Cargando…

A strong construction of S-box using Mandelbrot set an image encryption scheme

The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is s...

Descripción completa

Detalles Bibliográficos
Autores principales: Aslam, Mazzamal, Beg, Saira, Anjum, Adeel, Qadir, Zakria, Khan, Shawal, Malik, Saif Ur Rehman, Mahmud, MA Parvez
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9575852/
https://www.ncbi.nlm.nih.gov/pubmed/36262157
http://dx.doi.org/10.7717/peerj-cs.892
_version_ 1784811403029250048
author Aslam, Mazzamal
Beg, Saira
Anjum, Adeel
Qadir, Zakria
Khan, Shawal
Malik, Saif Ur Rehman
Mahmud, MA Parvez
author_facet Aslam, Mazzamal
Beg, Saira
Anjum, Adeel
Qadir, Zakria
Khan, Shawal
Malik, Saif Ur Rehman
Mahmud, MA Parvez
author_sort Aslam, Mazzamal
collection PubMed
description The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes.
format Online
Article
Text
id pubmed-9575852
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-95758522022-10-18 A strong construction of S-box using Mandelbrot set an image encryption scheme Aslam, Mazzamal Beg, Saira Anjum, Adeel Qadir, Zakria Khan, Shawal Malik, Saif Ur Rehman Mahmud, MA Parvez PeerJ Comput Sci Computer Networks and Communications The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes. PeerJ Inc. 2022-09-09 /pmc/articles/PMC9575852/ /pubmed/36262157 http://dx.doi.org/10.7717/peerj-cs.892 Text en ©2022 Aslam et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Aslam, Mazzamal
Beg, Saira
Anjum, Adeel
Qadir, Zakria
Khan, Shawal
Malik, Saif Ur Rehman
Mahmud, MA Parvez
A strong construction of S-box using Mandelbrot set an image encryption scheme
title A strong construction of S-box using Mandelbrot set an image encryption scheme
title_full A strong construction of S-box using Mandelbrot set an image encryption scheme
title_fullStr A strong construction of S-box using Mandelbrot set an image encryption scheme
title_full_unstemmed A strong construction of S-box using Mandelbrot set an image encryption scheme
title_short A strong construction of S-box using Mandelbrot set an image encryption scheme
title_sort strong construction of s-box using mandelbrot set an image encryption scheme
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9575852/
https://www.ncbi.nlm.nih.gov/pubmed/36262157
http://dx.doi.org/10.7717/peerj-cs.892
work_keys_str_mv AT aslammazzamal astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT begsaira astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT anjumadeel astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT qadirzakria astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT khanshawal astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT maliksaifurrehman astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT mahmudmaparvez astrongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT aslammazzamal strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT begsaira strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT anjumadeel strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT qadirzakria strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT khanshawal strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT maliksaifurrehman strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme
AT mahmudmaparvez strongconstructionofsboxusingmandelbrotsetanimageencryptionscheme