The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9575852 | PMC |
http://dx.doi.org/10.7717/peerj-cs.892 | DOI Listing |
Entropy (Basel)
November 2024
Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China.
Image security faces increasing challenges with the widespread application of computer science and artificial intelligence. Although chaotic systems are employed to encrypt images and prevent unauthorized access or tampering, the degradation that occurs during the binarization process in chaotic systems reduces security. The chaos- and DNA-based image encryption schemes increases its complexity, while the integration of deep learning with image encryption is still in its infancy and has several shortcomings.
View Article and Find Full Text PDFSci Prog
January 2024
Department of Mathematics, Division of Science and Technology, University of Education, Lahore, Pakistan.
In modern cryptography, Substitution Boxes (S-boxes) are critical in introducing confusion into ciphertext, significantly enhancing encryption security. With the rising sophistication of hacking techniques, there is a growing need to develop stronger and more dynamic S-boxes. This paper proposes a novel method for constructing cryptographically secure S-boxes using graph theory, specifically based on the Minimum Spanning Tree (MST) of cycle graphs.
View Article and Find Full Text PDFMethodsX
December 2024
School of Social Sciences and Languages, Vellore Institute of Technology, Vandalur - Kelambakkam Road, Chennai 600127, Tamil Nadu, India.
This study of the article proposes an interdisciplinary approach, integrating quantum mechanics and structuralism to elucidate the complex dynamics of signification. By paralleling the ambiguous nature of subatomic particles with the linguistic system, the study examines the arbitrary relationship between sign, signifier, and signified through quantum principles. Key concepts from quantum mechanics, such as wave-particle duality, superposition, entanglement, and observer effect, are applied to Saussure's theory of signs, revealing intriguing analogies between the two domains.
View Article and Find Full Text PDFSci Rep
November 2024
Math and Computer Science Department, Faculty of Science, Menoufia University, Menoufia, 32511, Egypt.
In the contemporary landscape of smart cities, ensuring the security and confidentiality of transmitted data has become paramount. The proliferation of Internet of Things (IoT) devices, mobile communication platforms, and wireless sensor networks has magnified the need for robust cryptographic solutions to safeguard sensitive information from malicious adversaries. In response to these challenges, we introduce ChessCrypt-a novel approach to enhancing wireless communication security through the development of a new S-Box algorithm inspired by the nonlinear movement patterns of chess pieces.
View Article and Find Full Text PDFPLoS One
November 2024
College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq.
In this study, the chaotic behavior of a second-order circuit comprising a nonlinear resistor and Chua's diode is investigated. This circuit, which includes a nonlinear capacitor and resistor among its components, is considered one of the simplest nonautonomous circuits. The research explores various oscillator characteristics, emphasizing their chaotic properties through bifurcations, Lyapunov exponents, periodicity, local Lyapunov region, and resonance.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!