Analysis of eSTREAM Profile II Ciphers for Image Encryption
Abstract
Security and privacy have always been the subject of research, but currently with the popularization of mass media, such as the Internet, this subject becomes even more fundamental. Communication today is not only done by exchanging text or audio files, but also by exchanging digital images files. Encryption systems have been constantly improved and standardized to provide security and privacy, including algorithms specialized in image encryption. Although they are translated into binary data as well as texts, the images have particular characteristics that prevent the use of popular cryptographic systems such as RSA, DES and AES. Stream cipher systems are compact and simple to implement. To promote their development ECRYPT (European Network of Excellence for Cryptology) has organized the eSTREAM project, resulting in a portfolio of validated stream ciphers for software and hardware implementations. This article presents the analysis of eSTREAM Profile II ciphers regarding their quality when applied in digital images.
References
B. G. Batista, J. C. Estrella, C. H. G. Ferreira, D. M. Leite Filho, L. H. V. Nakamura, S. Reiff-Marganiec, M. J. Santana, and R. H. C. Santana. Performance evaluation of resource management in cloud computing environments. PloS one, 10(11):21, 2015.
B. G. Batista, C. H. G. Ferreira, D. C. M. Segura, D. M. Leite Filho, and M. L. M. Peixoto. A qos-driven approach for cloud computing addressing attributes of performance and security. Future Generation Computer Systems, 68:260–274, 2017.
R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya. Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience, 41(1):23–50, 2011.
S. Dam, G. Mandal, K. Dasgupta, and P. Dutta. An ant colony based load balancing strategy in cloud computing. pages 403–413, 2014.
K. Dasgupta, B. Mandal, P. Dutta, J. K. Mandal, and S. Dam. A genetic algorithm (ga) based load balancing strategy for cloud computing. Procedia Technology, 10:340–347, 2013.
P. G. Gopinath and S. K. Vasudevan. An in-depth analysis and study of load balancing techniques in the cloud computing environment. Procedia Computer Science, 50:427–432, 2015.
R. Jain. The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling. New York, NY, USA, Wiley, 1991.
P. Mell and T. Grance. The nist definition of cloud computing (draft). NIST special publication, 800:145, 2011.
L. Nema, A. Sharma, and S. Jain. Load balancing algorithms in cloud computing: An extensive survey. International Journal of Engineering Science, 7463, 2016.
J. W. Rittinghouse and J. F. Ransome. Cloud computing: implementation, management, and security. CRC press, 2016.
R. R. Selmic, V. V. Phoha, and A. Serwadda. Quality of service. pages 179–196, 2016.
A. Singh, D. Juneja, and M. Malhotra. Autonomous agent based load balancing algorithm in cloud computing. Procedia Computer Science, 45:832–841, 2015.
S. I. Singh, T. C. Abraham, and N. C. S. N. Iyengar. A review: Different improvised min-min load balancing algorithm in cloud computing environment. Journal of Computer and Mathematical Sciences, 7(11):540–550, 2016.
S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1):1–11, 2011.
A. S. Tanenbaum. Computer networks, 5-th edition. ed: Prentice Hall, 2011.
V. Tyagi and T. Kumar. Ort broker policy: Reduce cost and response time using throttled load balancing algorithm. Procedia Computer Science, 48:217–221, 2015.
M.-A. Vasile, F. Pop, R.-I. Tutueanu, V. Cristea, and J. Ko lodziej. Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems, 51:61–71, 2015.
T. Weber. Um roteiro para exploração dos conceitos básicos de tolerância a falhas. Relatório técnico, Instituto de Informática UFRGS, 2002.
