Autors: Nikolov V., Taralova I., Assad S.E., Neshev S., Bozhilov, I. B., Christoff, N. V. Title: Next-Generation Image Encryption Through Augmented Pseudorandom Generators Keywords: Encryption of images, Security, ZUC 128, ZUC 256Abstract: The necessity for secure data transfer is growing because of the rapid advancement of technology. In this study, ZUC 256, an enhanced variant of the ZUC 128 pseudo-random number generator, has been implemented. Through statistical analysis and randomness and image encryption tests, ZUC 256's efficacy and dependability have been verified. References - B. Schneier, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. New York, NY, USA: W. W. Norton & Company, 2015.
- W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed. Boston, MA, USA: Pearson, 2016.
- 3GPP, "Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2, " 3GPP TS 35. 221 V14. 0. 0, 2017. [Online]. Available: Https: //www. 3gpp. org
- T. Zhang and X. Lai, "Analysis and improvement of the initialization in the ZUC cipher, " Science China Information Sciences, vol. 55, no. 8, pp. 1814-1825, 2012.
- C. Beierle et al., "The ZUC-256 stream cipher and its design, " IACR Transactions on Symmetric Cryptology, vol. 2020, no. 1, pp. 1-36, 2020.
- M. Naya-Plasencia and L. Wang, "Cryptanalysis of the ZUC-256 stream cipher, " in Advances in Cryptology-EUROCRYPT 2021, Lecture Notes in Computer Science, vol. 12696. Cham, Switzerland: Springer, 2021, pp. 57-86.
- Y. Zhang et al., "Performance evaluation and optimization of ZUC-256 algorithm in 5G, " Journal of Communications and Information Networks, vol. 6, no. 4, pp. 421-429, Dec. 2021.
- A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. Wang, M. Wu and K. Yang, "Cryptanalysis of the S-boxes of the stream cipher ZUC, " in Fast Software Encryption-FSE 2012, Lecture Notes in Computer Science, vol. 7549, pp. 267-284, Springer, 2012.
- National Institute of Standards and Technology (NIST), "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, " Special Publication 800-22 Revision 1a, Apr. 2010.
- C. E. Shannon, "A Mathematical Theory of Communication, "Bell System Technical Journal, vol. 27, no. 3, pp. 379-423, 1948.
- S. Wei, X. Zhang and X. B. Ma, "Efficient Implementation of ZUC Stream Cipher for Resource-Constrained Devices, " IEEE Access, vol. 8, pp. 142260-142272, 2020.
- O. Özkasap, "Post-Quantum Cryptography for IoT: A Survey, " IEEE Access, vol. 8, pp. 197340-197366, 2020.
Issue
| 60th International Scientific Conference on Information, Communication and Energy Systems and Technologies, ICEST 2025 - Proceedings, 2025, Macedonia, https://doi.org/10.1109/ICEST66328.2025.11098391 |
|