Skip to main content
Log in

Towards the design of new cryptographic algorithm and performance evaluation measures

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Security and confidentiality are one of the main concerns when transmitting multimedia data over the Internet. To deal with the arising security issues, many advanced cryptographic algorithms have been proposed in the literature. The efficiency of these encryption algorithms varies according to the application area in which they are deployed. Although there are many objective evaluation metrics available in the literature to measure the performance of the cryptographic algorithms, however, to the best of our knowledge, no survey or review addresses the quality of the metrics for cryptography algorithms. In this paper, we have presented and analyzed the cryptography algorithms and performance evaluation metrics such as resource utilization measure, quality measure, and security measures to evaluate the security performance of different encryption algorithms for multimedia data. Extensive experiments have been carried out to evaluate the performance of the cryptography algorithms for multimedia data such as images and videos. We have also discussed and analyzed in detail the performance of evaluation measures used to validate the cryptography algorithms. Our findings highlight the strength of different cryptography algorithms and performance evaluation metrics. The analysis is expected to contribute to the design of a new and efficient model for multimedia applications. A detailed analysis of major attacks was also presented for each encryption scheme in tabular form.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Abbas NA (2016) Image encryption based on independent component analysis and arnold’s cat map. Egyptian informatics journal 17(1):139–146

    Article  Google Scholar 

  2. Adams (1997) Rfc2144: The cast-128 encryption algorithm

  3. Adams C (1999) The cast-256 encryption algorithm

  4. Adams C, Heys HM, Tavares SE, Wiener M (1999) An analysis of the cast-256 cipher. In Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No. 99TH8411), volume 1, pages 361–366. IEEE

  5. Ahmad J, Ahmed F (2010) Efficiency analysis and security evaluation of image encryption schemes. Computing 23:25

    Google Scholar 

  6. Ahmad S, Hayat MF, Qureshi MA, Asef S, Saleem Y (2021) Enhanced halftone-based secure and improved visual cryptography scheme for colour/binary images. Multimedia Tools and Applications 80(21):32071–32090

    Article  Google Scholar 

  7. Ahmed HEldH, Kalash HM, Allah OSF (2007) Encryption efficiency analysis and security evaluation of rc6 block cipher for digital images. In 2007 International Conference on Electrical Engineering, pages 1–7. IEEE

  8. Ahmed N, Asif HMS, Saleem G (2016) A benchmark for performance evaluation and security assessment of image encryption schemes. International Journal of Computer Network & Information Security, 8(12)

  9. Bagherzandi A, Salmasizadeh M, Mohajeri J (2009) A related key attack on the feistel type block ciphers. IJ Network Security 8(3):221–226

    Google Scholar 

  10. Bala T, Kumar Y (2015) Asymmetric algorithms and symmetric algorithms: A review. International Journal of Computer Applications (ICAET), pages 1–4

  11. Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications 9(4):289–306

    Article  Google Scholar 

  12. Biham E, Dunkelman O, Keller N (2008) A unified approach to related-key attacks. In International Workshop on Fast Software Encryption, pages 73–96. Springer

  13. Bin CW, Xin Z (2009) Image encryption algorithm based on henon chaotic system. In 2009 International Conference on Image Analysis and Signal Processing, pages 94–97. IEEE

  14. Bleichenbacher D (1998) Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs# 1. In Annual International Cryptology Conference, pages 1–12. Springer

  15. Burnwick C, Coppersmith D (1999) The mars encryption algorithm. IBM, http://csrc.nist.gov/encryption/aes/round2/AESAIgs/MARS

  16. Charbathia S, Sharma S (2014) A comparative study of rivest cipher algorithms. International Journal of Information and Computation Technology 4(17):1831–1838

    Google Scholar 

  17. Data Encryption Standard et al (1977) Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce, 23

  18. Davida GI (1982) Chosen signature cryptanalysis of the RSA (MIT) public keycryptosystem. Department of Electrical and Computer Science, College of Engineering and’..

  19. Dehkordi MH, Taghizadeh R (2018) Biclique cryptanalysis of full round present with reduced data complexity. Electric Electron Tech Open Acc J 2(2):251–255

    Google Scholar 

  20. Dener M (2014) Security analysis in wireless sensor networks. International Journal of Distributed Sensor Networks 10(10):303501

    Article  Google Scholar 

  21. Elkamchouchi HM, Makar MA (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In: Proceedings of the Twenty-Second National Radio Science Conference, 2005. NRSC 2005., pages 277–284. IEEE

  22. Fan J, Verbauwhede I (2012) An updated survey on secure ecc implementations: Attacks, countermeasures and cost. In Cryptography and Security: From Theory to Applications, pages 265–282. Springer

  23. Fishawy NFE, Zaid OMA (2007) Quality of encryption measurement of bitmap images with rc6, mrc6, and rijndael block cipher algorithms. IJ Network Security 5(3):241–251

    Google Scholar 

  24. Fouque PA, Valette F (2003) The doubling attack–why upwards is better than downwards. In: International Workshop on Cryptographic Hardware and Embedded Systems, pages 269–280. Springer

  25. Girault M, Cohen R, Campana M (1988) A generalized birthday attack. In: Workshop on the Theory and Application of of Cryptographic Techniques, pages 129–156. Springer

  26. Gray RM (2011) Entropy and information theory. Springer Science & Business Media

  27. Gunasundari T, Elangovan K (2014) A comparative survey on symmetric key encryption algorithms. International Journal of Computer Science and Mobile Applications 2(2):78–83

    Google Scholar 

  28. Hong D, Sung J, Hong S, Lim J, Lee S, Koo BS, Lee C, Chang D, Lee J, Jeong K, et al (2006) Hight: A new block cipher suitable for low-resource device. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 46–59. Springer

  29. Hunn SAY, Idris Nb, et al (2012) The development of tiny encryption algorithm (tea) crypto-core for mobile systems. In 2012 IEEE International Conference on Electronics Design, Systems and Applications (ICEDSA), pages 45–49. IEEE

  30. Jang S (2017) Comparative analysis of aes blowfish twofish and threefish encryption algorithms. Anal. Appl. Math. 10:5

    Google Scholar 

  31. Kader HM, Hadhoud MM (2009) Performance evaluation of symmetric encryption algorithms. Performance Evaluation, pages 58–64

  32. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering 27(1):15–43

    Article  MathSciNet  Google Scholar 

  33. Kitsos P, Galanis MD, Koufopavlou O (2004) High-speed hardware implementations of the kasumi block cipher. In: 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No. 04CH37512), volume 2, pages II–549. IEEE

  34. Knudsen LR (1993) Practically secure feistel ciphers. In: International Workshop on Fast Software Encryption, pages 211–221. Springer

  35. Kumari, Manju, Gupta, Shailender, Sardana, Pranshul (2017) A survey of image encryption algorithms. 3D Research 8(4):37

    Article  Google Scholar 

  36. Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET information security 7(4):265–270

    Article  Google Scholar 

  37. Lian S (2008) Multimedia content encryption: techniques and applications. CRC Press

    Book  Google Scholar 

  38. Liehuang Z, Wenzhuo Lejian L, Hong L (2006) A novel image scrambling algorithm for digital watermarking based on chaotic sequences. International Journal of Computer Science and Network Security 6(8B):125–130

    Google Scholar 

  39. Liu Y, Gu D, Liu Z, Li W (2012) Impossible differential attacks on reduced-round lblock. In International Conference on Information Security Practice and Experience, pages 97–108. Springer

  40. Luo Y, Ouyang X, Liu J, Cao L (2019) An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access 7:38507–38522

    Article  Google Scholar 

  41. Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on chua’s circuit and compressive sensing. Signal Processing 161:227–247

    Article  Google Scholar 

  42. Mahajan P, Sachdeva A (2013) A study of encryption algorithms aes, des and rsa for security. Global Journal of Computer Science and Technology

  43. Mandal AK, Tiwari A (2012) Analysis of avalanche effect in plaintext of des using binary codes. International Journal of Emerging Trends and Technology in Computer Science (IJETTCS) 1(3):166–177

    Google Scholar 

  44. Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B (2008) Quisquater JJ (2008) Overview on selective encryption of image and video: challenges and perspectives. Eurasip Journal on information security 1:179290

    Google Scholar 

  45. Milad AA, Muda Z, Noh ZABM, Algaet MA (2012) Comparative study of performance in cryptography algorithms (blowfish and skipjack). Journal of Computer Science 8(7):91

    Google Scholar 

  46. Mohammad Farook O, Rahim Mohd MS, Zeebaree Mohammed SR, Ahmed FY (2017) A survey and analysis of the image encryption methods. International Journal of Applied Engineering Research 12(23):13265–13280

    Google Scholar 

  47. Mohan HS, Reddy AR (2011) Performance analysis of aes and mars encryption algorithms. International Journal of Computer Science Issues (IJCSI) 8(4):363

    Google Scholar 

  48. Moriai S, Yin YS (2000) Cryptanalysis of twofish (ii)

  49. Mushtaque MdA, Dhiman H, Hussain S, Maheshwari S (2014) Evaluation of des, tdes, aes, blowfish and two fish encryption algorithm: based on space complexity. International Journal of Engineering Research & Technology (IJERT), 3(4)

  50. Naeemabadi M, Ordoubadi BS, Dehnavi AM, Bahaadinbeigy K (2015) Comparison of serpent, twofish and rijndael encryption algorithms in tele-ophthalmology system. Advances in Natural and Applied Sciences 9(4):137–150

    Google Scholar 

  51. Nie T, Zhang T (2009) A study of des and blowfish encryption algorithm. In: Tencon 2009-2009 IEEE Region 10 Conference, pages 1–4. IEEE

  52. Padmavathi B, Kumari SR (2013) survey on performance analysis of des, aes and rsa algorithm along with lsb substitution. IJSR, India

    Google Scholar 

  53. Pandey A, Som S (2016) Applications and usage of visual cryptography: A review. In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pages 375–381, Sep

  54. Patil P, Narayankar P, Narayan DG, Meena SMd (2016) A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa and blowfish. Procedia Computer Science 78:617–624

    Article  Google Scholar 

  55. Preishuber Mario, Hütter Thomas, Katzenbeisser Stefan, Uhl Andreas (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13(9):2137–2150

    Article  Google Scholar 

  56. Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded iot devices. Symmetry 11(2):293

    Article  Google Scholar 

  57. Rasoolzadeh S, Ahmadian Z, Salmasizadeh M, Aref MR (2016) An improved truncated differential cryptanalysis of klein. Tatra Mountains Mathematical Publications 67(1):135–147

    Article  MathSciNet  Google Scholar 

  58. Rawat N, Kim B, Kumar R (2016) Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Optik 127(4):2282–2286

    Article  Google Scholar 

  59. Raza Fatima S, Satpute Vishal (2019) A novel bit permutation-based image encryption algorithm. Nonlinear Dynamics 95(2):859–873

  60. Rijmen V, Daemen J (2001) Advanced encryption standard. Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technologys, pages 19–22

  61. Rinne S, Eisenbarth T, Paar C (2007) Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers. In Ecrypt Workshop SPEED, pages 33–43. Citeseer

  62. Saher M, Amin A, Qureshi IA, Qureshi MA, Jawaid MM (2018) Efficient advanced encryption standard for securing cognitive radio networks. Mehran University Research Journal of Engineering and Technology 37(4):645–654

    Article  Google Scholar 

  63. Saito T (2011) A single-key attack on 6-round kasumi. IACR Cryptol. ePrint Arch. 2011:584

    Google Scholar 

  64. Saleh, Matasem, Jhanjhi, NZ and Abdullah, Azween, Saher, Raazia (2021) Proposing encryption selection model for IoT devices based on IoT device design. In: 2021 23rd International Conference on Advanced Communication Technology (ICACT), pages 210–219. IEEE

  65. Schneier B (1996) Applied cryptography second edition

  66. Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1998) Twofish: A 128-bit block cipher. NIST AES Proposal 15(1):23–91

    Google Scholar 

  67. Shah D, Shah T (2020) A novel discrete image encryption algorithm based on finite algebraic structures. Multimedia Tools and Applications 79(37):28023–28042

    Article  Google Scholar 

  68. Shah J, Saxena V (2011) Performance study on image encryption schemes. arXiv:1112.0836

  69. Shannon CE (1949) Communication theory of secrecy systems. Bell system technical journal 28(4):656–715

    Article  MathSciNet  Google Scholar 

  70. Shetty A, Shravya K, Krithika K (2014) A review on asymmetric cryptography rsa and elgamal algorithm. Int. J. Innovative. Res. Comput. Commun. Eng. 2(5):98–105

    Google Scholar 

  71. Sindhuja K, Devi SP (2014) A symmetric key encryption technique using genetic algorithm. International journal of computer science and information technologies 5(1):414–416

    Google Scholar 

  72. Soomro S, Belgaum MR, Alansari Z, Jain R (2019) Review and open issues of cryptographic algorithms in cyber security. In: 2019 International Conference on Computing, Electronics & Communications Engineering iCCECE), pages 158–162. IEEE

  73. Stallings W (2017) Cryptography and network security: principles and practice. Pearson Upper Saddle River

  74. Surendran S, Nassef A, Beheshti BD (2018) A survey of cryptographic algorithms for iot devices. In 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pages 1–8. IEEE

  75. Trad A, Bahattab AA, Othman SB (2014) Performance trade-offs of encryption algorithms for wireless sensor networks. In: 2014 World Congress on Computer Applications and Information Systems (WCCAIS), pages 1–6. IEEE

  76. Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  77. Yingbing, Zhou, Yongzhen, Li (2014) The design and implementation of a symmetric encryption algorithm based on DES. In 5th International Conference on Software Engineering and Service Science, pages 517–520. IEEE

  78. Zeghid M, Machhout M, Khriji L, Baganne A, Tourki R et al (2007) A modified aes based algorithm for image encryption. International Journal of Computer Science and Engineering 1(1):70–75

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Ali Qureshi.

Ethics declarations

Competing interests

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farooq, A., Tariq, S., Amin, A. et al. Towards the design of new cryptographic algorithm and performance evaluation measures. Multimed Tools Appl 83, 9709–9759 (2024). https://doi.org/10.1007/s11042-023-15673-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15673-7

Keywords

Navigation