scholarly journals Substitution box generation using Chaos: An image encryption application

2018 ◽  
Vol 332 ◽  
pp. 123-135 ◽  
Author(s):  
V.M. Silva-García ◽  
R. Flores-Carapia ◽  
C. Rentería-Márquez ◽  
B. Luna-Benoso ◽  
M. Aldape-Pérez
Author(s):  
Fadia Ali Khan ◽  
Jameel Ahmed ◽  
Jan Sher Khan ◽  
Jawad Ahmad ◽  
Muazzam A. Khan ◽  
...  

Entropy ◽  
2020 ◽  
Vol 22 (11) ◽  
pp. 1276
Author(s):  
Khushbu Khalid Butt ◽  
Guohui Li ◽  
Fawad Masood ◽  
Sajid Khan

Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades. This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption. The suggested encryption technique has more excellent key space and significant confidentiality. The chaotic system, along with the substitution box, exhibits additional complicated dynamical behavior, sufficient arbitrariness, and uncertainty than all others focused on just chaotic models. Theoretical and simulation assessments show that the offered image encryption performs admirably, its traditional equivalents in terms by efficiency in terms of statistical analysis.


PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0241890 ◽  
Author(s):  
Nasir Siddiqui ◽  
Fahim Yousaf ◽  
Fiza Murtaza ◽  
Muhammad Ehatisham-ul-Haq ◽  
M. Usman Ashraf ◽  
...  

Cryptography is commonly used to secure communication and data transmission over insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic algorithms offering security facilities for maintaining more cover-ups. A substitution-box (S-box) is the lone component in a cryptosystem that gives rise to a nonlinear mapping between inputs and outputs, thus providing confusion in data. An S-box that possesses high nonlinearity and low linear and differential probability is considered cryptographically secure. In this study, a new technique is presented to construct cryptographically strong 8×8 S-boxes by applying an adjacency matrix on the Galois field GF(28). The adjacency matrix is obtained corresponding to the coset diagram for the action of modular group PSL(2,Z) on a projective line PL(F7) over a finite field F7. The strength of the proposed S-boxes is examined by common S-box tests, which validate their cryptographic strength. Moreover, we use the majority logic criterion to establish an image encryption application for the proposed S-boxes. The encryption results reveal the robustness and effectiveness of the proposed S-box design in image encryption applications.


Integration ◽  
2021 ◽  
Author(s):  
Majid Khan ◽  
Sajjad Shaukat Jamal ◽  
Mohammad Mazyad Hazzazi ◽  
Khawaja Muhammad Ali ◽  
Iqtadar Hussain ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document