Cargando…
A study of text-theoretical approach to S-box construction with image encryption applications
Data protection is regarded as one of the biggest issues facing companies that have been using public data for a long time. Numerous encryption techniques have been used to address these issues and safeguard data from any malicious attempts and assaults. A substitution box (S-box) is the basic compo...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10687129/ https://www.ncbi.nlm.nih.gov/pubmed/38030677 http://dx.doi.org/10.1038/s41598-023-47607-6 |
_version_ | 1785151915069276160 |
---|---|
author | Mahboob, Abid Nadeem, Muhammad Rasheed, Muhammad Waheed |
author_facet | Mahboob, Abid Nadeem, Muhammad Rasheed, Muhammad Waheed |
author_sort | Mahboob, Abid |
collection | PubMed |
description | Data protection is regarded as one of the biggest issues facing companies that have been using public data for a long time. Numerous encryption techniques have been used to address these issues and safeguard data from any malicious attempts and assaults. A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. The goal of this paper is to recommend an effective, original, and straightforward technique for the creation of robust S-boxes. A sample S-box is generated in the proposed work using the word “UNITY” but other words can also be used to generate many powerful S-boxes. The ASCII code is used to translate the word “UNITY” into binary form, after which a distinct matrix is constructed for each character of the word. In the next phase, a linear fractional transformation is constructed using these matrices, which is then utilized to generate the S-box. The constructed S-box was then evaluated against typical security standards to support its high cryptographic authority. The generated S-box's statistical and algebraic resilience is demonstrated by its very low linear probability and differential probability scores of 0.125 and 0.039, respectively, and a high non-linearity score of 111.5. To evaluate the effectiveness of the image encryption scheme, digital images are encoded using the created S-box. The performance and comparative research demonstrate that the suggested S-box is a real candidate for applications in the field of image encryption and has a stronger performance base. |
format | Online Article Text |
id | pubmed-10687129 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-106871292023-11-30 A study of text-theoretical approach to S-box construction with image encryption applications Mahboob, Abid Nadeem, Muhammad Rasheed, Muhammad Waheed Sci Rep Article Data protection is regarded as one of the biggest issues facing companies that have been using public data for a long time. Numerous encryption techniques have been used to address these issues and safeguard data from any malicious attempts and assaults. A substitution box (S-box) is the basic component for modern block ciphers, which helps to ensure robust security of plain data while encryption and permits its lawful decipherment. The goal of this paper is to recommend an effective, original, and straightforward technique for the creation of robust S-boxes. A sample S-box is generated in the proposed work using the word “UNITY” but other words can also be used to generate many powerful S-boxes. The ASCII code is used to translate the word “UNITY” into binary form, after which a distinct matrix is constructed for each character of the word. In the next phase, a linear fractional transformation is constructed using these matrices, which is then utilized to generate the S-box. The constructed S-box was then evaluated against typical security standards to support its high cryptographic authority. The generated S-box's statistical and algebraic resilience is demonstrated by its very low linear probability and differential probability scores of 0.125 and 0.039, respectively, and a high non-linearity score of 111.5. To evaluate the effectiveness of the image encryption scheme, digital images are encoded using the created S-box. The performance and comparative research demonstrate that the suggested S-box is a real candidate for applications in the field of image encryption and has a stronger performance base. Nature Publishing Group UK 2023-11-29 /pmc/articles/PMC10687129/ /pubmed/38030677 http://dx.doi.org/10.1038/s41598-023-47607-6 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Mahboob, Abid Nadeem, Muhammad Rasheed, Muhammad Waheed A study of text-theoretical approach to S-box construction with image encryption applications |
title | A study of text-theoretical approach to S-box construction with image encryption applications |
title_full | A study of text-theoretical approach to S-box construction with image encryption applications |
title_fullStr | A study of text-theoretical approach to S-box construction with image encryption applications |
title_full_unstemmed | A study of text-theoretical approach to S-box construction with image encryption applications |
title_short | A study of text-theoretical approach to S-box construction with image encryption applications |
title_sort | study of text-theoretical approach to s-box construction with image encryption applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10687129/ https://www.ncbi.nlm.nih.gov/pubmed/38030677 http://dx.doi.org/10.1038/s41598-023-47607-6 |
work_keys_str_mv | AT mahboobabid astudyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications AT nadeemmuhammad astudyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications AT rasheedmuhammadwaheed astudyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications AT mahboobabid studyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications AT nadeemmuhammad studyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications AT rasheedmuhammadwaheed studyoftexttheoreticalapproachtosboxconstructionwithimageencryptionapplications |