Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system

被引:10
作者
Singh, Laiphrakpam Dolendro [1 ]
Lahoty, Akash [1 ]
Devi, Chanubala [1 ]
Dey, Deepjoy [1 ]
Saikai, Punyabrat [1 ]
Devi, Khumukcham Sonam [1 ]
Singh, Khoirom Motilal [2 ]
机构
[1] Natl Inst Technol Silchar, Dept Comp Sci & Engn, Silchar 788010, Assam, India
[2] Indian Inst Informat Technol Imphal, Dept Comp Sci & Engn, Imphal 795002, Manipur, India
关键词
Dynamic S-boxes; Elliptic curve cryptography; Image encryption; Chaotic system;
D O I
10.1016/j.jisa.2024.103793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Images play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today's proliferating technology provides attackers an opportunity to breach and access confidential data that are not enciphered or weakly secured. There is a massive requirement for a robust image cryptosystem for the secure transmission of confidential images over an insecure network. Here, we present an encryption technique to encipher images using dynamic substitution boxes (S-boxes) generated by a chaotic system and the points from an elliptic curve over a finite field. The dynamic S-boxes generation depends on a key obtained from the hash value using Secure Hash Algorithm-512 ( SHA 512 ). Each different image generates different S-boxes making it immune to knownplaintext attacks. The input image pixels are permuted and substituted using dynamic permutation tables and dynamics S-boxes. The mean of S-box security analyses such as non-linearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation is obtained as 104, 0.510294, 0.51145, 0.046875, and 0.083252 respectively. The generated S-boxes using the proposed method meet the standards of secure S-boxes. The cipher output images produced by the proposed methodology are also examined using statistical and security analyses. The proposed method can resist cipher-text-only attacks and has a large keyspace of 512 bits to withstand a probabilistic or deterministic attack on the elliptic curve discrete logarithmic problems such as baby-step, giant-step attack, and Pollard's rho attack. The strength of the generated cipher image using the proposed method is substantiated by tests such as the National Institute of Standards and Technology randomness test, the local entropy, correlation analysis, and differential analysis. Comparisons are made with some of the related existing state-of-the-art methods and turn out to be on par or better with the other compared methods.
引用
收藏
页数:16
相关论文
共 23 条
[1]   Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography [J].
Abdelfatah, Roayat Ismail .
IEEE ACCESS, 2020, 8 :3875-3890
[2]  
[Anonymous], 2018, The USC-SIPI Image Database
[3]   A substitution box generator, its analysis, and applications in image encryption [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ayub, Maria .
SIGNAL PROCESSING, 2021, 187
[4]  
Bassham L., 2010, SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
[5]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[6]   Secure image encryption algorithm design using a novel chaos based S-Box [J].
Cavusoglu, Unal ;
Kacar, Sezgin ;
Pehlivan, Ihsan ;
Zengin, Ahmet .
CHAOS SOLITONS & FRACTALS, 2017, 95 :92-101
[7]  
Elliptic curve cryptography (ECC), 2016, brainpool standard curves and curve generation
[8]   An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques [J].
Haider, Muhammad Imran ;
Shah, Tariq ;
Ali, Asif ;
Shah, Dawood ;
Khalid, Ijaz .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2023, 209 :153-168
[9]   A novel image encryption scheme based on an elliptic curve [J].
Hayat, Umar ;
Azam, Naveed Ahmed .
SIGNAL PROCESSING, 2019, 155 :391-402
[10]   A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step [J].
Jun, Wang Ji ;
Fun, Tan Soo .
IEEE ACCESS, 2021, 9 :120596-120612