Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption

Similar documents
Image Encryption Based on the Modified Triple- DES Cryptosystem

Bijective Function with Domain in N and Image in the Set of Permutations: An Application to Cryptography

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Generic Attacks on Feistel Schemes

Diffie-Hellman key-exchange protocol

Chapter 4 The Data Encryption Standard

Generic Attacks on Feistel Schemes

4. Design Principles of Block Ciphers and Differential Attacks

Classification of Ciphers

ElGamal Public-Key Encryption and Signature

The number theory behind cryptography

New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256

Block Ciphers Security of block ciphers. Symmetric Ciphers

V.Sorge/E.Ritter, Handout 2

Differential Cryptanalysis of REDOC III

DUBLIN CITY UNIVERSITY

Lecture 1: Introduction

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking.

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Chapter 4 MASK Encryption: Results with Image Analysis

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Number Theory and Security in the Digital Age

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Cryptanalysis of Ladder-DES

Design of a High Throughput 128-bit AES (Rijndael Block Cipher)

Fermat s little theorem. RSA.

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

A Novel Color Image Cryptosystem Using Chaotic Cat and Chebyshev Map

Some Cryptanalysis of the Block Cipher BCMPQ

Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive

DES Data Encryption standard

Image Encryption with Dynamic Chaotic Look-Up Table

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

CDMA Physical Layer Built-in Security Enhancement

A Secure Image Encryption Algorithm Based on Hill Cipher System

CRYPTANALYSIS OF THE PERMUTATION CIPHER OVER COMPOSITION MAPPINGS OF BLOCK CIPHER

MA/CSSE 473 Day 9. The algorithm (modified) N 1

EE 418 Network Security and Cryptography Lecture #3

Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers);

Conditional Cube Attack on Reduced-Round Keccak Sponge Function

Classical Cryptography

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Understanding Cryptography: A Textbook For Students And Practitioners PDF

Data security (Cryptography) exercise book

DUBLIN CITY UNIVERSITY

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

Introduction to Cryptography CS 355

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Vadnala

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Math 319 Problem Set #7 Solution 18 April 2002

AES Encryption and Decryption in Microsoft.NET

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh

A Cryptosystem Based on the Composition of Reversible Cellular Automata

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

EE 418: Network Security and Cryptography

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

M.E(I.T) Student, I.T Department, L.D College Of Engineering, Ahmedabad, Gujarat, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India. P = [ p

Introduction to Coding Theory

MA 111, Topic 2: Cryptography

An Integrated Image Steganography System. with Improved Image Quality

Proceedings of Meetings on Acoustics

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Algorithmic Number Theory and Cryptography (CS 303)

Security Enhancement and Speed Monitoring of RSA Algorithm

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

Enhance Image using Dynamic Histogram and Data Hiding Technique

CHAPTER 2. Modular Arithmetic

A Fast Image Encryption Scheme based on Chaotic Standard Map

Public-key Cryptography: Theory and Practice

Eliminating Random Permutation Oracles in the Even-Mansour Cipher. Zulfikar Ramzan. Joint work w/ Craig Gentry. DoCoMo Labs USA

Pattern Avoidance in Unimodal and V-unimodal Permutations

Math 58. Rumbos Fall Solutions to Exam Give thorough answers to the following questions:

In Response to Peg Jumping for Fun and Profit

Permutation Generation Method on Evaluating Determinant of Matrices

EXPLAINING THE SHAPE OF RSK

Alternative forms of representation of Boolean functions in Cryptographic Information Security Facilities. Kushch S.

Generation of AES Key Dependent S-Boxes using RC4 Algorithm

TMA4155 Cryptography, Intro

Free Downloads Introduction To Cryptography With Coding Theory

1111: Linear Algebra I

Math 1111 Math Exam Study Guide

A Novel Encryption System using Layered Cellular Automata

i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly Generated Bitmap Image

Image Enhancement in Spatial Domain

New binary image encryption algorithm based on combination of confusion and diffusion

Image permutation scheme based on modified Logistic mapping

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Image Encryption Based on New One-Dimensional Chaotic Map

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8)

DIGITAL IMAGE PROCESSING Quiz exercises preparation for the midterm exam

Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.

Fast identification of individuals based on iris characteristics for biometric systems

Example Enemy agents are trying to invent a new type of cipher. They decide on the following encryption scheme: Plaintext converts to Ciphertext

Synthesis and Analysis of 32-Bit RSA Algorithm Using VHDL

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES AN EFFICIENT METHOD FOR SECURED TRANSFER OF MEDICAL IMAGES M. Sharmila Kumari *1 & Sudarshana 2

One-Sample Z: C1, C2, C3, C4, C5, C6, C7, C8,... The assumed standard deviation = 110

Transcription:

Applied Mathematical Sciences, Vol. 7, 2013, no. 23, 1143-1155 HIKARI Ltd, www.m-hikari.com Triple-DES Block of 96 Bits: An Application to Colour Image Encryption V. M. Silva-García Instituto politécnico Nacional Centro de Innovación y Desarrollo Tecnológico En Cómputo vsilvag@ipn.mx R. Flores-Carapia Instituto politécnico Nacional Centro de Innovación y Desarrollo Tecnológico En Cómputo rfloresca@ipn.mx C. Rentería-Márquez Instituto politécnico Nacional Escuela Superior de Física y Matemáticas crenteriam@gmail.com Abstract According to international standards, FIPS PUB 146-3, the cryptographic system Triple-Data Encryption Standard (Triple DES) encrypts blocks of 64 bits. However, it isn t difficult to extend the block to 96-bit encryption, which is called Triple-DES-96. This change includes a modification to Triple-DES cryptosystems that appeared recently as the Advanced Encryption Standard - AES - FIPS PUB 197. Including encryption, file M (with bits) is achieved in less time than Triple-DES. Developing Triple DES-96, intends to apply the Factorial Theorem

1144 V. M. Silva-García, R. Flores-Carapia and C. Rentería-Márquez that for this particular case tells us that any permutation on an array of 96 positions can be constructed from 3 permutations on arrays of 64 positions. According to Theorem JV, a given number with 0 64! - 1 10 89, can associate a permutation of 64 positions in 63 steps. This allows applying a variable permutation on an array of 96 positions at the start of the third round, using 3 numbers with 0 10 89 and for 1, 2, 3, instead of using numbers 0 96! - 1 10 150 for permutations on arrays of 96 positions directly. The algorithm illustrates Triple-DES-96 encryption images in colour, which is carried out without loss of information, that is, does not apply JPEG formats. There is a criterion of how many permutations have to be applied; also a randomness measure of the encrypted image for χ 2 value is used. Keywords: Theorem JV, Chi-square, Triple-DES-96, Colour Image Encryption, Factor Theorem, Variable permutation, χ 2 distribution 1. Introduction The Triple-DES encryption processes begins by applying a fixed permutation on blocks of 64 bits [6], however, in this paper blocks of 96 bits are encrypted, also a permutation input variable in the third round is applied, and its inverse at the end of the encryption process. In addition the arguments of why the process Triple- DES encryption, with two keys [1], is slower than Triple-DES-96, with two keys too, are given below and for obvious reasons, the encryption of a file will be done in fewer steps when using Triple-DES-96 than using Triple-DES. Considering the above factors, the result is a faster encryption when using Triple- DES-96. Another issue relevant to point out is that in every image there are, sometimes, areas of the same colour. Then, when this area is encrypted keeping keys and the permutation fixed resulting in a same colour, this allows the formation of contours which could provide information. This is the argument described in more detail later, and why variable permutations are involved at the entrance to the third round. Also, the complexity is benefited because if decoding an image is desired with different permutations from those used for encryption, while maintaining all other fixed parametres including 56 bits keys; this does not obtain the original image. This research does not present a formal proof of increased computational complexity. In another vein, the creation of variable permutations will be through the algorithms used in Theorems JV [15] and Factorial [14]. Specifically, it is made from 3 with 0 64! - 1 for 1 3

Triple-DES block of 96 bits 1145 which are chosen randomly. In addition, an increase of 1 Δ < 64! - 1 to differentiate one permutation from another. An important question to solve is how will we know if an encrypted image has an appropriate random distribution quality, of the three basic colour tones? One way to solve this is by the goodnessof-fit test χ 2 [16] as a measure of randomness degree in the distribution of the different colour shades. The goodness-of-fit test gives a criterion for deciding when to reject an encrypted image that does not comply with some degree of randomness. Also, the normal distribution is used [7] as an approximation to the Chi-Square. 2. Triple-DES-96 and Goodness-of-Fit Test This section begins by answering the following question: how is the Triple-DES- 96 algorithm defined? It is enough to give a cycle description, i.e. a description of the DES-96 algorithm. Let's say that the relationship between DES and Triple- DES is the same as that between DES-96 and Triple-DES-96. The cycle of DES- 96 encryption is denoted as follows: ( ) where is the plaintext of 96 bits and is the key of 56 bits. The following will describe the round -th, where 1, 2..., 16. The ( ) function of DES-96 is different from the ( ) function of DES. The ( ) function performs the following steps: 1. - Execute the x-or operation Input, where the chain is 48 bits long and is the -th scheduled key that is also a string of 48 bits. 2. - The 48-bit Input string is the entrance to the boxes (8 totals) where it follows the DES substitution rule. The output of the boxes is a 32-bit called C. 3. - The expansion permutation E of the DES algorithm [3], to chain C is applied. The result is ( ) E(C) a 48 bits string long. To get left Block performs in the same way as DES, i.e, the left block, and the right block produces ( ). Another difference between DES-96 and DES is that DES-96 applies a permutation at the beginning of the third round, and not at the start of the cycle as the DES algorithm encryption is performed. Having defined a round, in general terms the structure of the DES-96 algorithm can now be described. The DES-96 algorithm is developed in 16 rounds, the input blocks in each round are halved, resulting in 2 strings of 48 bits, and with 0,1..., 16; regarding, as

1146 V. M. Silva-García, R. Flores-Carapia and C. Rentería-Márquez the plaintext. Subsequently ( ) function is applied with the result that the ( ) function x-or operation is performed with left block to get right block. To end a standard round, the left block. The last round will have, blocks, which are exchanged, obtaining,. Next, the inverse permutation at the start of the third round to, is applied, giving the ciphertext ( ). The schedule keys are generated the same way as DES, that is, part of a chain of 64 or 56 bits to obtain a 16 chain keys program of 48 bits each, following the same steps as the DES algorithm. Then, in the same way as Triple-DES is built from DES, Triple-DES-96 is defined as 3 cycles of DES-96, with 2 keys [1]. Specifically, the first cycle uses the DES-96 encryptation algorithm with key and the second cycle carries out the DES-96 decryption algorithm with the key and the third cycle repeats the DES-96 encryptation algorithm again with key. It was mentioned above that Triple- DES-96 included an amendment that appears in recent cryptosystems such as AES [8]. This is because Triple-DES-96 starts with an x-or operation:. The difference with AES is that it performs between strings of 128 bits and Triple-DES-96 runs with strings of 48 bits. Regarding the difference in encryption time, "roughly", between Triple-DES-96 and Triple-DES the following reasoning is based: 1. - For modern computers running 64-bit words there is virtually no difference between working with blocks of 48 bits, or working with blocks of 32 bits. 2. - The DES-96 cryptosystem eliminates the P permutation on an array of 32 positions that performs the DES algorithm to the output of the boxes. Based on the above 2 points, it is generally assumed that the Triple-DES-96 encryptation time is lower than Triple-DES. So, if an M size file (M number of bits) Triple-DES encrypts it at time, it follows that Triple-DES-96 will encrypt it in a time less than 2/3( ) approximately. To reinforce this statement, a 13732 Mb file was encrypted using Triple-DES-96 and Triple-DES. The Triple-DES-96 time spent was less than 2/3( ), where is the time consumed by Triple-DES. Another question to resolve is, why does the variable permutation apply in the third round of the cycle of Triple-DES-96 encryption algorithm? It is known that each pixel is represented by three bytes, in the case of colour images, so that a block of 96 bits contains 4 pixels. Then it is clear that in an image with only 2 colours, white or black, the input strings of the encryptation process are as following: 11 1 or 00 0 where each of these chains are 4 pixels long. In this connection any initial

Triple-DES block of 96 bits 1147 permutation, whatever, does not alter it in any way. It follows that the first point where zeros and ones are mixed is at the exit of the second round, or the entry to the third round. Furthermore, it can easily be seen that it is not necessary to apply the input string to the third round of the permutation; in fact, it may be applied to the input of the fourth, fifth or any other of the first cycle. Then the argument why in this work the entrance to the third round is used is basically the following: it is the first round in which the input string complies with the condition of having a mixture of zeros and ones. Thus, it follows that any changes made to the permutation in this chain, will have more rounds to mix the information. Remember that the Feistel function [5], together with the program keys works mainly by mixing information in each round. Another important issue to clarify is under what criteria a picture as a model for encryption is chosen. First a couple of issues that are important must be pointed out. The first relates to the following: given that any pixel can be broken down into 3 basic colours: red, green or blue, and for each of these primary colours there are 256 shades or tones. The graphical representation of these different colour levels can be made by means of a histogram, where the abscissa has 768 different levels. In this sense the variable [( ) ], where is the observed value and is the expected value, having a χ 2 distribution with 767 degrees of freedom. The second refers to a value characteristic of a χ 2 goodness-of-fit test that tells whether the distribution of tones in the 3 basic colours are perfectly random, the histogram would follow a uniform distribution and χ 2 0. However, if the χ 2 value is too large it means that the colours have a defined order. So, the answer to the question under what criteria you choose the image is the following: It is an image that has a χ 2 value as large as possible. For example, images from giraffes, lions, rectangles, pictures or text could be chosen. This paper uses a text image with a χ 2 199118882.55; this image is presented below:

1148 V. M. Silva-García, R. Flores-Carapia and C. Rentería-Márquez Figure 2.1: Image to be encrypted, of dimensions 673 x 526 pixels It is understood in this research that the previous image is encrypted, if the goodness-of-fit test of the different histogram tones of the 3 basic colours, 768, accepts the null hypothesis. The null hypothesis is one that states that the frequency histogram of the different tones of the 3 basic colours follows a uniform distribution, against the alternative that this is not true. On the other hand, the hypothesis testing problems has 2 kinds of errors, namely, which are committed when the null hypothesis is rejected being true and, when the null hypothesis is accepted being false. The first of these errors is called "Type I error" and other "Type II error" [16]. The error control is Type I; usually for this error values of 0.1, 0.05 or 0.01 are given. Then, in decision making to accept or reject the null hypothesis using a limited number on the right tail of the χ 2 distribution is associated with α 0.1, 0.05 or 0.01. Because the tones of the 3 basic colours taken in the construction of the histogram are 768, it follows that the degrees of freedom χ 2 distribution is 767. So, the normal distribution with μ 767 and σ

Triple-DES block of 96 bits 1149 [2(767)] 1/2 can be considered a good approximation to the χ 2 with 767 degrees of freedom, according to Central Limit Theorem [7]. It follows that the thresholds for variable χ 2, taking into account the alphas 0.1, 0.05 and 0.01 respectively are the following: 817.9, 831.6 and 858.6. The null hypothesis is rejected for values greater than the χ 2 thresholds depending on the value of alpha. On the other hand, taking the value α 0.1 for Type I error would mean that it requires more evidence to accept the null hypothesis, according to the data if we take any of the other 2 values based on the following reflection: it is clear that the quality of the encrypted image is directly related, with a correct adjustment frequency histogram of the straight line, that is, the variable χ 2 [( ) ] must be a small as possible positive quantity. In this regard, it is said that in the case of α 0.1 it requires further evidence that the histogram frequencies are closer to the line, than in the case of α 0.05 or 0.01. Below a comparative table is reported under certain conditions for the alpha values reported previously. Now the worst scenarios are discussed, i.e those in which the permutations that are applied to the input string to the third round do not produce any change. This can occur when there are schemes in which strings are zeros or ones, but before doing this analysis some assumptions are necessary. Suppose that the values taken by the bits, 0 or 1, at any position in the chain are independent of each other, moreover, are considered with equal probability, that is, can be 0 or 1 with a probability of ½, then the likelihood of positions ranging from 0 to 93 are all 0 or 1 and can be calculated with the Bernoulli model [13], thus it can be expressed as: 2[(1/2) 96 ] 2.4(10) -29. In this sense, it can be concluded that the possibility of occurrence of the worst case scenario is almost zero. It is clear that this should be avoided because the permutation would not work. In short, the worst scenarios happen when the input strings to the third round are zeros or ones, which occurs with a probability 2.4(10) -29 approximately. Finally, the pattern of varying permutations offers noise necessary to encrypt the picture, if applied as a different permutation for each input block to the third round, so most likely the encrypted strings will be different, and therefore, if there are contours they will disappear. 3. Proof that algorithm Triple-DES-96 defines a one to one function It is important that with the encryption algorithms there are no collisions, in other words, the encryption algorithm defines a one to one function. So it will be

1150 V. M. Silva-García, R. Flores-Carapia and C. Rentería-Márquez necessary to show that Triple-DES-96 also defines this. Suffice to show that DES96 defines a one to one function, since if f, g are two one to one functions, then f g "composite function" also applies. Furthermore, the DES algorithm has the same property [3], however, if DES defines a one to one function, it does not follow immediately that the DES-96 algorithm also does, because there are differences between them. In order to solve the problem this is proved in the next theorem: Theorem. - The DES-96 algorithm described above defines a one to one function. The proof is by the method of reductio ad absurdum. ( ) Proof: Suppose there are two different plaintexts and ( ), i.e,. Then if, it follows that and, i.e left and right blocks in the sixteenth round are equal. It also appears ( ), ( ) which is the same key, therefore from is equal for both encrypted texts. If the latter is so, then it is not difficult to show that and. If this reasoning is kept, the result at the end is and, which means that, though the latter result contradicts the ( ) ( ). hypothesis. It is concluded that if, then 4. Results Presentation There are 3 aspects that remain to be resolved in this investigation. The first is related to the criterion that tells how many permutations should be applied, which depends on the image size chosen. The authors consider that a different permutation has to be applied for each 96 bits block encryption as was written above; with the aim that encrypted blocks distribution have to be close to randomness. Furthermore the plaintext blocks are 96 bits. As in this case there are pixels, it follows that a permutation can encrypt 4 of them, and then the number of permutations can be expressed as: (No. of pixels) / 4 In case the last block length is greater than 1 and less than 96 bits it is not encrypted. The second problem to be solved is the fact that with 2 different sets of 3 positive integers, one can obtain the same permutation [14]. This difficulty can be resolved if restricting the maximum values of positive integers to 0 35 32! - 1 2.63 (10), which means that a permutation is applied to each sub-

Triple-DES block of 96 bits 1151 string of 32 bits. It is clear that in working this way any permutation is not repeated. But it has a cost as in this second stage because the total of permutations shall be [2.63 (10) 35]3 1.8 (10)106 instead of 96! - 1 (10)150. However, the number of permutations 1.8 (10)106 are good enough to carry out the task of randomizing the tones of the 3 basic colours: red, green and blue. The third relates to the difference between one permutation and another, i.e the increment. This can be achieved because it is possible to associate a permutation to a positive integer [15], thus, it can be defined as the increment concept. It was decided in this investigation, for simplicity, to apply the same increase for numbers with 1, 2, 3, however it could be different in each case. Therefore, the 3 positive integers to construct the permutation on the array of 96 positions will be as follows: +, + and + with 1, 2 Also, it is clear that 0 + 35 2.63 (10) for 1, 2, 3. As can be seen, there are two variables to control. The authors chose to regard the 3 integers as 0 (10)28 and the increment Δ (10)28, this last, considering images up to 4000000 pixels, which would have 1000000 permutations and c Δ 1034. Example 4.1. It ciphers the Figure 2.1 image for the particular values of the following six-fold. n1 5454545412121212121965481043 n2 4554645121215454021221197613 n3 6545645154545487454553298601 K1 0123456789ABCDEF K2 FEDCBA9876543210 Δ 1230211454021545421215487401 The number of permutations is 88499, and for these 6 values χ2 739.22. The encrypted graph which includes 256 tones for each of the basic colours: red, green and blue are shown below.

1152 V. M. Silva-García, R. Flores-Carapia and C. Rentería-Márquez Figure 4.1: Encrypted image of figure 2.1 with the six-fold given above The basic colours distribution histogram of figure 4.1 is presented next: Figure 4.2: Basic colours distribution of figure 4.1 At the beginning of this research the varying permutation reinforcing Triple- DES-96 cryptosystem was written, although this work does not show how it is reinforced. It may be said that if an image is encrypted with the features cited

Triple-DES block of 96 bits 1153 above; 3 numbers approximately 10 28, an increment Δ around 10 28, the keys, and the number of permutations, when decoding the image desired knowing the Δ, the keys, and the number of permutations that were used, and only change one of the the result is not the original image, that is, it requires more information to decipher. In this sense the variable permutations reinforce the Triple-DES-96 cryptosystem. The time consumed to encrypt the image of Figure 2.1, according to the requirements imposed on the sextuple is about 9 seconds. This with a Pentium IV commercial processor, single core and 2 GB of RAM, the software was developed in C + +. In the works [17,9] there are encrypted images, but there is no mention of specifically robustness, or complexity to solve before a brute force attack. In our case, the proposed cryptosystem is at least a complexity to a brute force attack of 2 112. The proposed symmetric cryptosystem is faster than asymmetric cryptosystems known for encryption images, such as RSA [12], ElGamal [4] or Elliptic Curve [10]. Another question answered in this investigation is to determine what percentage of times the null hypothesis is rejected, taking into account the thresholds of each of the Type I Error levels. In this connection, 45000 pseudorandom items in the following sextuple: (,,,,, Δ) are chosen to encrypt the image in Figure 2.1. With the numbers, and a variable permutation on a string of 96 positions is built. In addition, the order of each is about 10 28., are 2 keys of 56 bits each, and Δ is an increase of about 10 28. Besides, these percentages are reported to increase from 15000 runs each to reach 45000, in order to observe the stability of this data. Below is a table with this data: Type I Error Threshold for 15000 runs 30000 runs 45000 runs Level Rejection 0.1 817.9 0.0982 0.0965 0.097 0.05 831.6 0.0531 0.0521 0.0521 0.01 859.6 0.0109 0.0112 0.0116 Table 4.1 5. Conclusions This paper presents a symmetric cryptosystem, Triple-DES-96, where the encryption cycles are performed in less time than the Triple-DES cryptosystem.

1154 V. M. Silva-García, R. Flores-Carapia and C. Rentería-Márquez This feature makes the encryption of a certain size file using Triple DES 96 less than 2/3( ), where ( ) is the time taken for Triple-DES. It provides a criterion of quality images encryption, i.e how dispersed are the 768 shades of basic colours red, green and blue using the χ 2 goodness-of-fit test. The idea is to avoid bias that might have colour distribution. Furthermore, variables strengthen Triple-DES-96 permutations. It is not sufficient to know the keys, ; increase and the number of permutations to obtain the original image, that is, it requires more information to decipher. Also, image encryption is carried out without loss of information or what is the same, does not apply JPEG formats. Also, it is illustrated with a table for the Type I error levels α 0.1, 0.05 and 0.01, the rejection percentages of the null hypothesis. The above information is necessary for the implementation of a practical case. Moreover, there is a criterion for selecting the image to be encrypted using the χ 2 value. With regard to the types of attacks, since it has an unknown permutation at the entrance to the third round, and the inverse at the end of the encryption process, it removes the temptation of a possible linear or differential attack [16,2], at least as currently implemented. Because Triple-DES-96 is a symmetric cryptosystem, it is faster to encrypt images than known asymmetric cryptosystems such as RSA, ElGamal or Elliptic Curve. Although it uses a large number of permutations, 88499 for the figure used in this investigation, it does not significantly increase the time used in the encrypted image, in fact about 9 seconds. Future works will go in 2 directions: the first is to develop a cryptosystem that even if not stronger than Triple-DES, will be much faster to encrypt images than Triple-DES-96. The second is to develop an improvement in recent cryptosystems such as Advanced Encryption Standard AES [8], in order to increase image encryption speed. ACKNOWLEDGEMENTS. The authors would like to thank the Instituto Politécnico Nacional (Secretaría Académica, COFAA, SIP, CIDETEC and ESFM) and the CONACyT for their economic support to develop this work. References [1] Barker W, "Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher", NIST Special Publication, 2008, pp. 800-67. [2] Biham E. and Shamir A., "Differential cryptanalysis of the full 16-round DES", Lecturer Notes in computer Science, 1993, pp. 494-502. [3] Douglas R. Stinson, CRYPTOGRAPHY: Theory and practice, Chapman & Hall/CRC Press, 2002.

Triple-DES block of 96 bits 1155 [4] ElGamal T., "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transaction on Information Theory, Vol. 31, 1985, pp. 469-472. [5] Feistel H., "Cryptography and Computer Privacy, Scientific American", vol. 228, no. 5, 1973. [6] FIPS PUB 46-3, Federal Information Processing Standards Publication, 1999. [7] Grinstead Ch. and Snell L., Introduction to Probability, American Mathematical Society, 1997, pp. 325-360. [8] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES algorithm Submission, FIPS 197, 1999. [9] Jian Li and li Gan, "Study on Chaotic Cryptosystem for Digital Image Encryption", 2011 Third International Conference Measuring Technology and Mechatronics Automation, IEEE, 2011, pp. 426-430. [10] Koblitz N. et al, "Designs Codes and Cryptography", The state of elliptic curve, Vol. 19, 2000, pp. 173-193. [11] Matsui M, "Linear Cryptanalysis for DES cipher", Lecture Notes in Computer Science, 1994, pp. 386-397. [12] R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and Public Key Cryptosystems Communications of the ACM, 1978, pp. 120-126. [13] Rosen K., Discrete Mathematics and its Applications, Mc. Graw Hill fifth edition, 2003, pp. 362-370. [14] Silva V. et al, "Reducing Computational Complexity for 192 bits SPN Encryption Algorithms with Variable Permutation", JP Journal of Algebra, Number Theory and Applications, Pushpa Publishing House, 2010,. [15] Silva V.M. et al, "Algorithm for Strengthening Some Cryptography Systems", Journal of applied Mathematics and Decision Sciences, Hikari, 2009, pp. 967-976. [16] Wolpe R. and Myers R., Probability and Statistics for Engineers and Scientists, Prentice Hall, 2007. [17] Xuemei L. et al, "A Novel Scheme Reality Preserving Image Encryption", 2011 Third International Conference Measuring Technology and Mechatronics Automation, IEEE, 2011,pp. 218-221. Received: November, 2012