Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution pro...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e5f67489dc17484285cb4f830b5384c2 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:e5f67489dc17484285cb4f830b5384c2 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:e5f67489dc17484285cb4f830b5384c22021-12-02T00:00:26ZConstruction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption2169-353610.1109/ACCESS.2021.3128177https://doaj.org/article/e5f67489dc17484285cb4f830b5384c22021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9626351/https://doaj.org/toc/2169-3536In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks (Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests (Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications.Muhammad RamzanTariq ShahMohammad Mazyad HazzaziAmer AljaediAdel R. AlharbiIEEEarticleElliptic curvessubstitution boximage encryptionsecurity analysisElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 157106-157123 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Elliptic curves substitution box image encryption security analysis Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Elliptic curves substitution box image encryption security analysis Electrical engineering. Electronics. Nuclear engineering TK1-9971 Muhammad Ramzan Tariq Shah Mohammad Mazyad Hazzazi Amer Aljaedi Adel R. Alharbi Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption |
description |
In this article, we present an encryption technique that can encrypt any digital data. The proposed scheme basically depends on a substitution-permutation network. Two separate bijective maps are used in the proposed algorithm. Firstly, the substitution boxes are used to perform the substitution process. This technique uses elliptic curves (ECs) to create several substitution boxes with good cryptographic properties. The generated substitution boxes are utilized to replace the arrange data that produces the most uncertainty in the plain image data. Further, we used the permutation process to generate strong randomness in the proposed technique. For the evaluation of the stability of the proposed algorithm; nonlinearity, linear approximation probability, bit independence criterion, strict avalanche criterion and differential approximation probability were performed on the substitution boxes. Differential attacks (Number of Changing Pixel Rate (NPCR), Uniform Average Change Intensity (UACI)) and statistical tests (Entropy, Correlation) were performed on the encrypted images to check their resistance against different attacks. The execution and image analysis reveals that the proposed scheme attains good encryption results while requiring minimal computing ability and has efficient potential in real-time image encryption applications. |
format |
article |
author |
Muhammad Ramzan Tariq Shah Mohammad Mazyad Hazzazi Amer Aljaedi Adel R. Alharbi |
author_facet |
Muhammad Ramzan Tariq Shah Mohammad Mazyad Hazzazi Amer Aljaedi Adel R. Alharbi |
author_sort |
Muhammad Ramzan |
title |
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption |
title_short |
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption |
title_full |
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption |
title_fullStr |
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption |
title_full_unstemmed |
Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption |
title_sort |
construction of s-boxes using different maps over elliptic curves for image encryption |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/e5f67489dc17484285cb4f830b5384c2 |
work_keys_str_mv |
AT muhammadramzan constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption AT tariqshah constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption AT mohammadmazyadhazzazi constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption AT ameraljaedi constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption AT adelralharbi constructionofsboxesusingdifferentmapsoverellipticcurvesforimageencryption |
_version_ |
1718404018563186688 |