Abstract
Robust block substitution techniques are essential to protect information against sophisticated cryptographic attacks. Existing techniques use static methods, mainly Sbox substitution, to increase nonlinearity. These static substitutions have significant weaknesses, however. Bit alterations impacts only the specific block where the bit alterations occur without extending their effects to subsequent blocks. Second, current block substitution techniques only leverage alterations in input symbols to boost confusion without considering other significant changes such as the positions of the altered symbols within the input block. To address the limitations, a more dynamic block substitution is presented. This new block substitution technique effectively monitors changes in input symbols and extends the impact of these changes to cover the entire ciphertext. The proposed method utilizes operations based on chaos, deep symbol mutation, and memory loss models to process the input blocks. We analyzed the performance of the technique using robust testing tools. Our experiments demonstrated that the proposed technique surpasses existing methods in nonlinearity and randomness metrics, achieving SAC (0.50190), BIC (111.67), NL (112.0), and entropy (7.99997). Furthermore, we integrated the proposed substitution technique into both text and image encryption techniques. The experimental study showed a substantial improvement in the performance of these techniques when using the proposed substitution technique.
Similar content being viewed by others
Data availability
All data generated or analyzed during this study are included in this published article.
References
Mohammed, T., Hani, S., Yousuf, S., Al-Qutayri, M., Baker, M.: DS2B: Dynamic and secure substitution box for efficient speech encryption engine. IEEE Access 9, 93902–93915 (2021)
Daemen, J., Rijmen, V.: The Advanced Encryption Standard Process (AES). Information Security and Cryptography, vol. 1, pp. 1–8. Springer, Berlin (2002)
Abd-El-Atty, B.: Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. Complex Intell Syst (2023)
Xianglian, X., Dongsheng, Z., Changjun, Z.: New insights into the existing image encryption algorithms based on DNA coding. PLoS ONE 15(10), 1–31 (2020)
Mahboob, A., Nadeem, M., Rasheed, M.W.: A study of text-theoretical approach to S-box construction with image encryption applications. Sci. Rep. 13(1), 21081 (2023)
Samiullah, M., Aslam, W., Nazir, H., Ikramullah, M.L., Shahzad, B., Mufti, M.R., Afzal, H.: An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access 8, 25650–25663 (2020)
Wang, X., Guan, N., Zhao, H., et al.: A new image encryption scheme based on coupling map lattices with mixed multi-chaos. Sci. Rep. 10 (2020)
Jamal, S.S., Hazzazi, M.M., Khan, M.F., Bassfar, Z., Aljaedi, A., ul Islam, Z.: Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst Appl. 238, 122030 (2024)
Rajendran, S., Doraipandian, M., Seethalakshmi, R., Kirthivasan, K.: An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme. Multimed. Tools Appl. (2023)
Azam, N.A., Hayat, U., Ayub, M.: A substitution box generator, its analysis, and applications in image encryption. Signal Process. 187, 108–144 (2021)
Zafar, S., Idrees, B., Rashid, T.: An algorithm for construction of substitution box based on subfield of galois field GF(\(2^{16}\)) and dynamic linear fractional transformation. Multimed. Tools Appl. (2023)
Hussain, Z.A., Junaid, A.M., Musheer, A.: A novel construction of efficient substitution-boxes using cubic fractional transformation. Entropy 21(3) (2019)
Hayat, U., Azam, N.A., Asif, M.: A method of generating \(8\times 8\) substitution boxes based on elliptic curves. Wirel. Pers. Commun. 101 (2018)
Abdul Mujeeb Khan, M., Azam, N.A., Hayat, U., Kamarulhaili, H.: A novel deterministic substitution box generator over elliptic curves for real-time applications. J. King Saud Univ. Comput. Inf. Sci. 35(1), 219–236 (2023)
Tariq, S., Ayesha, Q.: S-Box on subgroup of Galois field. Cryptography 3(2), (2019)
Zahid, A.H., Elahi, H.A.M., Ahmad, M., Maghrabi, L.A., Said, R.S.A.: Secure key-based substitution-boxes design using systematic search for high nonlinearity. IEEE Access 11, 139745–139758 (2023)
Khan, M.F., Adeel, A., Khalid, S.: A novel cryptographic substitution box design using gaussian distribution. IEEE Access 7, 15999–16007 (2019)
Qing, L., Congxu, Z., Xiaoheng, D.: An efficient image encryption scheme based on the LSS chaotic map and single S-box. IEEE Access 8, 25664–25678 (2020)
Ramzan, M., Shah, T., Hazzazi, M., Aljaedi, A., Alharbi, A.R.: Construction of S-boxes using different maps over elliptic curves for image encryption. IEEE Access (2021)
Mahboob, A., Siddique, I., Asif, M., Nadeem, M., Saleem, A.: Construction of highly non linear component of block cipher based on Mclaurin series and Mellin transformation with application in image encryption. Multimed. Tools Appl. (2023)
Malik, A.W., Zahid, A.H., Bhatti, D.S., Kim, H.J., Kim, K.-I.: Designing S-box using tent-sine chaotic system while combining the traits of tent and sine map. IEEE Access 11, 79265–79274 (2023)
Artuğer, F., Özkaynak, F.: A method for generation of substitution box based on random selection. Egypt. Inform. J. 23(1), 127–135 (2022)
Özkaynak, F.: Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl. 31, 3317–3326 (2019)
Abd-El-Atty, B.: Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. Complex Intell. Syst. 9(5), 4817–4835 (2023)
Lawah, A.I., Ibrahim, A.A., Salih, S.Q., Alhadawi, H.S., JosephNg, P.S.: Grey wolf optimizer and discrete chaotic map for substitution boxes design and optimization. IEEE Access 11, 42416–42430 (2023)
Ahmad, M., Khaja, I.A., Baz, A., Alhakami, H., Alhakami, W.: Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications. IEEE Access 8, 116132–116147 (2020)
Farah, M.A.B., Farah, A., Farah, T.: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. 99, 3041–3064 (2020)
Artuğer, F., Özkaynak, F.: A new algorithm to generate AES-like substitution boxes based on sine cosine optimization algorithm. Multimed. Tools Appl. (2023)
Shafique, A., Ahmed, J.: Dynamic substitution based encryption algorithm for highly correlated data. Multidimension. Syst. Signal Process. 32, 91–114 (2020)
Partheeban, P., Kavitha, V.: Dynamic key dependent AES S-box generation with optimized quality analysis. Clust. Comput. 22, 14731–14741 (2019)
Malik, M., Sarmad, M., et al.: Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices. IEEE Access 8, 35682–35695 (2020)
Zhu, S., Deng, X., Zhang, W., Zhu, C.: Secure image encryption scheme based on a new robust chaotic map and strong S-box. Math. Comput. Simul. 207, 322–346 (2023)
Razaq, A., Alolaiyan, H., et al.: A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups. IEEE Access 8, 75473–75490 (2020)
Aboytes-González, J.A., Murguía, J.S., Mejía-Carlos, M., et al.: Design of a strong S-Box based on a matrix approach. Nonlinear Dyn. 94, 2003–2012 (2018)
Zhu, D., Tong, X., Zhang, M., Wang, Z.: A new S-box generation method and advanced design based on combined chaotic system. Symmetry 12(12) 2020
Xiuli, C., Zhihua, G., Kang, Y., Yiran, C., Xianxing, L.: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process. Image Commun. 52, 6–19 (2017)
Sun, S.: A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J. 10(2), 1–14 (2018)
Zhongyun, H., Shuang, Y., Yicong, Z.: Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 144, 134–144 (2018)
Belazi, A., Talha, M., Kharbech, S., Xiang, W.: Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7, 36667–36681 (2019)
Artuğer, F.: A novel algorithm based on DNA coding for substitution box generation problem. Neural Comput. Appl. (2023)
Ahmed, F., Rehman, M.U., Ahmad, J., Khan, M.S., Boulila, W., Srivastava, G., Lin, J.C.-W., Buchanan, W.J.: A DNA based colour image encryption scheme using a convolutional autoencoder. ACM Trans. Multimed. Comput. Commun. Appl. 19(3s) (2023)
Mohamed, A.G., Korany, N.O., El-Khamy, S.E.: New DNA coded fuzzy based (DNAFZ) S-boxes: application to robust image encryption using hyper chaotic maps. IEEE Access 9, 14284–14305 (2021)
Masood, F., Masood, J., Zhang, L., Jamal, S.S., Boulila, W., Rehman, S., Khan, F.A., Ahmad, J.: A new color image encryption technique using DNA computing and chaos-based substitution box. Soft Comput. 26(16), 7461–7477 (2022)
Liu, H., Liu, J., Ma, C.: Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed. Tools Appl. 82(16), 23899–23914 (2023)
Artuğer, F., Özkaynak, F.: A method for generation of substitution box based on random selection. Egypt. Inform. J. 23(1), 127–135 (2022)
Alanazi, A.S., Munir, N., Khan, M., Asif, M., Hussain, I.: Cryptanalysis of novel image encryption scheme based on multiple chaotic substitution boxes. IEEE Access 9, 93795–93802 (2021)
Zamli, K.Z., Alhadawi, H.S., Din, F.: Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization. Neural Comput. Appl. 35(5), 4051–4071 (2023)
Fırat, A., Fatih, Ö.: A new post-processing approach for improvement of nonlinearity property in substitution boxes. Integration 94, 102105 (2024)
Cao, W., Zhou, Y., Philip-Chen, C.L., Xia, L.: Medical image encryption using edge maps. Signal Process. 132, 96–109 (2017)
Yasser, I., Mohamed, M.A., Samra, A.S., Khalifa, F.: A chaotic-based encryption/decryption framework for secure multimedia communications. Entropy 22(11) (2020)
Wang, X., Wang, S., Wei, N., Zhang, Y.: A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech. Rev. 36(1), 39–48 (2019)
Wu, J., Liao, X., Yang, B.: Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process. 153, 11–23 (2018)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 8th edn. Pearson (2019)
Thoms, G.R.W., Muresan, R., Al-Dweik, A.: Chaotic encryption algorithm with key controlled neural networks for intelligent transportation systems. IEEE Access 7, 158697–158709 (2019)
Ebbinghaus, H.: Memory: a contribution to experimental psychology. Ann. Neurosci. 20(4):155—156 (1885/2013). (Reprinted) https://doi.org/10.5214/ans.0972.7531.200408
Newell, A., Rosenbloom, P.S.: Mechanisms of skill acquisition and the law of practice. In: Cognitive Skills and Their Acquisition, 1st Edn, pp. 1–55. Taylor & Francis Group, New York (1981). https://doi.org/10.4324/9780203728178
Donkin, C., Nosofsky, R.M.: A power-law model of psychological memory strength in short- and long-term recognition. Psychol. Sci. 23(6), 625–634 (2012). (PMID: 22527527)
Vyushin, I.D., Kushner, P.J.: Power-law and long-memory characteristics of the atmospheric general circulation. J. Clim. 22(11), 2890–2904 (2009)
Loftus, G.R.: Evaluating forgetting curves. J. Exp. Psychol. Learn. Mem. Cogn. 11(2), 397–406 (1985). https://doi.org/10.1037/0278-7393.11.2.397
Anderson, J.R., Schooler, L.J.: Reflections of the environment in memory. Psychol. Sci. 2(6), 396–408 (1991). https://doi.org/10.1111/j.1467-9280.1991.tb00174.x
Kocak, O., Erkan, U., Toktas, A., Gao, S.: PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Syst. Appl. 237, 121452 (2024)
Soto, J.: Randomness testing of the advanced encryption standard candidate algorithms. Technical report, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899-8930 (1999)
Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (Ed.) Advances in Cryptology—CRYPTO’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol. 218, pp. 523–534, Santa Barbara, CA, USA, August. Springer, Berlin (1985)
Blondeau, C., Nyberg, K.: Perfect nonlinear functions and cryptography. Finite Fields Appl. 32, 120–147 (2015). Special Issue: Second Decade of FFA
Mahmood, S., Farwa, S., Rafiq, M., Riaz, S.M.J., Shah, T., Jamal, S.S.: To study the effect of the generating polynomial on the quality of nonlinear components in block ciphers. Secur Commun. Netw. 2018 (2018)
Hussain, I., Shah, T., Gondal, M.A., Khan, W.A., Mahmood, H.: A group theoretic approach to construct cryptographically strong substitution boxes. Neural Comput. Appl. 23, 97–104 (2013)
Hussain, I., Shah, T., Mahmood, H., Gondal, M.A.: A projective general linear group based algorithm for the construction of substitution box for block ciphers. Neural Comput. Appl. 22, 1085–1093 (2013)
Kazlauskas, K., Smaliukas, R., Vaicekauskas, G.: A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. Int. J. Adv. Comput. Sci. Appl. 7(4) (2016)
Zahid, A.H., Arshad, M.J.: An innovative design of substitution-boxes using cubic polynomial mapping. Symmerty 11(437), (2019)
Soto, J., Bassham, L.: Randomness testing of the advanced encryption standard finalist candidates. Technical report, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899-8930 (2000)
Siddiqui, N., Yousaf, F., et al.: A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. Plos One (2020)
Wu, Y., Noonan, J., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommuni. (JSAT) 31–38 (2011)
Anees, A., Ahmed, Z.: A technique for designing substitution box based on Van der Pol oscillator. Wirel. Pers. Commun. 82 (2015)
Afiza, N., Mohd, A., Yousef, A., Ashawesh, A.: Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time. J. Phys. Conf. Ser. 1793(1):012066 (2021)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no Conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Research Supporting Project number (RSP2024R444), King Saud University, Riyadh, Saudi Arabia.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Al-Muhammed, M.J., Alharbi, A. A novel block substitution technique for image/text encryption using memory loss models and fuzzy mutation. SIViP 18, 6115–6129 (2024). https://doi.org/10.1007/s11760-024-03301-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11760-024-03301-2