020186.

Downloads

Published

2023-03-07

How to Cite

1.
Albahrani EA, Lafta SH, Ghayad NH. A Chaos-Based Encryption Algorithm for Database System. JCSANDM [Internet]. 2023 Mar. 7 [cited 2024 Nov. 4];12(01):25-54. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/13317

Issue

Section

Articles

Most read articles by the same author(s)