Vous êtes sur la page 1sur 19

Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image

Encryption and Decryption

CHAPTER 5
RESULTS AND DISCUSSION
Need for security in transmission and storage has become greater and greater
with the ever-increasing amount of data stored in computers and data in transit. In order
to transfer the data/image to the intended user at destination in a secure way, there are
many approaches like Cryptography, Steganography and transposition method, etc. We
have used a strong key, generated using A5/1 algorithm. This work has been
implemented on MATLAB. To study the performance of the proposed system, three
different standard grey scale images and two different colour images are considered as
shown in Figures 5.1 to 5.11.

The original 256*256 gray scale input image, cipher image and decrypted
image of Cameraman image is obtained as shown in Figure 5.1.

Figure 5.1(a): Input Figure 5.1(b): Encrypted Figure 5.1(c): Decrypted


Cameraman Image Cameraman Image Cameraman Image

Figure 5.1: Encryption and Decryption of 256*256 Gray Scale Cameraman Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 19


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

The original 256*256 gray scale input image, cipher image and decrypted image of
Medical image is obtained as shown in Figure 5.2.

Figure 5.2(a): Input Figure 5.2(b): Encrypted Figure 5.2(c): Decrypted


Medical Image Medical Image Medical Image

Figure 5.2: Encryption and Decryption of 256*256 Gray Scale Medical Image

The original 256*256 gray scale input image, cipher image and decrypted
image of Clock image is obtained as shown in Figure 5.3.

Figure 5.3(a): Input Clock Figure 5.3(b): Figure 5.3(c): Decrypted


Image Encrypted Clock Clock Image
Image

Figure 5.3: Encryption and Decryption of 256*256 Gray Scale Clock Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 20


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

The original image, encrypted and decrypted image of 256*256-pixel Dr. AIT
logo colour image, its red, green and blue components are obtained as shown in Figure
5.4 to Figure 5.7.

Figure 5.4: 256*256-pixel Colour Dr. AIT logo Image

Figure 5.5(a): Input Red Figure 5.5(b): Encrypted Figure 5.5(c): Decrypted
channel Image Red Channel Image Red Channel Image

Figure 5.5: Encryption and Decryption of 256*256-pixel Red Channel Dr. AIT
logo Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 21


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.6(a): Input Figure 5.6(b): Encrypted Figure 5.6(c): Decrypted


Green channel Image Green Channel Image Green Channel Image

Figure 5.6: Encryption and Decryption of 256*256-pixel Green Channel Dr. AIT
logo Image

Figure 5.7(a): Input Blue Figure 5.7(b): Encrypted Figure 5.7(c): Decrypted
channel Image Blue Channel Image Blue Channel Image

Figure 5.7: Encryption and Decryption of 256*256-pixel Blue Channel Dr. AIT
logo Image

The original image, encrypted and decrypted image of 256*256-pixel Earth


colour image, its red, green and blue components are obtained as shown in Figure 5.8
to Figure 5.11.

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 22


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.8: 256*256-pixel Colour Earth Image

Figure 5.9(a): Input Red Figure 5.9(b): Encrypted Figure 5.9(c): Decrypted
channel Image Red Channel Image Red Channel Image

Figure 5.9: Encryption and Decryption of 256*256 Red Channel Earth Image

Figure 5.10(a): Input Figure 5.10(b): Encrypted Figure 5.10(c): Decrypted


Green channel Image Green Channel Image Green Channel Image

Figure 5.10: Encryption and Decryption of 256*256-pixel Green Channel Earth


Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 23


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.11(a): Input Blue Figure 5.11(b): Encrypted Figure 5.11(c): Decrypted
channel Image Blue Channel Image Blue Channel Image

Figure 5.11: Encryption and Decryption of 256*256-pixel Blue Channel Earth


Image

5.1. Histogram Analysis


The histogram of an image normally refers to a histogram of the pixel intensity
values. Histogram is a graph showing the number of pixels in an image at each different
intensity value found in that image. For an 8-bit grayscale image there are 256 different
possible intensities, and so the histogram will graphically display 256 numbers showing
the distribution of pixels amongst those grayscale values. In an image histogram, the
x-axis shows the gray level intensities and the y-axis shows the frequency of these
intensities.

Histogram has many uses in image processing. The first use of histogram is
that, we can predict about an image by just looking at its histogram. It’s like looking
an x ray of a bone of a body. The second use of histogram is for brightness purposes.
The histogram has wide application in image brightness. Histograms are also used in
adjusting contrast of an image. Another important use of histogram is to equalize an
image.

In this work, Histogram plot of input image, encrypted image and decrypted
image of 256*256 pixels gray scale and colour images are obtained as s shown in Figure
5.12 to Figure 5.20 respectively. It is observed that the histogram plots of input and
decrypted image are identical. It is clearly visible that histogram of cipher image is
fairly uniform and it does not leak any amount of information about the plain image.

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 24


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.12(a): Histogram of Input Cameraman Image

Figure 5.12(b): Histogram of Cipher Cameraman Image

Figure 5.12(c): Histogram of Decrypted Cameraman Image

Figure 5.12: Histogram Plots of 256*256 Input, Cipher and Decrypted Cameraman
Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 25


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.13(a): Histogram of Input Medical Image

Figure 5.13(b): Histogram of Cipher Medical Image

Figure 5.13(c): Histogram of Decrypted Medical Image

Figure 5.13: Histogram Plots of 256*256 Input, Cipher and Decrypted Medical Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 26


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.14(a): Histogram of Input Clock Image

Figure 5.14(b): Histogram of Cipher Clock Image

Figure 5.14(c): Histogram of Decrypted Clock Image

Figure 5.14: Histogram Plots of 256*256 Input, Cipher and Decrypted Clock Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 27


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.15(a): Histogram of Input Red Channel Earth Image

Figure 5.15(b): Histogram of Cipher Red Channel Earth Image

Figure 5.15(c): Histogram of Decrypted Red Channel Earth Image

Figure 5.15: Histogram Plots of 256*256 Input, Cipher and Decrypted Red Channel
Earth Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 28


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.16(a): Histogram of Input Green Channel Earth Image

Figure 5.16(b): Histogram of Cipher Green Channel Earth Image

Figure 5.16(c): Histogram of Decrypted Green Channel Earth Image

Figure 5.16: Histogram Plots of 256*256 Input, Cipher and Decrypted Green Channel
Earth Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 29


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.17(a): Histogram of Input Blue Channel Earth Image

Figure 5.17(b): Histogram of Cipher Blue Channel Earth Image

Figure 5.17(c): Histogram of Decrypted Blue Channel Earth Image

Figure 5.17: Histogram Plots of 256*256 Input, Cipher and Decrypted Cameraman
Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 30


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.18(a): Histogram of Input Red Channel Dr. AIT logo Image

Figure 5.18(b): Histogram of Cipher Red Channel Dr. AIT logo Image

Figure 5.18(c): Histogram of Decrypted Red Channel Dr. AIT logo Image

Figure 5.18: Histogram Plots of 256*256 Input, Cipher and Decrypted Red Channel
Dr. AIT logo Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 31


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.19(a): Histogram of Input Green Channel Dr. AIT logo Image

Figure 5.19(b): Histogram of Cipher Green Channel Dr. AIT logo Image

Figure 5.19(c): Histogram of Decrypted Green Channel Dr. AIT logo Image

Figure 5.19: Histogram Plots of 256*256 Input, Cipher and Decrypted Green Channel
Dr. AIT logo Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 32


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

Figure 5.20(a): Histogram of Input Blue Channel Dr. AIT logo Image

Figure 5.20(b): Histogram of Cipher Blue Channel Dr. AIT logo Image

Figure 5.20(c): Histogram of Decrypted Blue Channel Dr. AIT logo Image

Figure 5.20: Histogram Plots of 256*256 Input, Cipher and Decrypted Blue Channel
Dr. AIT logo Image

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 33


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

5.2 Elapsed Time

Elapsed time is the amount of time that passes from the beginning of an event
to its end. MATLAB includes two functions TIC and TOC. If TIC is called before
something is to be timed, and TOC is called afterward, then TOC will either print
the elapsed wall clock time if its value is not being copied to a variable, or return the
value of the elapsed wall clock time to a variable. Elapsed time for the generation of
key sequence of 524288 binary bits is obtained as 4.211753 seconds.

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 34


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

CHAPTER 6
CONCLUSSION AND FUTURE SCOPE
In this work, generation of pseudorandom binary key sequence is implemented
using A5/1 algorithm by MATLAB tool. The obtained sequence has high periodicity
of (219 -1) ( 222 -1)(223 -1). Time elapsed for the generation of key is 4.211753 seconds
for 524288 bits. The obtained stream cipher is used for the application of encryption
and decryption of 256*256 gray scale and colour images. Simple EX-OR operation is
operated between input binary pixel value sequence and the generated key sequence
for encryption process (524288 bits). Similarly, EX-OR operation is operated between
encrypted binary pixel value sequence and the same key sequence for decryption
process (524288 bits). It is seen that the input and the decrypted images appears
identical after encryption and decryption process. The cipher image does not resemble
input image at any point and is unrecognizable. This prevents the outsider to hack the
image information while transmitting through a secured channel from transmitter to
receiver.
Performance of the A5/1 algorithm is analyzed by computing Histogram and
the obtained histogram of encrypted image is fairly uniform and it does not leak any
amount of information about the plain image.
6.1 Future Enhancements
To understand the scope of A5/1 algorithm for stream cipher applications, a
simple image encryption is demonstrated in this work. The applications of espresso
algorithm can also be extended to the following.
 Audio encryption
 Video encryption
 Multimedia data encryption etc.,

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 35


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption

CHAPTER 7
REFERENCES
[1] AlpeshR. Sankaliya, V. Mishra and AbilashMandoli, “ Implementation of
cryptographic algorithms for GSM cellular standard”, GANPUT University
Journal of engineering and technology, Vol-1, issue-1, Jan-June- 2011.

[2] Nikesh Bajaj, “Enhancement of A5/1 using variable feedback polynomials of


LFSR”, 978-1-4577-0240-2/11/, 2011 IEEE.

[3] Sattar B./ Sadkhan, NibrasHadiJavan, “Improvement of A5/1 encryption


algorithm based on using Delay”, University of Babylon college of sciences

[4] NurHarfizaZakaria, KamaruzzamSeman and Ismail Abdullah, “Modified


A5/1 Based Stream Cipher for Secured GSM Communication “, IJCSNS
International Journal of computer science and network security, Vol-11, no-
2, feb-2011.
[5] Musheer Ahmed and Izharuddin, “Enhanced A5/1 Cipher with Improved
Linear Complexity”, impact-2009, 978-1-4244-3604-0-09/, 2009 IEEE

[6] Li Wei Dai Zibin Nan Longmei, “Research and implementation of a high
speed reconfigurable A5 algorithm”, 2008 IEEE Pacific-Asia Woekshop on
Computational Intelligence and Industrial Application, 978-0-7695-3490-
9/08, 2008 IEEE
[7] Marc Briceno, Ian Goldberg and David Wagner, “A pedagogical
Implementation of the A5/1”, 1999

[8] A. Menezes, P, Van Oorschot, and S. Vanstone, “Handbook of Applied


Cryptography”, CRC Press, 1997

[1] AlpeshR. Sankaliya, V. Mishra and AbilashMandoli, “ Implementation of


cryptographic algorithms for GSM cellular standard”, GANPUT University
Journal of engineering and technology, Vol-1, issue-1, Jan-June- 2011.

[2] Nikesh Bajaj, “Enhancement of A5/1 using variable feedback polynomials of


LFSR”, 978-1-4577-0240-2/11/, 2011 IEEE.

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 36


Generation of Random Binary Sequence Using A5/1 Algorithm and its Application in Image
Encryption and Decryption
[3] Sattar B./ Sadkhan, NibrasHadiJavan, “Improvement of A5/1 encryption
algorithm based on using Delay”, University of Babylon college of sciences

[4] NurHarfizaZakaria, KamaruzzamSeman and Ismail Abdullah, “Modified


A5/1 Based Stream Cipher for Secured GSM Communication “, IJCSNS
International Journal of computer science and network security, Vol-11, no-
2, feb-2011.
[5] Musheer Ahmed and Izharuddin, “Enhanced A5/1 Cipher with Improved
Linear Complexity”, impact-2009, 978-1-4244-3604-0-09/, 2009 IEEE

[6] Li Wei Dai Zibin Nan Longmei, “Research and implementation of a high
speed reconfigurable A5 algorithm”, 2008 IEEE Pacific-Asia Woekshop on
Computational Intelligence and Industrial Application, 978-0-7695-3490-
9/08, 2008 IEEE
[7] Marc Briceno, Ian Goldberg and David Wagner, “A pedagogical
Implementation of the A5/1”, 1999

[8] A. Menezes, P, Van Oorschot, and S. Vanstone, “Handbook of Applied


Cryptography”, CRC Press, 1997

M. Tech, VLSI Design and Embedded Systems, 2018-19 Page 37

Vous aimerez peut-être aussi