An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component

被引:28
作者
Alghafis, Abdullah [1 ]
Munir, Noor [2 ,3 ]
Khan, Majid [2 ,3 ]
机构
[1] King Abdul Aziz City Sci & Technol, Riyadh, Saudi Arabia
[2] Inst Space Technol, Cyber & Informat Secur Lab CISL, Islamabad, Pakistan
[3] Inst Space Technol, Dept Appl Math & Stat, Islamabad, Pakistan
关键词
Rabinovich-Fabrikant chaotic system; Confusion component; Security analyses; HYPERCHAOTIC RABINOVICH; BIFURCATION-ANALYSIS; SECURITY ANALYSIS; IMAGE; CONSTRUCTION; OPTIMIZATION; ALGORITHM; BOXES;
D O I
10.1007/s11042-020-10142-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this research article, we have proposed a novel image encryption scheme for the confidentiality of digital information. The modern block ciphers based on confusion and diffusion characteristic, as proposed by Claude Shannon in 1949. Firstly, we have designed a nonlinear confusion component of a block cipher and apply the action of symmetry group S-8 to generate a pool of 40,320 substitution boxes with the same cryptographic strength. These nonlinear components are responsible for adding confusion in the encryption algorithm. Secondly, we have utilized a nonlinear chaotic dynamical system to add diffusion capability in our proposed encryption scheme. The suggested scheme is further examined under security performance evaluations, which shows the appropriateness of our offered scheme for digital contents.
引用
收藏
页码:7967 / 7985
页数:19
相关论文
共 50 条
  • [1] Ahmad M, 2018, J KING SAUD U CIS
  • [2] ABC Optimization Based Construction of Strong Substitution-Boxes
    Ahmad, Musheer
    Doja, M. N.
    Beg, M. M. Sufyan
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (03) : 1715 - 1729
  • [3] Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos
    Ahmad, Musheer
    Al Solami, Eesa
    Wang, Xing-Yuan
    Doja, M. N.
    Beg, M. M. Sufyan
    Alzaidi, Amer Awad
    [J]. SYMMETRY-BASEL, 2018, 10 (07):
  • [4] Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network
    Ahmad, Musheer
    Alam, Mohammad Zaiyan
    Ansari, Subia
    Lambic, Dragan
    AlSharari, Hamed D.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1323 - 1332
  • [5] A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
    Ahmed, Hussam A.
    Zolkipli, Mohamad Fadli
    Ahmad, Musheer
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) : 7201 - 7210
  • [6] A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes
    Al Solami, Eesa
    Ahmad, Musheer
    Volos, Christos
    Doja, Mohammad Najam
    Beg, Mirza Mohd Sufyan
    [J]. ENTROPY, 2018, 20 (07)
  • [7] An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System
    Alghafis, Abdullah
    Munir, Noor
    Khan, Majid
    Hussain, Iqtadar
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (04) : 1227 - 1240
  • [8] A new construction of confusion component of block ciphers
    Ali, Khawaja Muhammad
    Khan, Majid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 32585 - 32604
  • [9] Application Based Construction and Optimization of Substitution Boxes Over 2D Mixed Chaotic Maps
    Ali, Khawaja Muhammad
    Khan, Majid
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) : 3091 - 3117
  • [10] A New 1D Chaotic Map and β-Hill Climbing for Generating Substitution-Boxes
    Alzaidi, Amer Awad
    Ahmad, Musheer
    Doja, M. N.
    Al Solami, Eesa
    Beg, M. M. Sufyan
    [J]. IEEE ACCESS, 2018, 6 : 55405 - 55418