S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain

被引:14
作者
Beg, Saira [1 ]
Ahmad, Naveed [2 ]
Anjum, Adeel [1 ]
Ahmed, Mansoor [1 ]
Khan, Abid [1 ]
Baig, Fasial [3 ]
Khan, Ahmed [1 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Pakistan
[2] FAST Natl Univ Comp & Emerging Sci, Islamabad, Pakistan
[3] Fed Urdu Univ Arts Sci & Technol, Islamabad, Pakistan
关键词
S-box; Cryptography; Galois field; Projective linear group (PGL); Chaotic theory; Text-2-image conversion; Recommendation system; NIST standard; SUBSTITUTION BOX; ENCRYPTION; CRYPTANALYSIS; CONSTRUCTION;
D O I
10.1007/s11042-019-08464-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The strength of cryptography encryption is strongly depended upon the substitution box (S-box), hence highly non-linear S-box is appreciated in cryptography. In this work, we proposed a scheme to select the optimized values for control parameters (a, b, c, d) of linear fractional transform (LFT) to achieve an S-box with non-linearity of 112. For dynamic parameter values, we used location of chaotic sequences. The proposed s-box tested on different criteria such as non-linearity method (NL), probability methods (linear approximation (LP), differential approximation (DP), strictly avalanche criteria (SAC) and bit independence criteria (BIC). Our result shows that proposed s-box achieves better or equal to cryptographic strength as compared with state-of-the-art techniques. Moreover, we tested the proposed s-box based encryption method in recommendation system scenario with the idea of text-to-image conversion. The statistical analysis of this image encryption shows the bright prospects of the proposed method.
引用
收藏
页码:11667 / 11684
页数:18
相关论文
共 54 条
  • [1] A novel image steganography technique based on quantum substitution boxes
    Abd EL-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    [J]. OPTICS AND LASER TECHNOLOGY, 2019, 116 : 92 - 102
  • [2] Robust Encryption of Quantum Medical Images
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Talha, Muhammad
    [J]. IEEE ACCESS, 2018, 6 : 1073 - 1081
  • [3] A new image encryption scheme based on cyclic elliptic curve and chaotic system
    Abd El-Latif, Ahmed A.
    Li, Li
    Niu, Xiamu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1559 - 1584
  • [4] A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Li, Li
    Wang, Ning
    Peng, Jia-Liang
    Niu, Xiamu
    [J]. OPTICS AND LASER TECHNOLOGY, 2013, 54 : 389 - 400
  • [5] A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces
    Abd El-Latif, Ahmed A.
    Li, Li
    Wang, Ning
    Han, Qi
    Niu, Xiamu
    [J]. SIGNAL PROCESSING, 2013, 93 (11) : 2986 - 3000
  • [6] An encryption protocol for NEQR images based on one-particle quantum walks on a circle
    Abd-El-Atty, Bassem
    Abd El-Latif, Ahmed A.
    Venegas-Andraca, Salvador E.
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (09)
  • [7] Analysis of S-box image encryption based on generalized fuzzy soft expert set
    Abdullah, Saleem
    Ul Amin, Noor
    [J]. NONLINEAR DYNAMICS, 2015, 79 (03) : 1679 - 1692
  • [8] Design of a strong S-box based on a matrix approach
    Aboytes-Gonzalez, J. A.
    Murguia, J. S.
    Mejia-Carlos, M.
    Gonzalez-Aguilar, H.
    Ramirez-Torres, M. T.
    [J]. NONLINEAR DYNAMICS, 2018, 94 (03) : 2003 - 2012
  • [9] Abusukhon A., 2014, INT J COMPUT APPL, V106, P1
  • [10] A New Hyperchaotic System-Based Design for Efficient Bijective Substitution-Boxes
    Al Solami, Eesa
    Ahmad, Musheer
    Volos, Christos
    Doja, Mohammad Najam
    Beg, Mirza Mohd Sufyan
    [J]. ENTROPY, 2018, 20 (07)