10.25673/122127">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.283-288

Pattern-Free Block Encryption: Single-Key Camellia XEX with PRNG Tweaks and Permutation Diffusion


Enas Ali and Shatha Jafer


Abstract: Block ciphers in ECB mode, such as Camellia-ECB, offer high throughput but leak visual and structural patterns when encrypting images or other repetitive data. We show PRNG-XEX+Permutation, a stateless improvement that gets rid of repeating blocks that are the same while keeping performance close to baseline. A single Camellia call wrapped in an XOR-Encrypt-XOR (XEX) construction processes each 128-bit block, with tweaks produced from a one-time, key-seeded Xoroshiro128+ pseudorandom stream. A simple static byte permutation further strengthens intra-block diffusion. The scheme eliminates the need for chaining, padding, or external parameters beyond the master key, ensuring streamlined implementation while supporting full parallelism and random access; it also guarantees provable block uniqueness. Our tests show that PRNG-XEX + Permutation meets all of the randomness requirements set by NIST SP 800-22. It also restores full visual privacy in encrypted images while maintaining encryption speeds within a few percent of standard ECB mode. This demonstrates that strong pattern resistance can be attained without sacrificing cipher efficiency.

Keywords: Block Cipher, Camellia, XEX Mode, Xoroshiro128⁺, Pattern Resistance, Stateless Cryptography.

DOI: 10.25673/122127

Download: PDF

References:

  1. M. S. Moganti, M. M. Abdelwahab, and M. S. Sayed, “Securing secret data using an enhanced Camellia encryption with pixel indicator technique,” in Proceedings of the International Conference on Control, Communication and Computing (ICCCSIT), pp. 209–214, 2023.
  2. “Implementation of 128-bit Camellia algorithm for cryptography in digital image,” IET Computers & Digital Techniques, vol. 15, no. 3, pp. 123–128, 2021.
  3. D. Blackman and S. Vigna, “Scrambled linear pseudorandom number generators,” arXiv preprint, arXiv:1805.01407, 2018.
  4. X. Wang, Y. Zhao, and H. Liu, “An image encryption algorithm based on Camellia block cipher in ECB mode with random permutation,” International Journal of Network Security & Its Applications, vol. 7, no. 4, pp. 15–27, 2015.
  5. S. Li, G. Chen, and X. Huang, “A secure and fast image encryption scheme based on block cipher and dynamic permutation,” IEEE Access, vol. 5, pp. 1618–1628, 2017.
  6. A. Matsui et al., “A description of the Camellia encryption algorithm,” NTT and Mitsubishi Electric Corporation, 2001.
  7. IEEE Computer Society, IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices, IEEE Std 1619-2007, 2008.
  8. National Institute of Standards and Technology, Recommendation for Block Cipher Modes of Operation: Methods and Techniques, NIST Special Publication 800-38A, Dec. 2001.
  9. P. Rogaway, “Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC,” in Advances in Cryptology – ASIACRYPT 2004, LNCS, vol. 3329, pp. 16–31, Springer, 2004.
  10. National Institute of Standards and Technology, Secure Hash Standard (SHA-2), FIPS PUB 180-4, Aug. 2015.
  11. A. Rukhin et al., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22 Rev. 1a, Apr. 2010.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.