Abstract

In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks ( Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests ( Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications.

Highlights

  • The protection of information communicated through any channel or network is a challenging problem because of the appearance of evil and doubtful users whose purpose is just to disturb the verbal exchange

  • The goal of this paper is to present a novel and well-organized method for constructing cryptographically secure substitution boxes (Sboxes) and securing secret images with elliptic curves (ECs) beyond prime field (PF)

  • We’ll present a quickly and method to generate a large number of different, unrelated objects and comfy injective m × n s-boxes primarily based on the x,y coordinates of an EC for the encryption of distinctly correlated data

Read more

Summary

INTRODUCTION

The protection of information communicated through any channel or network is a challenging problem because of the appearance of evil and doubtful users whose purpose is just to disturb the verbal exchange. 1. Ramzan et al.: Construction of S-Boxes using Different Maps over Elliptic Curves for Image Encryption analysts. The goal of this paper is to present a novel and well-organized method for constructing cryptographically secure substitution boxes (Sboxes) and securing secret images with ECs beyond prime field (PF). The proposed image cryptosystem, on the other hand, is based on a method that generates an effective S-box. C. OUR CONTRIBUTION The goal of this work is to demonstrate a new and productive method for constructing cryptographically well-built S-boxes with high Non-linearity, as well as the security of independent images depends on ECs above PF. The suggested s-box production scheme depends on the generality of two separate maps, along with the suggested image cryptographic technique is based.

PRELIMINARIES
QUICK OVERVIEW OF S-BOX CONSTRUCTION APPROACHES
THE PROPOSED APPROACH FOR GENERATING S-BOXES
THE ALGORITHM
S-BOX ANALYSIS AND COMPARISON
PROPOSED IMAGE ENCRYPTION SCHEME
ENCRYPTION ALGORITHM
DECRYPTION ALGORITHM
IMAGE ANALYSIS
KEY ANALYSIS
STATISTICAL CRYPTANALYSIS
CHI-SQUARE TEST
Result
VIII. COMPARISON AND DEBATE WITH OTHER ENCRYPTION METHODS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call