利用椭圆曲线点和混沌系统生成的动态 S 框进行图像加密

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Information Security and Applications Pub Date : 2024-05-22 DOI:10.1016/j.jisa.2024.103793
Laiphrakpam Dolendro Singh , Akash Lahoty , Chanubala Devi , Deepjoy Dey , Punyabrat Saikai , Khumukcham Sonam Devi , Khoirom Motilal Singh
{"title":"利用椭圆曲线点和混沌系统生成的动态 S 框进行图像加密","authors":"Laiphrakpam Dolendro Singh ,&nbsp;Akash Lahoty ,&nbsp;Chanubala Devi ,&nbsp;Deepjoy Dey ,&nbsp;Punyabrat Saikai ,&nbsp;Khumukcham Sonam Devi ,&nbsp;Khoirom Motilal Singh","doi":"10.1016/j.jisa.2024.103793","DOIUrl":null,"url":null,"abstract":"<div><p>Images play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today’s proliferating technology provides attackers an opportunity to breach and access confidential data that are not enciphered or weakly secured. There is a massive requirement for a robust image cryptosystem for the secure transmission of confidential images over an insecure network. Here, we present an encryption technique to encipher images using dynamic substitution boxes (S-boxes) generated by a chaotic system and the points from an elliptic curve over a finite field. The dynamic S-boxes generation depends on a key obtained from the hash value using Secure Hash Algorithm-512 (<span><math><mrow><mi>S</mi><mi>H</mi><mi>A</mi><mn>512</mn></mrow></math></span>). Each different image generates different S-boxes making it immune to known-plaintext attacks. The input image pixels are permuted and substituted using dynamic permutation tables and dynamics S-boxes. The mean of S-box security analyses such as non-linearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation is obtained as 104, 0.510294, 0.51145, 0.046875, and 0.083252 respectively. The generated S-boxes using the proposed method meet the standards of secure S-boxes. The cipher output images produced by the proposed methodology are also examined using statistical and security analyses. The proposed method can resist cipher-text-only attacks and has a large keyspace of 512 bits to withstand a probabilistic or deterministic attack on the elliptic curve discrete logarithmic problems such as baby-step, giant-step attack, and Pollard’s rho attack. The strength of the generated cipher image using the proposed method is substantiated by tests such as the National Institute of Standards and Technology randomness test, the local entropy, correlation analysis, and differential analysis. Comparisons are made with some of the related existing state-of-the-art methods and turn out to be on par or better with the other compared methods.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103793"},"PeriodicalIF":3.8000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system\",\"authors\":\"Laiphrakpam Dolendro Singh ,&nbsp;Akash Lahoty ,&nbsp;Chanubala Devi ,&nbsp;Deepjoy Dey ,&nbsp;Punyabrat Saikai ,&nbsp;Khumukcham Sonam Devi ,&nbsp;Khoirom Motilal Singh\",\"doi\":\"10.1016/j.jisa.2024.103793\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Images play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today’s proliferating technology provides attackers an opportunity to breach and access confidential data that are not enciphered or weakly secured. There is a massive requirement for a robust image cryptosystem for the secure transmission of confidential images over an insecure network. Here, we present an encryption technique to encipher images using dynamic substitution boxes (S-boxes) generated by a chaotic system and the points from an elliptic curve over a finite field. The dynamic S-boxes generation depends on a key obtained from the hash value using Secure Hash Algorithm-512 (<span><math><mrow><mi>S</mi><mi>H</mi><mi>A</mi><mn>512</mn></mrow></math></span>). Each different image generates different S-boxes making it immune to known-plaintext attacks. The input image pixels are permuted and substituted using dynamic permutation tables and dynamics S-boxes. The mean of S-box security analyses such as non-linearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation is obtained as 104, 0.510294, 0.51145, 0.046875, and 0.083252 respectively. The generated S-boxes using the proposed method meet the standards of secure S-boxes. The cipher output images produced by the proposed methodology are also examined using statistical and security analyses. The proposed method can resist cipher-text-only attacks and has a large keyspace of 512 bits to withstand a probabilistic or deterministic attack on the elliptic curve discrete logarithmic problems such as baby-step, giant-step attack, and Pollard’s rho attack. The strength of the generated cipher image using the proposed method is substantiated by tests such as the National Institute of Standards and Technology randomness test, the local entropy, correlation analysis, and differential analysis. Comparisons are made with some of the related existing state-of-the-art methods and turn out to be on par or better with the other compared methods.</p></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"83 \",\"pages\":\"Article 103793\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2024-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212624000966\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624000966","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

图像几乎在所有领域都发挥着重要作用,包括医疗、视频会议、天气预报、军事应用和最常见的社交媒体应用。当今技术的不断发展为攻击者提供了入侵和访问未加密或加密薄弱的机密数据的机会。为了在不安全的网络上安全传输机密图像,我们需要一个强大的图像加密系统。在这里,我们提出了一种加密技术,利用由混沌系统和有限域上椭圆曲线的点生成的动态置换盒(S-boxes)对图像进行加密。动态 S-boxes 的生成取决于使用安全哈希算法-512(SHA512)从哈希值中获得的密钥。每幅不同的图像都会生成不同的 S-box,从而避免了已知纯文本攻击。输入的图像像素通过动态置换表和动态 S-box 进行置换和替换。S-box 安全性分析(如非线性、严格雪崩准则、比特独立准则、差分逼近概率和线性逼近)的平均值分别为 104、0.510294、0.51145、0.046875 和 0.083252。利用所提方法生成的 S-box 符合安全 S-box 的标准。此外,还使用统计和安全分析方法检验了拟议方法生成的密码输出图像。所提出的方法可以抵御纯密码文本攻击,并具有 512 比特的大密钥空间,可以抵御对椭圆曲线离散对数问题的概率或确定性攻击,如婴儿步攻击、巨步攻击和 Pollard's rho 攻击。美国国家标准与技术研究院随机性测试、局部熵、相关性分析和差分分析等测试证实了使用所提方法生成的密码图像的强度。与现有的一些相关先进方法进行了比较,结果表明该方法与其他比较方法相当或更好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system

Images play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today’s proliferating technology provides attackers an opportunity to breach and access confidential data that are not enciphered or weakly secured. There is a massive requirement for a robust image cryptosystem for the secure transmission of confidential images over an insecure network. Here, we present an encryption technique to encipher images using dynamic substitution boxes (S-boxes) generated by a chaotic system and the points from an elliptic curve over a finite field. The dynamic S-boxes generation depends on a key obtained from the hash value using Secure Hash Algorithm-512 (SHA512). Each different image generates different S-boxes making it immune to known-plaintext attacks. The input image pixels are permuted and substituted using dynamic permutation tables and dynamics S-boxes. The mean of S-box security analyses such as non-linearity, strict avalanche criterion, bit independent criterion, differential approximation probability, and linear approximation is obtained as 104, 0.510294, 0.51145, 0.046875, and 0.083252 respectively. The generated S-boxes using the proposed method meet the standards of secure S-boxes. The cipher output images produced by the proposed methodology are also examined using statistical and security analyses. The proposed method can resist cipher-text-only attacks and has a large keyspace of 512 bits to withstand a probabilistic or deterministic attack on the elliptic curve discrete logarithmic problems such as baby-step, giant-step attack, and Pollard’s rho attack. The strength of the generated cipher image using the proposed method is substantiated by tests such as the National Institute of Standards and Technology randomness test, the local entropy, correlation analysis, and differential analysis. Comparisons are made with some of the related existing state-of-the-art methods and turn out to be on par or better with the other compared methods.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
期刊最新文献
Fed-LSAE: Thwarting poisoning attacks against federated cyber threat detection system via Autoencoder-based latent space inspection Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones BCRS-DS: A Privacy-protected data sharing scheme for IoT based on blockchain and certificateless ring signature Privacy-preserving verifiable fuzzy phrase search over cloud-based data Robust coverless video steganography based on pose estimation and object tracking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1