Security Evaluation of Robust Chaotic Block Cipher
Abdul Hamid M. Ragab1, Osama S. Farag Allah2, Khalid W. Magld3, Amin Y. Noaman4

1Prof: Abdul Hamid M. Ragab, Prof. since 1995, Academic Staff Member & Consultants & Chairman of Computer Science and Eng. Referee for scientific Journals and Conferences.
2Assoc. Prof: Osama S. Farag Allah, Associate Prof in Computer Science & Engineering. He got his Ph.D. in Computer Science & Engineering in 2007 from Menoufia University.
3Assist. Prof: Khalid W. Magld, Computer Science University of Bradform, UK.
4Assoc. Prof: Amin Y. Noaman, Computer Science from University of Manitoba, Canada
Manuscript received on December 08, 2014. | Revised Manuscript received on December 15, 2014. | Manuscript published on January 05, 2014. | PP: 9-16 | Volume-3 Issue-6, January 2014. | Retrieval Number: F1962013614/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract:  This paper investigates an enhanced robust chaotic block cipher (RCBC) which is used for potential increasing security. It makes heavy use of non-linear Boolean functions including parity and multiplexer functions, in addition to multiplication primitive operation with block size of 256-bits. It greatly guaranteed an increased diffusion achieved per round, allowing for greater security and fewer rounds. Comparative analysis of the cipher with different algorithms such as RC6, and RC5 is investigated; regarding design parameters and speed. The cipher is tested among its several design parameters including word size, number of rounds, and secret key length and their optimal choice values. Security estimation for digital imaging against brute-force, statistical, and differential attacks is explored from strict cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of the cipher.
Keywords: Block ciphers, Symmetric encryption, Chaos, and Security analysis.