Analysis of eSTREAM Profile II Ciphers for Image Encryption

  • João César Federal University of Lavras
  • Wilian Lacerda Federal University of Lavras
  • Bruno Silva Federal University of Lavras

Abstract


Security and privacy have always been the subject of research, but currently with the popularization of mass media, such as the Internet, this subject becomes even more fundamental. Communication today is not only done by exchanging text or audio files, but also by exchanging digital images files. Encryption systems have been constantly improved and standardized to provide security and privacy, including algorithms specialized in image encryption. Although they are translated into binary data as well as texts, the images have particular characteristics that prevent the use of popular cryptographic systems such as RSA, DES and AES. Stream cipher systems are compact and simple to implement. To promote their development ECRYPT (European Network of Excellence for Cryptology) has organized the eSTREAM project, resulting in a portfolio of validated stream ciphers for software and hardware implementations. This article presents the analysis of eSTREAM Profile II ciphers regarding their quality when applied in digital images.

Keywords: Criptografia, Criptografia de Imagens, eSTREAM

References

D. Ardagna, G. Casale, M. Ciavotta, J. F. Pérez, and W. Wang. Quality-of-service in cloud computing: modeling techniques and their applications. Journal of Internet Services and Applications, 5(1):1–17, 2014.

B. G. Batista, J. C. Estrella, C. H. G. Ferreira, D. M. Leite Filho, L. H. V. Nakamura, S. Reiff-Marganiec, M. J. Santana, and R. H. C. Santana. Performance evaluation of resource management in cloud computing environments. PloS one, 10(11):21, 2015.

B. G. Batista, C. H. G. Ferreira, D. C. M. Segura, D. M. Leite Filho, and M. L. M. Peixoto. A qos-driven approach for cloud computing addressing attributes of performance and security. Future Generation Computer Systems, 68:260–274, 2017.

R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya. Cloudsim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience, 41(1):23–50, 2011.

S. Dam, G. Mandal, K. Dasgupta, and P. Dutta. An ant colony based load balancing strategy in cloud computing. pages 403–413, 2014.

K. Dasgupta, B. Mandal, P. Dutta, J. K. Mandal, and S. Dam. A genetic algorithm (ga) based load balancing strategy for cloud computing. Procedia Technology, 10:340–347, 2013.

P. G. Gopinath and S. K. Vasudevan. An in-depth analysis and study of load balancing techniques in the cloud computing environment. Procedia Computer Science, 50:427–432, 2015.

R. Jain. The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling. New York, NY, USA, Wiley, 1991.

P. Mell and T. Grance. The nist definition of cloud computing (draft). NIST special publication, 800:145, 2011.

L. Nema, A. Sharma, and S. Jain. Load balancing algorithms in cloud computing: An extensive survey. International Journal of Engineering Science, 7463, 2016.

J. W. Rittinghouse and J. F. Ransome. Cloud computing: implementation, management, and security. CRC press, 2016.

R. R. Selmic, V. V. Phoha, and A. Serwadda. Quality of service. pages 179–196, 2016.

A. Singh, D. Juneja, and M. Malhotra. Autonomous agent based load balancing algorithm in cloud computing. Procedia Computer Science, 45:832–841, 2015.

S. I. Singh, T. C. Abraham, and N. C. S. N. Iyengar. A review: Different improvised min-min load balancing algorithm in cloud computing environment. Journal of Computer and Mathematical Sciences, 7(11):540–550, 2016.

S. Subashini and V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1):1–11, 2011.

A. S. Tanenbaum. Computer networks, 5-th edition. ed: Prentice Hall, 2011.

V. Tyagi and T. Kumar. Ort broker policy: Reduce cost and response time using throttled load balancing algorithm. Procedia Computer Science, 48:217–221, 2015.

M.-A. Vasile, F. Pop, R.-I. Tutueanu, V. Cristea, and J. Ko lodziej. Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing. Future Generation Computer Systems, 51:61–71, 2015.

T. Weber. Um roteiro para exploração dos conceitos básicos de tolerância a falhas. Relatório técnico, Instituto de Informática UFRGS, 2002.
Published
2017-05-17
CÉSAR, João; LACERDA, Wilian; SILVA, Bruno. Analysis of eSTREAM Profile II Ciphers for Image Encryption. In: BRAZILIAN SYMPOSIUM ON INFORMATION SYSTEMS (SBSI), 13. , 2017, Lavras. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2017 . p. 372-379. DOI: https://doi.org/10.5753/sbsi.2017.6065.