Abstract

For decades, the security and privacy of data are among the major challenges faced by service providers dealing with public data. To cope with these challenges, most of the organizations rely on the adoption of cryptographic methods for protecting data against any illegitimate access and attacks. Modern day cryptographic ciphers utilize one or more substitution-boxes (S-boxes) that facilitate the realisation of strong security of plain data during encryption and legal decoding of it during decryption process. Security of ciphers is directly proportional to the cryptographic strength of S-boxes. This study proposes an efficient and simple method based on some modular operations for the construction of dynamic S-boxes with high nonlinearity using a heuristic evolution strategy. A large number of strong S-boxes can be easily constructed using slight variations in the parameters of the anticipated method. A specimen S-box is constructed and its critical performance analysis against standard security criteria including nonlinearity, strict avalanche criterion, bit independence criterion, differential uniformity, linear probability, and fixed points are reported as justification for the proposed technique’s high cryptographic strength. Furthermore, the generated S-box is also applied to encrypt digital images to assess its cryptographic application performance. The performance and comparison study validates that the proposed S-box has better performance strength, which makes it a viable candidate for cryptographic applications in different areas of image security.

Highlights

  • We are living in the technological era depending heavily on data and information that may include text, numbers, images, audio, video, etc

  • If a substitution box has the ability to produce more confusion for the invaders in the resultant ciphertext, the respective block cipher employing that S-box in its operations provides more security to the plaintext

  • To observe the efficiency of the proposed S-box method, its simulation is done on Windows 8 having 4GB RAM and Intel core i7 CPU which operates at 2.2 GHz using Visual C#

Read more

Summary

INTRODUCTION

We are living in the technological era depending heavily on data and information that may include text, numbers, images, audio, video, etc. If a substitution box has the ability to produce more confusion for the invaders in the resultant ciphertext, the respective block cipher employing that S-box in its operations provides more security to the plaintext. PROPOSED CONSTRUCTION OF DYNAMIC S-BOX Modern-day block ciphers employ S-boxes in their working to encrypt the data to produce more and more jumble in the resultant ciphertext. PERFORMANCE EVALUATION OF S-BOX An S-box must pass typical conditions known as standard criteria to be strong one and provide nonlinear association between input (plaintext) and output (ciphertext) This segment scrutinizes the forte of the produced S-box specified in Table 2 using following standard criteria which evaluates the cryptographic strength of S-boxes [30], [33], [51]. Visuals of plain and encrypted images for histogram and pixels correlation performance for S-box based image encryption; 1st column (a) shows plain-images; 2nd column (b) shows histograms of plain-images; 3rd column (c) shows vertically adjacent pixels correlation in plain-images; 4th column (d) shows encrypted-images using S-box based encryption; 5th column (e) shows histograms of encrypted-images; and 6th column (f) shows vertically adjacent pixels correlation in encrypted-images

FIXED POINTS
COMPUTATIONAL LABOR
MAJORITY LOGIC CRITERIA
CONCLUSION
Findings
EFFICIENCY ANALYSIS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.