Block cipher's nonlinear component design by elliptic curves: an image encryption application

被引:34
作者
Haider, Muhammad Imran [1 ]
Ali, Asif [1 ]
Shah, Dawood [1 ]
Shah, Tariq [1 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
关键词
Elliptic curves; Substitution box; Pseudo-random numbers; Image encryption; WAVELET TRANSFORM; CHAOTIC MAP; SCHEME; CRYPTOGRAPHY; PERMUTATION;
D O I
10.1007/s11042-020-09892-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to less computational effort with strong security, Elliptic curve based cryptographic architectures are more reliable as compared to the existing cryptographic methods. In this manuscript, we have introduced an efficient cryptosystem based on elliptic curves for digital image encryption. The designed scheme is consisting of three steps. Initially, the system uses the special type of the isomorphic elliptic curves over a prime field and scrambles the pixel position of the plain image. Consequently, it disperses the intra-correlation among the pixels of the original image, and capable the scheme to be secure against statistical attacks. In the next step, the scheme generates multiple S-boxes with good cryptographic features by using isomorphic elliptic curves. The generated S-boxes are then used to substitute the scrambled data that produce optimum confusion in the ciphered data. Eventually, the encryption procedure generates pseudo-random numbers (PRNs) through the arithmetic operation of the elliptic curves instead of elliptic curve group law; the operation used in the scheme creates high randomness as a result our proposed scheme shows high security against classical attacks. The simulation results and performance analysis divulge that the proposed scheme has excellent encryption performance with less computational effort, which indicates that the scheme has effective potential in real-time image encryption application.
引用
收藏
页码:4693 / 4718
页数:26
相关论文
共 54 条
[1]   Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Mazurczyk, Wojciech ;
Fung, Carol ;
Venegas-Andraca, Salvador E. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :118-131
[2]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[3]  
Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
[4]   A Novel Ant Colony Optimization Based Scheme for Substitution Box Design [J].
Ahmad, Musheer ;
Bhatia, Deepanshu ;
Hassan, Yusuf .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :572-580
[5]  
[Anonymous], 2012, Galbraith
[6]   An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ullah, Ikram .
SECURITY AND COMMUNICATION NETWORKS, 2018,
[7]   A simple yet efficient S-box method based on chaotic sine map [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. .
OPTIK, 2017, 130 :1438-1444
[8]   Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms [J].
Belazi, Akram ;
El-Latif, Ahmed A. Abd ;
Diaconu, Adrian-Viorel ;
Rhouma, Rhouma ;
Belghith, Safya .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :37-50
[9]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[10]  
Belazi A, 2015, INT WIREL COMMUN, P606, DOI 10.1109/IWCMC.2015.7289152