Cargando…
A strong construction of S-box using Mandelbrot set an image encryption scheme
The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is s...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9575852/ https://www.ncbi.nlm.nih.gov/pubmed/36262157 http://dx.doi.org/10.7717/peerj-cs.892 |
_version_ | 1784811403029250048 |
---|---|
author | Aslam, Mazzamal Beg, Saira Anjum, Adeel Qadir, Zakria Khan, Shawal Malik, Saif Ur Rehman Mahmud, MA Parvez |
author_facet | Aslam, Mazzamal Beg, Saira Anjum, Adeel Qadir, Zakria Khan, Shawal Malik, Saif Ur Rehman Mahmud, MA Parvez |
author_sort | Aslam, Mazzamal |
collection | PubMed |
description | The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes. |
format | Online Article Text |
id | pubmed-9575852 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-95758522022-10-18 A strong construction of S-box using Mandelbrot set an image encryption scheme Aslam, Mazzamal Beg, Saira Anjum, Adeel Qadir, Zakria Khan, Shawal Malik, Saif Ur Rehman Mahmud, MA Parvez PeerJ Comput Sci Computer Networks and Communications The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes. PeerJ Inc. 2022-09-09 /pmc/articles/PMC9575852/ /pubmed/36262157 http://dx.doi.org/10.7717/peerj-cs.892 Text en ©2022 Aslam et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Aslam, Mazzamal Beg, Saira Anjum, Adeel Qadir, Zakria Khan, Shawal Malik, Saif Ur Rehman Mahmud, MA Parvez A strong construction of S-box using Mandelbrot set an image encryption scheme |
title | A strong construction of S-box using Mandelbrot set an image encryption scheme |
title_full | A strong construction of S-box using Mandelbrot set an image encryption scheme |
title_fullStr | A strong construction of S-box using Mandelbrot set an image encryption scheme |
title_full_unstemmed | A strong construction of S-box using Mandelbrot set an image encryption scheme |
title_short | A strong construction of S-box using Mandelbrot set an image encryption scheme |
title_sort | strong construction of s-box using mandelbrot set an image encryption scheme |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9575852/ https://www.ncbi.nlm.nih.gov/pubmed/36262157 http://dx.doi.org/10.7717/peerj-cs.892 |
work_keys_str_mv | AT aslammazzamal astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT begsaira astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT anjumadeel astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT qadirzakria astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT khanshawal astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT maliksaifurrehman astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT mahmudmaparvez astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT aslammazzamal strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT begsaira strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT anjumadeel strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT qadirzakria strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT khanshawal strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT maliksaifurrehman strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme AT mahmudmaparvez strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme |