Construction of S-box based on chaotic Boolean functions and its application in image encryption

被引:126
|
作者
Khan, Majid [1 ]
Shah, Tariq [2 ]
Batool, Syeda Iram [2 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Sci & Humanities, Islamabad, Pakistan
[2] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
来源
NEURAL COMPUTING & APPLICATIONS | 2016年 / 27卷 / 03期
关键词
Chaos; Binary chaotic sequences; Substitution box; ALGEBRAIC ATTACKS; SUBSTITUTION BOX; CRYPTANALYSIS; MAP; CRYPTOGRAPHY; CIPHERS;
D O I
10.1007/s00521-015-1887-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In numerous encryption frameworks, the first information is changed into encoded form by applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is to accomplish high level of randomness in the image content. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic frameworks show random conduct that is suitable for encryption applications where nonlinear transformations are needed in the middle of plaintext and the scrambled information. The application of nonlinear functional chaos-based system with embedded chaotic systems and binary chaotic sequences can prompt randomness and diffusion in the information. In addition to the high state of randomness, the requirement for various round keys is needed in a run of the mill substitution-permutation process. The proposed strategy kills the requirement for different round keys, which is suitable for high-speed communication frameworks. The measurable analyses performed on the proposed nonlinear algorithm which show improvement in encryption quality and safety against numerous brute-force and statistical attacks. Also, the proposed framework demonstrates high safety against differential and linear cryptanalysis.
引用
收藏
页码:677 / 685
页数:9
相关论文
共 50 条
  • [21] An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box
    Lu, Qing
    Zhu, Congxu
    Deng, Xiaoheng
    IEEE ACCESS, 2020, 8 : 25664 - 25678
  • [22] Selective image encryption scheme based on DWT, AES S-box and chaotic permutation
    Belazi, Akram
    El-Latif, Ahmed A. Abd
    Rhouma, Rhouma
    Belghith, Safya
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 606 - 610
  • [23] An Image Encryption Algorithm Using Cascade Chaotic Map and S-Box
    Zheng, Jiming
    Bao, Tianyu
    ENTROPY, 2022, 24 (12)
  • [24] An image encryption algorithm using a dynamic S-box and chaotic maps
    Zheng, Jiming
    Zeng, Qingxia
    APPLIED INTELLIGENCE, 2022, 52 (13) : 15703 - 15717
  • [25] Image encryption algorithm based on hyper-chaotic system and dynamic S-box
    Liu, Yang
    Tong, Xiaojun
    Ma, Jing
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (13) : 7739 - 7759
  • [26] An image encryption algorithm using a dynamic S-box and chaotic maps
    Jiming Zheng
    Qingxia Zeng
    Applied Intelligence, 2022, 52 : 15703 - 15717
  • [27] A Lightweight Image Encryption Algorithm Based on a Dual Chaotic System and Dynamic S-box
    Chen, Rui-Hong
    Zhang, Qiu-Yu
    Meng, Ling-Tao
    Liu, Yi-Lin
    International Journal of Network Security, 2024, 26 (02) : 270 - 284
  • [28] Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    JOURNAL OF VIBRATION AND CONTROL, 2014, 20 (14) : 2133 - 2136
  • [29] S-Box Design Based on 2D Multiple Collapse Chaotic Map and Their Application in Image Encryption
    Yang, Chao
    Wei, Xia
    Wang, Cong
    ENTROPY, 2021, 23 (10)
  • [30] Stego optical encryption based on chaotic S-box transformation
    Hussain, Iqtadar
    Azam, Naveed Ahmed
    Shah, Tariq
    OPTICS AND LASER TECHNOLOGY, 2014, 61 : 50 - 56