Sherif H. Abdel Haleem, A. Radwan, S. Abd-El-Hafiz
{"title":"Utilizing LFSR and Feistel networks in image encryption","authors":"Sherif H. Abdel Haleem, A. Radwan, S. Abd-El-Hafiz","doi":"10.1109/ICECS.2013.6815486","DOIUrl":null,"url":null,"abstract":"This paper presents a new encryption scheme based on the combination between Linear Feedback Shift Register (LFSR) and generalized Feistel networks (GFN). The construction of each GFN depends on Substitution Boxes (S-Boxes) and its operation requires a key. The encryption key length is dynamic and can be controlled via the initial values of the LFSR, S-Boxes, and the number of GFN stages. The performance of the proposed scheme is tested using the standard statistical measures and the NIST statistical test suite. Moreover, sensitivity analysis of the encryption key is performed.","PeriodicalId":117453,"journal":{"name":"2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS)","volume":"37 18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECS.2013.6815486","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
This paper presents a new encryption scheme based on the combination between Linear Feedback Shift Register (LFSR) and generalized Feistel networks (GFN). The construction of each GFN depends on Substitution Boxes (S-Boxes) and its operation requires a key. The encryption key length is dynamic and can be controlled via the initial values of the LFSR, S-Boxes, and the number of GFN stages. The performance of the proposed scheme is tested using the standard statistical measures and the NIST statistical test suite. Moreover, sensitivity analysis of the encryption key is performed.