Abstract

Cryptography entails the practice of designing mathematical algorithms to secure data communication over insecure networks in the presence of adversaries. In this aspect, a cryptographic algorithm encrypts the confidential data and converts it into a non-readable text for adversaries. Advanced Encryption Standard (AES) is the most effective encryption algorithm proposed till now. Substitution-box (S-box) is the most crucial and only nonlinear component in AES (or any cryptographic algorithm), which provides data confusion. A highly nonlinear S-box offers high confidentiality and security against cryptanalysis attacks; hence, the design of S-box is very crucial in any encryption algorithm. To address this challenge, we propose the action of matrices (conforming to the basis of P <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">7</sub> [Z <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> ]) on the Galois field GF (2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">8</sup> ). Consequently, a novel algebraic technique for S-box construction to generate highly nonlinear 8 × 8 S-boxes based on by our proposed algorithm, we obtain 1.324×10 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">14</sup> different S-boxes. Standard S-box tests analyze the cryptographic strength of our proposed S-boxes. The examined results show that the proposed S-boxes possess state-of-the-art cryptographic properties. Moreover, we also demonstrate the effectiveness of the proposed S-boxes in image encryption applications using the majority logic criterion.

Highlights

  • Nowadays, with the growing progress in the areas of communication and data transformation, the significance of information security is increasing day by day

  • [49], the authors proposed a novel algorithm for color image encryption based on a rectangular transform (RT)enhanced chaotic tent map (CTM)

  • In [54], Shah et al endorsed a standard norm to evaluate the fundamental types of S-boxes and analyze their competency for image encryption applications based on the statistical analyses

Read more

Summary

INTRODUCTION

With the growing progress in the areas of communication and data transformation, the significance of information security is increasing day by day. In [29], the authors discussed the implementation of modified CAST-256 algorithm to secure big data They explained how the CAST encryption method could be made dynamic by using the modified S-box and a key generator. In [49], the authors proposed a novel algorithm for color image encryption based on a rectangular transform (RT)enhanced chaotic tent map (CTM). In [50], the authors utilized the RT-enhanced chaotic tent map to cryptanalysis the newly proposed color image encryption algorithm using chosen-plaintext attacks. The authors proposed an improved color image encryption algorithm based on logistic-tent map (LTM) by improving the key generation method and encryption strategy. The research work in [53] used cryptanalysis driven design technique to investigate different security issues in chaos-based image encryption algorithms. In [54], Shah et al endorsed a standard norm to evaluate the fundamental types of S-boxes and analyze their competency for image encryption applications based on the statistical analyses

PAPER CONTRIBUTIONS AND ORGANIZATION
A Boolean function f in k variables is defined as
ALGORITHM FOR GENERATING NON-SINGULAR
ALGEBRAIC ANALYSES OF THE PROPOSED SBOXES
A Boolean function is called a balance
NONLINEARITY
DISCUSSIONS
IMAGE ENCRYPTION USING PROPOSED S-BOXES
ENERGY
HOMOGENITY
CONTRAST
CORRELATION
ENTROPY
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call