An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component

被引:30
作者
Alghafis, Abdullah [1 ]
Munir, Noor [2 ,3 ]
Khan, Majid [2 ,3 ]
机构
[1] King Abdul Aziz City Sci & Technol, Riyadh, Saudi Arabia
[2] Inst Space Technol, Cyber & Informat Secur Lab CISL, Islamabad, Pakistan
[3] Inst Space Technol, Dept Appl Math & Stat, Islamabad, Pakistan
关键词
Rabinovich-Fabrikant chaotic system; Confusion component; Security analyses; HYPERCHAOTIC RABINOVICH; BIFURCATION-ANALYSIS; SECURITY ANALYSIS; IMAGE; CONSTRUCTION; OPTIMIZATION; ALGORITHM; BOXES;
D O I
10.1007/s11042-020-10142-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this research article, we have proposed a novel image encryption scheme for the confidentiality of digital information. The modern block ciphers based on confusion and diffusion characteristic, as proposed by Claude Shannon in 1949. Firstly, we have designed a nonlinear confusion component of a block cipher and apply the action of symmetry group S-8 to generate a pool of 40,320 substitution boxes with the same cryptographic strength. These nonlinear components are responsible for adding confusion in the encryption algorithm. Secondly, we have utilized a nonlinear chaotic dynamical system to add diffusion capability in our proposed encryption scheme. The suggested scheme is further examined under security performance evaluations, which shows the appropriateness of our offered scheme for digital contents.
引用
收藏
页码:7967 / 7985
页数:19
相关论文
共 50 条
[1]  
Ahmad M, 2018, J KING SAUD U CIS
[2]   ABC Optimization Based Construction of Strong Substitution-Boxes [J].
Ahmad, Musheer ;
Doja, M. N. ;
Beg, M. M. Sufyan .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) :1715-1729
[3]   Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos [J].
Ahmad, Musheer ;
Al Solami, Eesa ;
Wang, Xing-Yuan ;
Doja, M. N. ;
Beg, M. M. Sufyan ;
Alzaidi, Amer Awad .
SYMMETRY-BASEL, 2018, 10 (07)
[4]   Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network [J].
Ahmad, Musheer ;
Alam, Mohammad Zaiyan ;
Ansari, Subia ;
Lambic, Dragan ;
AlSharari, Hamed D. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) :1323-1332
[5]   A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map [J].
Ahmed, Hussam A. ;
Zolkipli, Mohamad Fadli ;
Ahmad, Musheer .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) :7201-7210
[6]   A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes [J].
Al Solami, Eesa ;
Ahmad, Musheer ;
Volos, Christos ;
Doja, Mohammad Najam ;
Beg, Mirza Mohd Sufyan .
ENTROPY, 2018, 20 (07)
[7]   An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System [J].
Alghafis, Abdullah ;
Munir, Noor ;
Khan, Majid ;
Hussain, Iqtadar .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) :1227-1240
[8]   A new construction of confusion component of block ciphers [J].
Ali, Khawaja Muhammad ;
Khan, Majid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) :32585-32604
[9]   Application Based Construction and Optimization of Substitution Boxes Over 2D Mixed Chaotic Maps [J].
Ali, Khawaja Muhammad ;
Khan, Majid .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) :3091-3117
[10]   A New 1D Chaotic Map and β-Hill Climbing for Generating Substitution-Boxes [J].
Alzaidi, Amer Awad ;
Ahmad, Musheer ;
Doja, M. N. ;
Al Solami, Eesa ;
Beg, M. M. Sufyan .
IEEE ACCESS, 2018, 6 :55405-55418