{"title":"Fast image encryption algorithm with random structures","authors":"Taha Etem, Turgay Kaya","doi":"10.1080/1206212x.2023.2260617","DOIUrl":null,"url":null,"abstract":"AbstractBlock encryption algorithms are among the most preferred applications in cryptographic systems. Block ciphers should have accomplished some requirements for a secure communication system. They should be evaluated in terms of cryptanalysis methods for widespread usage. The aim of this paper is to introduce a new secure and fast block encryption algorithm for images. For this purpose, a new block cipher, which offers an innovative encryption structure for key generation systems and can use S-boxes with different methods, is proposed. A Dynamic S-Box is used in the algorithm for both substitution and key generation purposes. Linear and differential cryptanalysis methods were performed successfully. UACI and NPCR tests show that the proposed symmetric block cipher algorithm is compatible with image encryption systems. The 512-bit key length provides the highest security for block encryption. Additionally, information entropy test, correlation coefficients, mean-squared error, and peak signal-to-noise ratio analyses were concluded successfully. The novelty of the paper is building a cryptanalysis attack-resistant block cipher algorithm that presents a lightweight cryptographic solution for image encryption systems.KEYWORDS: Block ciphersymmetric encryptionS-BoxNPCR and UACIimage processing AcknowledgementsThis study has been produced from the doctoral dissertation of Taha Etem. Authors’ contributions: T.E. conceived and designed the analysis, collected the data, contributed analysis tools, and wrote the paper. T.K. edited the paper, controlled the analysis, and supervised.Disclosure statementNo potential conflict of interest was reported by the author(s).Availability of data and materialData sharing is not applicable to this article as no new data were created or analyzed in this study.Additional informationNotes on contributorsTaha EtemTaha Etem received the B.Sc. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2013, and the M.Sc. degree in Electrical-Electronics Engineering from Inonu University, Malatya, Turkey, in 2017, and received the Ph.D. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2022. He was with Cankiri Karatekin University, Cankiri, Turkey, as a Faculty Member. He is currently an Assistant Professor in the Computer Engineering Department. His research interests include encryption systems, random number generators and radio-frequency systems.Turgay KayaTurgay Kaya was born in Elazig, Turkey, in 1982. He received the B.Sc., M.Sc. and Ph.D. degrees in electrical-electronics engineering from the Firat University in 2003, 2006 and 2011, respectively. From 2004 to 20013, he was a Research Assistant at department of electrical-electronics engineering, Firat University, Elazig, Turkey. Since 2013, he has been an Associate Professor same department. His research interests include digital and analog filter design, biomedical signal processing, signal and image processing, microprocessing, artificial intelligence, heuristic optimization.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212x.2023.2260617","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
AbstractBlock encryption algorithms are among the most preferred applications in cryptographic systems. Block ciphers should have accomplished some requirements for a secure communication system. They should be evaluated in terms of cryptanalysis methods for widespread usage. The aim of this paper is to introduce a new secure and fast block encryption algorithm for images. For this purpose, a new block cipher, which offers an innovative encryption structure for key generation systems and can use S-boxes with different methods, is proposed. A Dynamic S-Box is used in the algorithm for both substitution and key generation purposes. Linear and differential cryptanalysis methods were performed successfully. UACI and NPCR tests show that the proposed symmetric block cipher algorithm is compatible with image encryption systems. The 512-bit key length provides the highest security for block encryption. Additionally, information entropy test, correlation coefficients, mean-squared error, and peak signal-to-noise ratio analyses were concluded successfully. The novelty of the paper is building a cryptanalysis attack-resistant block cipher algorithm that presents a lightweight cryptographic solution for image encryption systems.KEYWORDS: Block ciphersymmetric encryptionS-BoxNPCR and UACIimage processing AcknowledgementsThis study has been produced from the doctoral dissertation of Taha Etem. Authors’ contributions: T.E. conceived and designed the analysis, collected the data, contributed analysis tools, and wrote the paper. T.K. edited the paper, controlled the analysis, and supervised.Disclosure statementNo potential conflict of interest was reported by the author(s).Availability of data and materialData sharing is not applicable to this article as no new data were created or analyzed in this study.Additional informationNotes on contributorsTaha EtemTaha Etem received the B.Sc. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2013, and the M.Sc. degree in Electrical-Electronics Engineering from Inonu University, Malatya, Turkey, in 2017, and received the Ph.D. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2022. He was with Cankiri Karatekin University, Cankiri, Turkey, as a Faculty Member. He is currently an Assistant Professor in the Computer Engineering Department. His research interests include encryption systems, random number generators and radio-frequency systems.Turgay KayaTurgay Kaya was born in Elazig, Turkey, in 1982. He received the B.Sc., M.Sc. and Ph.D. degrees in electrical-electronics engineering from the Firat University in 2003, 2006 and 2011, respectively. From 2004 to 20013, he was a Research Assistant at department of electrical-electronics engineering, Firat University, Elazig, Turkey. Since 2013, he has been an Associate Professor same department. His research interests include digital and analog filter design, biomedical signal processing, signal and image processing, microprocessing, artificial intelligence, heuristic optimization.
期刊介绍:
The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.