Abstract

Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital communication. Modern cryptosystems assist in data sanctuary by utilizing substitution-boxes (S-boxes). This paper presents a modest and novel technique to erect dynamic and key dependent S-boxes with the help of a novel linear trigonometric transformation. A new optimization plan is also suggested to improvise the nonlinearity characteristic of the preliminary S-box generated through trigonometric transformation. The proposed technique has the competence to create significant quantity of cryptographic strong S-boxes with the help of projected scheme. A specimen S-box is procreated, and standard performance criteria is applied to appraise the cryptographic strength of the resultant S-box and other known S-boxes available in the literature. Comparative performance analyses validate the noteworthy contribution of the proposed scheme for the generation of dynamic and secure S-boxes. An image privacy preserving scheme based on the proposed S-box is also suggested to validate the fact that it holds strong candidature for modern cryptosystems to protect multimedia data.

Highlights

  • Data communication plays a vigorous role in modern digital era where rapid and innovative developments in communication technology have become daily routines

  • One requires repeating Eq (1) for 2n times along with 2n+1 iterations to produce a preliminary S-box of size n×n i.e. about (2n + 2n+1) iterations are needed for phase-1

  • It is evident that the obtained score for number of pixels change rate (NPCR) is more than 99.6% and that of unified average changing intensity (UACI) is 33.4% which are consistent with the expected values reported in the literature for strong encryption schemes

Read more

Summary

INTRODUCTION

Data communication plays a vigorous role in modern digital era where rapid and innovative developments in communication technology have become daily routines. Researchers have investigated different techniques to construct dynamic S-boxes which offer good cryptographic strength by using values from the respective cipher key These methods engage diverse mathematical edifices like elliptic curves, finite field, chaotic systems, etc. Many investigators have explored other knowledge domains for the cohort of S-boxes like cellular automata [25], elliptic curve [24, 26], DNA computing [27], graph theory [28, 29], optimization techniques [30,31,32,33], etc Another prime method to generate robust and dynamic Sboxes is the application of linear fractional transformation (LFT) as adopted by researchers [34,35,36]. PROPOSED SCHEME FOR S-BOX DESIGN Investigators project techniques for the construction of Sboxes which are used in block ciphers to provide protection to the data from the attackers.

B2 B3 B4 B5 B6 B7 B8 112 112 112 110 112 112 110 112
COMPUTATIONAL EFFICIENCY
COMPARATIVE ANALYSIS
PROPOSED IMAGE SECURITY SCHEME USING SBOX
Declare C as the encrypted image
MAJORITY LOGIC CRITERION
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call