Abstract
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks ( Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests ( Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications.
Highlights
The protection of information communicated through any channel or network is a challenging problem because of the appearance of evil and doubtful users whose purpose is just to disturb the verbal exchange
The goal of this paper is to present a novel and well-organized method for constructing cryptographically secure substitution boxes (Sboxes) and securing secret images with elliptic curves (ECs) beyond prime field (PF)
We’ll present a quickly and method to generate a large number of different, unrelated objects and comfy injective m × n s-boxes primarily based on the x,y coordinates of an EC for the encryption of distinctly correlated data
Summary
The protection of information communicated through any channel or network is a challenging problem because of the appearance of evil and doubtful users whose purpose is just to disturb the verbal exchange. 1. Ramzan et al.: Construction of S-Boxes using Different Maps over Elliptic Curves for Image Encryption analysts. The goal of this paper is to present a novel and well-organized method for constructing cryptographically secure substitution boxes (Sboxes) and securing secret images with ECs beyond prime field (PF). The proposed image cryptosystem, on the other hand, is based on a method that generates an effective S-box. C. OUR CONTRIBUTION The goal of this work is to demonstrate a new and productive method for constructing cryptographically well-built S-boxes with high Non-linearity, as well as the security of independent images depends on ECs above PF. The suggested s-box production scheme depends on the generality of two separate maps, along with the suggested image cryptographic technique is based.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.