Group-Action-Based S-box Generation Technique for Enhanced Block Cipher Security and Robust Image Encryption Scheme

被引:1
|
作者
Baowidan, Souad Ahmad [1 ]
Alamer, Ahmed [2 ]
Hassan, Mudassir [3 ]
Yousaf, Awais [3 ]
机构
[1] King Abdulaziz Univ, Fac Comp & IT, Informat Technol Dept, Jeddah 21589, Saudi Arabia
[2] Univ Tabuk, Fac Sci, Dept Math, Tabuk 71491, Saudi Arabia
[3] Islamia Univ Bahawalpur, Dept Math, Bahawalpur 63100, Pakistan
来源
SYMMETRY-BASEL | 2024年 / 16卷 / 08期
关键词
group structure; block ciphers; Galois fields; group action; S-box; CHAOTIC MAP; SUBSTITUTION-BOX; HEURISTIC-SEARCH; DESIGN; TRANSFORMATION;
D O I
10.3390/sym16080954
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Data security is one of the biggest concerns in the modern world due to advancements in technology, and cryptography ensures that the privacy, integrity, and authenticity of such information are safeguarded in today's digitally connected world. In this article, we introduce a new technique for the construction of non-linear components in block ciphers. The proposed S-box generation process is a transformational procedure through which the elements of a finite field are mapped onto highly nonlinear permutations. This transformation is achieved through a series of algebraic and combinatorial operations. It involves group actions on some pairs of two Galois fields to create an initial S-box Pr Sbox, which induces a rich algebraic structure. The post S-box Po Sbox, which is derived from heuristic group-based optimization, leads to high nonlinearity and other important cryptographic parameters. The proposed S-box demonstrates resilience against various attacks, making the system resistant to statistical vulnerabilities. The investigation reveals remarkable attributes, including a nonlinearity score of 112, an average Strict Avalanche Criterion score of 0.504, and LAP (Linear Approximation Probability) score of 0.062, surpassing well-established S-boxes that exhibit desired cryptographic properties. This novel methodology suggests an encouraging approach for enhancing the security framework of block ciphers. In addition, we also proposed a three-step image encryption technique comprising of Row Permutation, Bitwise XOR, and block-wise substitution using Po Sbox. These operations contribute to adding more levels of randomness, which improves the dispersion across the cipher image and makes it equally intense. Therefore, we were able to establish that the approach works to mitigate against statistical and cryptanalytic attacks. The PSNR, UACI, MSE, NCC, AD, SC, MD, and NAE data comparisons with existing methods are also provided to prove the efficiency of the encryption algorithm.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    JOURNAL OF VIBRATION AND CONTROL, 2014, 20 (14) : 2133 - 2136
  • [22] Fast S-box security mechanism research based on the polymorphic cipher
    Yin, Yifeng
    Li, Xinshe
    Hu, Yupu
    INFORMATION SCIENCES, 2008, 178 (06) : 1603 - 1610
  • [23] Block cipher algorithm based on multidimensional dynamic S-box and LFSR
    Zhao, Guosheng
    Li, Guangcheng
    Wang, Jian
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43 (05): : 119 - 123
  • [24] An efficient image encryption scheme integrating chaotic keystream generator with S-box and triangular block scrambling
    Chen, Su-hua
    Gong, Jue
    Gong, Li-hua
    Wang, Meng-meng
    JOURNAL OF MODERN OPTICS, 2024, 71 (1-3) : 82 - 99
  • [25] S-box generation algorithm based on hyperchaotic system and its application in image encryption
    Sen Yang
    Xiaojun Tong
    Zhu Wang
    Miao Zhang
    Multimedia Tools and Applications, 2023, 82 : 25559 - 25583
  • [26] S-box generation algorithm based on hyperchaotic system and its application in image encryption
    Yang, Sen
    Tong, Xiaojun
    Wang, Zhu
    Zhang, Miao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (17) : 25559 - 25583
  • [27] Elevating Network Security: A Novel S-Box Algorithm for Robust Data Encryption
    Alqahtani, Jarallah
    Akram, Muhammad
    Ali, Ghassan Ahmed
    Iqbal, Nadeem
    Alqahtani, Ali
    Alroobaea, Roobaea
    IEEE ACCESS, 2024, 12 : 2123 - 2134
  • [28] A novel colour image encryption algorithm using S-box technique
    Kakade, Kiran Shrimant
    Sarkar, Swagata
    Asha, S.
    Sivakumaran, C.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 255 - 266
  • [29] Elevating Network Security: A Novel S-Box Algorithm for Robust Data Encryption
    Alqahtani, Jarallah
    Akram, Muhammad
    Ali, Ghassan Ahmed
    Iqbal, Nadeem
    Alqahtani, Ali
    Alroobaea, Roobaea
    IEEE Access, 2024, 12 : 2123 - 2134
  • [30] An Efficient Image Encryption Scheme Based on: Henon Map, Skew Tent Map and S-Box
    Khan, Jansher
    Ahmad, Jawad
    Hwang, Seong Oun
    2015 6TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION, AND APPLIED OPTIMIZATION (ICMSAO), 2015,