Evaluation of The Encryption Quality of an Insar Interferogram by a Crypto-System Based on Two AES-256 and RSA Algorithms with CTR and OFB Modes
AUTHORS
Riad Saidi,Laboratory of electrical engineering-telecommunications (LABGET), Constantine Street 12002, Larbi Tébessi University, Tébessa, Algeria
Nada Cherrid,Electronic Department, CUB- Street Chahid BOUKHLOUF Mustapha ben boulaid Batna 2 University, Batna, 05000, Algeria
Tarek Bentahar,Laboratory of electrical engineering-telecommunications (LABGET), Constantine Street 12002, Larbi Tébessi University, Tébessa, Algeria
Atef Bentahar,Laboratory of Mathematics, Informatics and Systems (LAMIS), Constantine Street 12002, Larbi Tébessi University. Tébessa, Algeria
ABSTRACT
Many threats in turn transmit images from satellites to Earth which can affect the confidentiality of the data as well as its qualities. From this encryption algorithms capable of securing the transmitted images are used, to preserve the quality of origins. The satellite images often have a large volume and high redundancy. At the same time, the satellites work under tight limitations in terms of computing power and resources. In addition to that, it operates in a harmful environment and therefore, any electronics used onboard, including encryption electronics, may exhibit radiation-induced defects. Our objective in this work is to assess the quality of a particular type of satellite image, which is an interferogram from the InSAR system, encrypted using the AES-256 standard and the RSA asymmetric encryption algorithm using Counter-mode encryption (CTR) mode and Output Feedback (OFB) mode. The evaluation work covered, it’s accomplished using different metrics, based on an objective evaluation with the methods using a complete reference image which is the original interferogram, the quantitative measures used are: The Mean Square Error (MSE), the Peak Signal to Noise Ratio (PSNR), Structural SIMilarity index (SSIM). Other statistical analyzes are used such as: the analysis of the original, encrypted and decrypted interferogram histogram, the entropy and the correlation coefficient between the adjacent pixels, the correlation between the original interferogram and the encrypted interferogram for the two modes under AES-256, as well as encryption speed, and execution time.
KEYWORDS
Interferogram quality assessment, Advanced encryptions standard (AES-256), SSIM, CTR and OFB mode
REFERENCES
[1] Bensikaddour. E, “Développement d'un cryptosystème basé sur le standard AES et la théorie du chaos pour le chiffrement des images satellitaires à bord d'un satellite d'observation de la terre,” Ph.D. dissertation in Sciences, pp.6-37 (2019)
[2] El-Samie. F. E. A, Ahmed. H. E. H, Elashry. I. F, Shahieen. M. H, Faragallah. O. S, El-Rabaie. E.-S. M, and Alshebeili, S. A, “Image encryption: A communication perspective,” CRC Press, (2013)
[3] P. A, Rosen. S, Hensley. I. R, Joughin. F. K, Li. S, N. Madsen, E. Rodriguez, R. M, Goldstein, “Synthetic aperture radar interferometry,” IEEE Proceedings, vol.88, no.3, pp.333-382, (2000)
[4] Bamlery.R, and Hartl. P, “Synthetic aperture radar interferometry Synthetic aperture radar interferometry, Inverse Problems,” vol.14, pp.1-54, (1998)
[5] Yu .H, Y. Lan. Y, Yuan. Z, Xu. J, Lee. H, “Phase Unwrapping in InSAR: A Review,” IEEE Geoscience and Remote Sensing Magazine, vol.7, no.1, pp.40-58, (2019)
[6] FIPS Publication 197, “Advanced Encryption Standard (AES),” National Institute of Standards and Technology, US Department of Commerce, (2001)
[7] Dumont. R, “Cryptographie et Sécurité informatique,” Notes de cours, Université de Liège Faculté des Sciences Appliqués, pp.63-68, (2010)
[8] Rivest. R., Shamir. A, and Adleman. L, “A method for obtaining digital signatures and public-key cryptosystems,” communications of the ACM, vol.21, no.2, pp.120-126, (1978)
[9] Douglas. R.Stinson, “Cryptography: Theory and practice (7th ed.) ,” Chapman & Hall/ CRC, (2005)
[10] Peng. J, You. M, Yang. Z, and Jin. S, “Research on a block encryption cipher based on chaotic dynamical system,” Publisher: IEEE, Third International Conference on Natural Computation, Haikou, China, Aug 24-27, (2007)
[11] Sharing Earth Observation Resources.https://directory.eoportal.org/web/eoportal/satellite-missions, (2018)
[12] Pahal. R, Kumar, Vikas, “Efficient Implementation of AES,” International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, no.7, (2013)
[13] Fathi, E.A.S., H Ahmed, Elashry, I.F., Shahieen, M.H., Faragallah, O.S. Image Encryption A Communication Perspective (1st ed.). Boca Raton [Florida]: CRC Press, (2013).DOI:10.1201/b16309 (CrossRef)(Google Scholar)
[14] Nigel. P, Smart. Rijmen. V, Gierlichs. B, Paterson. K.G, Stam. M, Warinschi. B, Watson. G, “Algorithms key size and parameters,” report 2014. European Union Agency for Network and Information Security (ENISA), (2014).
[15] Bensikaddoura. E, Bentoutoua.Y, and Talebb. N, “Satellite Image Encryption Method Based On AES-CTR algorithm and GEFFE generator,” Publisher: IEEE, 8th International Conference on Recent Advances in Space Technologies (RAST), Istanbul, Turkey, 19-22 June, (2017)
[16] Dumas. J-G, Roch. J-L, Tannier. É, and Varrette. S, “Théorie des codes compression, cryptage, correction,”, Dunod, Paris, pp.38-41, (2007)
[17] Stavroulakis. P, and Stamp. M, “Handbook of information and communication security,” Springer Science & Business Media, pp.569-608, (2010)
[18] Burr. W. E, “Selecting the advanced encryption standard,” IEEE Security & Privacy, vol.1, no.2, pp.43-52, (2003)
[19] CCSDS. 350.9-G-1, “Ccsds cryptographic algorithms,” blue book, (2019)
[20] Preethi. M, Nithya. M, “Study and performance of RSA algorithm,” International Journal of Computer Science and Mobile Computing, vol.2, no. 6, pp. 126-139, (2013)
[21] Ahmed seghir. Z, “Evaluation de la qualité d’image,” Doctoral thesis, Université de Mentouri, Constantine, Algerie, (2012)
[22] Wang. Z, Bovik. A.C, Sheikh. H. R, and Simocelli. E. P, “Image quality asssessment:From error measurement to structural similarity,” IEEE Trans. Image Processing, vol.13, no.4, pp.600-612, (2004)
[23] El-Samie. F. E. A, Ahmed. H. E. H, Elashry. I. F, Shahieen. M. H, Faragallah. O. S, El-Rabaie. E.-S. M, and Alshebeili. S. A, “Image encryption: A communication perspective,” CRC Press taylor and francis Group, New York, pp.33-34, (2013)
[24] Patila. P, Narayankarb. P, Narayan. D.G, Meena. S.M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” Published by Elsevier B.V, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, India, (2016)
[25] Mansour. I, Chalhoub. G, and Bakhache. B, “Evaluation of a fast-symmetric cryptographic algorithm,” IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, June 25-27, (2012)