Block cipher's nonlinear component design by elliptic curves: an image encryption application

被引:31
|
作者
Haider, Muhammad Imran [1 ]
Ali, Asif [1 ]
Shah, Dawood [1 ]
Shah, Tariq [1 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
关键词
Elliptic curves; Substitution box; Pseudo-random numbers; Image encryption; WAVELET TRANSFORM; CHAOTIC MAP; SCHEME; CRYPTOGRAPHY; PERMUTATION;
D O I
10.1007/s11042-020-09892-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to less computational effort with strong security, Elliptic curve based cryptographic architectures are more reliable as compared to the existing cryptographic methods. In this manuscript, we have introduced an efficient cryptosystem based on elliptic curves for digital image encryption. The designed scheme is consisting of three steps. Initially, the system uses the special type of the isomorphic elliptic curves over a prime field and scrambles the pixel position of the plain image. Consequently, it disperses the intra-correlation among the pixels of the original image, and capable the scheme to be secure against statistical attacks. In the next step, the scheme generates multiple S-boxes with good cryptographic features by using isomorphic elliptic curves. The generated S-boxes are then used to substitute the scrambled data that produce optimum confusion in the ciphered data. Eventually, the encryption procedure generates pseudo-random numbers (PRNs) through the arithmetic operation of the elliptic curves instead of elliptic curve group law; the operation used in the scheme creates high randomness as a result our proposed scheme shows high security against classical attacks. The simulation results and performance analysis divulge that the proposed scheme has excellent encryption performance with less computational effort, which indicates that the scheme has effective potential in real-time image encryption application.
引用
收藏
页码:4693 / 4718
页数:26
相关论文
共 50 条
  • [1] Block cipher’s nonlinear component design by elliptic curves: an image encryption application
    Muhammad Imran Haider
    Asif Ali
    Dawood Shah
    Tariq Shah
    Multimedia Tools and Applications, 2021, 80 : 4693 - 4718
  • [2] Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher
    Rehman, Hafeez Ur
    Shah, Tariq
    Hazzazi, Mohammad Mazyad
    Alshehri, Ali
    Zaid, Bassfar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 2913 - 2930
  • [3] Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption
    Safdar, Muhammad Umair
    Shah, Tariq
    Ali, Asif
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025, 50 (02) : 785 - 806
  • [4] Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm
    Khan, Waqar Ahmad
    Gondal, Muhammad Asif
    3D RESEARCH, 2014, 5 (04):
  • [5] Block Cipher Nonlinear Component Generation via Hybrid Pseudo-Random Binary Sequence for Image Encryption
    Malik, Dania Saleem
    Shah, Tariq
    Tehsin, Sara
    Nasir, Inzamam Mashood
    Fitriyani, Norma Latif
    Syafrudin, Muhammad
    MATHEMATICS, 2024, 12 (15)
  • [6] Design and Implementation of A Chaotic Cipher Block Chaining Mode for Image Encryption
    Ta Thi Kim Hue
    Thang Manh Hoang
    Al Assad, Safwan
    2013 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2013, : 185 - 190
  • [7] Design of nonlinear component of block cipher using quaternion integers
    Tariq Shah
    Dilawar Abbas Khan
    Asif Ali
    Multimedia Tools and Applications, 2024, 83 : 25657 - 25674
  • [8] Design of nonlinear component of block cipher using quaternion integers
    Shah, Tariq
    Khan, Dilawar Abbas
    Ali, Asif
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25657 - 25674
  • [9] A fast chaotic block cipher for image encryption
    Fouda, J. S. Armand Eyebe
    Effa, J. Yves
    Sabat, Samrat L.
    Ali, Maaruf
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (03) : 578 - 588
  • [10] Construction of highly non linear component of block cipher based on mclaurin series and mellin transformation with application in image encryption
    Abid Mahboob
    Imran Siddique
    Muhammad Asif
    Muhammad Nadeem
    Aysha Saleem
    Multimedia Tools and Applications, 2024, 83 : 7159 - 7177