Cargando…

A study of text-theoretical approach to S-box construction with image encryption applications

Data protection is regarded as one of the biggest issues facing companies that have been using public data for a long time. Numerous encryption techniques have been used to address these issues and safeguard data from any malicious attempts and assaults. A substitution box (S-box) is the basic compo...

Descripción completa

Detalles Bibliográficos
Autores principales: Mahboob, Abid, Nadeem, Muhammad, Rasheed, Muhammad Waheed
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10687129/
https://www.ncbi.nlm.nih.gov/pubmed/38030677
http://dx.doi.org/10.1038/s41598-023-47607-6
_version_ 1785151915069276160
author Mahboob, Abid
Nadeem, Muhammad
Rasheed, Muhammad Waheed
author_facet Mahboob, Abid
Nadeem, Muhammad
Rasheed, Muhammad Waheed
author_sort Mahboob, Abid
collection PubMed
description Data protection is regarded as one of the biggest issues facing companies that have been using public data for a long time. Numerous encryption techniques have been used to address these issues and safeguard data from any malicious attempts and assaults. A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. The goal of this paper is to recommend an effective, original, and straightforward technique for the creation of robust S-boxes. A sample S-box is generated in the proposed work using the word “UNITY” but other words can also be used to generate many powerful S-boxes. The ASCII code is used to translate the word “UNITY” into binary form, after which a distinct matrix is constructed for each character of the word. In the next phase, a linear fractional transformation is constructed using these matrices, which is then utilized to generate the S-box. The constructed S-box was then evaluated against typical security standards to support its high cryptographic authority. The generated S-box's statistical and algebraic resilience is demonstrated by its very low linear probability and differential probability scores of 0.125 and 0.039, respectively, and a high non-linearity score of 111.5. To evaluate the effectiveness of the image encryption scheme, digital images are encoded using the created S-box. The performance and comparative research demonstrate that the suggested S-box is a real candidate for applications in the field of image encryption and has a stronger performance base.
format Online
Article
Text
id pubmed-10687129
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-106871292023-11-30 A study of text-theoretical approach to S-box construction with image encryption applications Mahboob, Abid Nadeem, Muhammad Rasheed, Muhammad Waheed Sci Rep Article Data protection is regarded as one of the biggest issues facing companies that have been using public data for a long time. Numerous encryption techniques have been used to address these issues and safeguard data from any malicious attempts and assaults. A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. The goal of this paper is to recommend an effective, original, and straightforward technique for the creation of robust S-boxes. A sample S-box is generated in the proposed work using the word “UNITY” but other words can also be used to generate many powerful S-boxes. The ASCII code is used to translate the word “UNITY” into binary form, after which a distinct matrix is constructed for each character of the word. In the next phase, a linear fractional transformation is constructed using these matrices, which is then utilized to generate the S-box. The constructed S-box was then evaluated against typical security standards to support its high cryptographic authority. The generated S-box's statistical and algebraic resilience is demonstrated by its very low linear probability and differential probability scores of 0.125 and 0.039, respectively, and a high non-linearity score of 111.5. To evaluate the effectiveness of the image encryption scheme, digital images are encoded using the created S-box. The performance and comparative research demonstrate that the suggested S-box is a real candidate for applications in the field of image encryption and has a stronger performance base. Nature Publishing Group UK 2023-11-29 /pmc/articles/PMC10687129/ /pubmed/38030677 http://dx.doi.org/10.1038/s41598-023-47607-6 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Mahboob, Abid
Nadeem, Muhammad
Rasheed, Muhammad Waheed
A study of text-theoretical approach to S-box construction with image encryption applications
title A study of text-theoretical approach to S-box construction with image encryption applications
title_full A study of text-theoretical approach to S-box construction with image encryption applications
title_fullStr A study of text-theoretical approach to S-box construction with image encryption applications
title_full_unstemmed A study of text-theoretical approach to S-box construction with image encryption applications
title_short A study of text-theoretical approach to S-box construction with image encryption applications
title_sort study of text-theoretical approach to s-box construction with image encryption applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10687129/
https://www.ncbi.nlm.nih.gov/pubmed/38030677
http://dx.doi.org/10.1038/s41598-023-47607-6
work_keys_str_mv AT mahboobabid astudyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications
AT nadeemmuhammad astudyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications
AT rasheedmuhammadwaheed astudyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications
AT mahboobabid studyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications
AT nadeemmuhammad studyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications
AT rasheedmuhammadwaheed studyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications