Jpeg images encryption scheme using elliptic curves and a new s-box generated by chaos

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

This paper proposes a new symmetric encryption system based on an elliptical curve and chaos, where the encryption is done in a single block and runs for 14 rounds. Here, the 15 encryption keys have the same size as the image and are generated using a solution point of a strong elliptic curve. Using a string of random numbers obtained with a logistic map, a permutation and its inverse are generated, which improve the encryption level and add diffusion to the cryptosystem. Another important contribution to this research is the generation of a substitution box with a non-linearity of 100, which strengthens the cryptosystem against differential and linear attacks that add confusion to the scheme. Moreover, the cryptographic properties of the proposed S-Box are compared with those of the S-Box of the Advanced Encryption Standard (AES) to ascertain that it is a suitable alternative that it is resistant to differential power analysis (DPA) attacks. To verify the robustness of proposed cryptosystem against cryptanalysis and the quality of the cipher text obtained, this system is subjected to different tests, such as entropy, correlation coefficient,, Changing Pixel Rate (NPCR), and Unified Averaged Changing Intensity (UACI). The results are shown and compared with recently proposed systems.

Original languageEnglish
Article number413
Pages (from-to)1-26
Number of pages26
JournalElectronics (Switzerland)
Volume10
Issue number4
DOIs
StatePublished - 2 Feb 2021

Keywords

  • Applied cryptography
  • Chaos
  • Cryptanalysis
  • Elliptic-curve cryptography
  • Images encryption
  • Jpeg encryption
  • Logistic map
  • Randomness
  • Substitution box
  • Symmetric cryptosystem

Fingerprint

Dive into the research topics of 'Jpeg images encryption scheme using elliptic curves and a new s-box generated by chaos'. Together they form a unique fingerprint.

Cite this