BENCH-MARKING OF TRADITIONAL CRYPTOGRAPHIC ALGORITHMS AND CHAOS-BASED ALGORITHMS
Catalogado desde la version PDF de la tesis.
SECURITY is one of the most popular concepts used in the IT industry nowadays. Due to the proliferation of smart devices, internet consumption, social networks and new communication apps; users have been requesting new security services that ensure a minimum level of confidentiality at the moment to share information between them by using phone call, text message, voice message and images. This has become especially important for image sharing, due to the high level of private information which usually have. For this purposes, the researchers have been proposing novel encryption methods, which fulfill with the minimum security level required, but at the same time be optimal in speed performance. However, there are no comparative studies about the security and performance of chaos-based cryptosystems with traditional encryption schemes for high loaded data ciphering, that conclude which one is the suitable option for this purposes. This thesis present to the scientific community an holistic study about chaosbased cryptosystems with DNA operations and traditional symmetric encryption schemes. This work consist in the implementation of 10 chaos-based encryption algorithms with DNA operations in Matlab, in order to evaluate and compare their security properties and performance with the two most used symmetric encryption schemes, AES and 3DES. The scope of the analysis presented in this study is based on the application of these cipher schemes for image encryption purposes. This thesis is structured in five chapters. We begin in Chapter 1 describing a brief context about cryptography and how this discipline have been evolving through the pass of the years. In Chapter 2, we present the main characteristic of AES and 3DES, and then we describe the encryption process and the operation modes with which both algorithms can works. In Chapter 3, a basic background of dynamical system is introduced, including their definition, properties and behavior, to later describe what is chaos and their application forencryption purposes. In Chapter 4 we present the methodology of the benchmarking and the result obtained from the simulations. Finally, in Chapter 5 the conclusions of this work are presented.