Abstract

With the growth of networks, the Internet of Things (IoT) and new cyber attacks pose threats to privacy and security, secure communication is therefore becoming one of the most crucial concerns. For this purpose, symmetric algorithms namel; The Rijndael algorithm, the Serpent algorithm, and the TWOFISH algorithm pay equal attention. In this paper, the TWOFISH algorithm’s mathematical complexity is improved by using substitution boxes (S-boxes) drawn from a multiplicative group of units of chain ring $\sum \nolimits _{i=0}^{7} {u^{i}F_{2}} $ . As these S-boxes have the property of having copious generators, they, therefore, produce a rich algebraic complexity. Moreover, the time complexity of the proposed work is modified by processing the 64-bit block throughout the process and reducing the number of subkeys. To measure the strength of the proposed algorithm, various standard color digital images, with a size of $256\times 256$ , are encrypted and tested. The computation speed of the encryption is compared to the standard TWOFISH algorithm’s speed and found that the newly designed algorithm is quite fast. For security analysis and quality assessment, various statistical tests are performed on the standard encrypted images. The results recommend that the proposed algorithm is a strong candidate for digital image encryption.

Highlights

  • With the increasing use of the Internet and online communications, data security has become a matter of great concern

  • For security analysis and quality assessment, various statistical tests are performed on the standard encrypted images

  • The results recommend that the proposed algorithm is a strong candidate for digital image encryption

Read more

Summary

INTRODUCTION

With the increasing use of the Internet and online communications, data security has become a matter of great concern. A substitution box (S-box) is the main nonlinear component of a symmetric key cipher that performs the substitution and creates a layer of confusion in the encrypted data. This was first proposed by Shannon [5] and clarified more completely in [6] and [7]. A 128-bit block is encrypted using a variable-length key of size 128, 192, or 256 bits in the modified TWOFISH algorithm. S-boxes obtained from the commutative chain ring are used.

LOCAL RING
CHAIN RING
MODIFIED TWOFISH ALGORITHM
THE FUNCTION G
BEGIN KEY SCHEDULE
CORRECTNESS PROOF USING TEST VECTOR
SECURITY ANALYSIS
CORRELATION ANALYSIS FOR NEIGHBORING PIXELS
AVERAGE DIFFERENCE
SIMILARITY MEASURES
NORMALIZED CROSS CORRELATION
COMPLEXITY OF ALGORITHM
EXECUTION TIME OF ALGORITHM
RANDOMNESS TEST FOR CIPHER
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call