Robust image encryption scheme based on 6D hyper-chaos and DPA-resistant S-box

被引:0
作者
Khadem, Behrooz [1 ]
Gholamzadeh, Mohammad [1 ]
Ahmad, Musheer [2 ]
Ansari, Zamir Ahmad [3 ]
机构
[1] Imam Hossein Univ, Informat Technol & Commun Fac, Tehran, Iran
[2] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[3] Indian Inst Informat Technol Sonipat, Dept Math, Sonipat, Haryana, India
关键词
chaotic mapping; differential power attack; image encryption; secure sbox; transparency order; SYSTEM;
D O I
10.1088/1402-4896/adadab
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Image encryption is widely used for securing digital images, with chaos-based schemes among the most promising solutions. Recently, Khalid M. Hosny proposed an image encryption scheme based on a 6D hyperchaotic system and Fibonacci Q-matrix. While this scheme offers notable benefits, it suffers from significant weaknesses, such as improper utilization of initial parameters, weak keys, and flaws in key management, making it vulnerable to attacks. Additionally, it fails to encrypt homogeneous images, after any iteration. This paper proposes an enhanced encryption scheme that addresses these weaknesses. The statistical and simulation test results show that our scheme outperforms the original scheme in terms of security and performance. It passed standard security tests (such as image histogram, chi-square distribution, NPCR, UACI, entropy, correlation, and key space analysis) for standard images at n = 2 iterations. The proposed scheme includes a cryptographic key with low computational cost, a high-resistant S-box to DPA attacks, and improved chaos parameter transfer to provide security. Experimental results show that the proposed scheme outperforms similar schemes in both security and bandwidth consumption.
引用
收藏
页数:21
相关论文
共 37 条
[1]   Pseudo-Chaotic Lossy Compressors for True Random Number Generation [J].
Addabbo, Tommaso ;
Fort, Ada ;
Kocarev, Ljupco ;
Rocchi, Santina ;
Vignoli, Valerio .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2011, 58 (08) :1897-1909
[2]   Theory and practice of chaotic cryptography [J].
Amigo, J. M. ;
Kocarev, L. ;
Szczepanski, J. .
PHYSICS LETTERS A, 2007, 366 (03) :211-216
[3]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[4]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[5]   Arduino-based chaotic secure communication system using multi-directional multi-scroll chaotic oscillators [J].
Dalia Pano-Azucena, Ana ;
de Jesus Rangel-Magdaleno, Jose ;
Tlelo-Cuautle, Esteban ;
de Jesus Quintas-Valles, Antonio .
NONLINEAR DYNAMICS, 2017, 87 (04) :2203-2217
[6]   Design, Implementation, and Analysis of a Block Cipher Based on a Secure Chaotic Generator [J].
Dridi, Fethi ;
El Assad, Safwan ;
Youssef, Wajih El Hadj ;
Machhout, Mohsen ;
Lozi, Rene .
APPLIED SCIENCES-BASEL, 2022, 12 (19)
[7]   Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps [J].
Duong, Phuc-Phan ;
Nguyen, Hieu Minh ;
Dao, Ba-Anh ;
Kieu-Do-Nguyen, Binh ;
Tran, Thai-Ha ;
Hoang, Trong-Thuc ;
Pham, Cong-Kha .
IEEE ACCESS, 2024, 12 :63976-63994
[8]   A novel method for designing S-box based on chaotic map and Teaching-Learning-Based Optimization [J].
Farah, Tarek ;
Rhouma, Rhouma ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 88 (02) :1059-1074
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]   Statistical properties of dynamical systems - Simulation and abstract computation [J].
Galatolo, Stefano ;
Hoyrup, Mathieu ;
Rojas, Cristobal .
CHAOS SOLITONS & FRACTALS, 2012, 45 (01) :1-14