Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption

In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution pro...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Muhammad Ramzan, Tariq Shah, Mohammad Mazyad Hazzazi, Amer Aljaedi, Adel R. Alharbi
Formato: article
Lenguaje:EN
Publicado: IEEE 2021
Materias:
Acceso en línea:https://doaj.org/article/e5f67489dc17484285cb4f830b5384c2
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:e5f67489dc17484285cb4f830b5384c2
record_format dspace
spelling oai:doaj.org-article:e5f67489dc17484285cb4f830b5384c22021-12-02T00:00:26ZConstruction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption2169-353610.1109/ACCESS.2021.3128177https://doaj.org/article/e5f67489dc17484285cb4f830b5384c22021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9626351/https://doaj.org/toc/2169-3536In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks (Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests (Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications.Muhammad RamzanTariq ShahMohammad Mazyad HazzaziAmer AljaediAdel R. AlharbiIEEEarticleElliptic curvessubstitution boximage encryptionsecurity analysisElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 157106-157123 (2021)
institution DOAJ
collection DOAJ
language EN
topic Elliptic curves
substitution box
image encryption
security analysis
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Elliptic curves
substitution box
image encryption
security analysis
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Muhammad Ramzan
Tariq Shah
Mohammad Mazyad Hazzazi
Amer Aljaedi
Adel R. Alharbi
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
description In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks (Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests (Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications.
format article
author Muhammad Ramzan
Tariq Shah
Mohammad Mazyad Hazzazi
Amer Aljaedi
Adel R. Alharbi
author_facet Muhammad Ramzan
Tariq Shah
Mohammad Mazyad Hazzazi
Amer Aljaedi
Adel R. Alharbi
author_sort Muhammad Ramzan
title Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
title_short Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
title_full Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
title_fullStr Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
title_full_unstemmed Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
title_sort construction of s-boxes using different maps over elliptic curves for image encryption
publisher IEEE
publishDate 2021
url https://doaj.org/article/e5f67489dc17484285cb4f830b5384c2
work_keys_str_mv AT muhammadramzan constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption
AT tariqshah constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption
AT mohammadmazyadhazzazi constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption
AT ameraljaedi constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption
AT adelralharbi constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption
_version_ 1718404018563186688