Mohammad Reza Khayyambashi

Work place: Department of Computer Architecture, Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran

E-mail: m.r.khayyambashi@comp.ui.ac.ir

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Systems Architecture, Computer Networks, Network Architecture, Network Security

Biography

Mohammad Reza Khayyambashi received the B.S. degree in Computer Hardware Engineering from Tehran University, Tehran, Iran in 1987. He received his M.S. in Computer Architecture from Sharif University of Technology (SUT), Tehran, Iran in 1990. He got his Ph.D. in Computer Engineering, Distributed Systems from University of Newcastle upon Tyne, Newcastle upon Tyne, England in 2006. He is now an associate professor at the Faculty of Computing Engineering, University of Isfahan, Isfahan, Iran. His research interests include Distributed Systems, Computer Networks, Fault Tolerance in Software Defined Network (SDN), Social Networks, and ECommerce.

Author Articles
Performance Evaluation of Authentication-Encryption and Confidentiality Block Cipher Modes of Operation on Digital Image

By Narges Mehran Mohammad Reza Khayyambashi

DOI: https://doi.org/10.5815/ijcnis.2017.09.04, Pub. Date: 8 Sep. 2017

Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image. Authentication-encryption scheme, such as Offset Code Book (OCB) mode, offers both privacy and authenticity; that is to say, this scheme provides data authenticity without increasing the cost of encryption. The performance of this mode is compared with other confidentiality modes of operation, such as the fast counter (CTR) mode that just encrypts the image without verification. Various statistical methods, such as correlation coefficient, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI) are utilized to analyze the efficiency of different modes. Results show that the model based on OCB scheme, by both AES and Serpent algorithms, exhibits good performance on a digital image compared to the models based on other modes. OCB-AES based scheme, associated with its own authentication, has considerable speed in comparison with other confidentiality modes.

[...] Read more.
Other Articles