JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos

被引:4
作者
Hernandez-Diaz, Erick [1 ]
Perez-Meana, Hector [1 ]
Silva-Garcia, Victor [2 ]
Flores-Carapia, Rolando [2 ]
机构
[1] Inst Politecn Nacl, SEPI ESIME Culhuacan, Mexico City 04400, DF, Mexico
[2] Inst Politecn Nacl, CIDETEC, Mexico City 07700, DF, Mexico
关键词
applied cryptography; images encryption; jpeg encryption; elliptic-curve cryptography; chaos; logistic map; cryptanalysis; randomness; symmetric cryptosystem; substitution box;
D O I
10.3390/electronics10040413
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new symmetric encryption system based on an elliptical curve and chaos, where the encryption is done in a single block and runs for 14 rounds. Here, the 15 encryption keys have the same size as the image and are generated using a solution point of a strong elliptic curve. Using a string of random numbers obtained with a logistic map, a permutation and its inverse are generated, which improve the encryption level and add diffusion to the cryptosystem. Another important contribution to this research is the generation of a substitution box with a non-linearity of 100, which strengthens the cryptosystem against differential and linear attacks that add confusion to the scheme. Moreover, the cryptographic properties of the proposed S-Box are compared with those of the S-Box of the Advanced Encryption Standard (AES) to ascertain that it is a suitable alternative that it is resistant to differential power analysis (DPA) attacks. To verify the robustness of proposed cryptosystem against cryptanalysis and the quality of the cipher text obtained, this system is subjected to different tests, such as entropy, correlation coefficient, chi(2), Changing Pixel Rate (NPCR), and Unified Averaged Changing Intensity (UACI). The results are shown and compared with recently proposed systems.
引用
收藏
页码:1 / 26
页数:24
相关论文
共 39 条
  • [1] Abd-Elhafiez W. M., 2019, Advances in Intelligent Systems and Computing, V921, P645, DOI [10.1007/978-3-030-14118-9_64, DOI 10.1007/978-3-030-14118-9_64]
  • [2] Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography
    Abdelfatah, Roayat Ismail
    [J]. IEEE ACCESS, 2020, 8 : 3875 - 3890
  • [3] Abed Elgabar E.E., 2013, INT J SOFT COMPUT EN, V3, P91
  • [4] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [5] Designing secure substitution boxes based on permutation of symmetric group
    Anees, Amir
    Chen, Yi-Ping Phoebe
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (11) : 7045 - 7056
  • [6] [Anonymous], 2001, FIPS PUB
  • [7] [Anonymous], 1999, 463 FIPS NAT I STAND
  • [8] Image Size Variation Influence on Corrupted and Non-viewable BMP Image
    Azmi, Tengku Norsuhaila T.
    Abdullah, Nurul Azma
    Ab Rahman, Nurul Hidayah
    Hamid, Isredza Rahmi A.
    Wen, Chuah Chai
    [J]. INTERNATIONAL RESEARCH AND INNOVATION SUMMIT (IRIS2017), 2017, 226
  • [9] Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
  • [10] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654