Skip to main content
Log in

Evaluating ASCON Lightweight Encryption Algorithm for Image Encryption

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Researchers over the past few decades have proposed specialized algorithms for image encryption, in order to solve the slow encryption speed and high computational requirements of traditional encryption algorithms. The National Institute of Standards and Technology (NIST) selected the Ascon algorithm as the new standard for lightweight cryptography applications. In this paper, the Ascon algorithm is tested and evaluated for image encryption. Experimental results show that the Ascon is fast, reliable, and secure. Experimental results further reveal that the Ascon either outperforms most of the contemporary image encryption algorithms in terms of image encryption metrics for quality, efficiency, and security or performs similar to other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Research Data Policy and Data Availability Statements

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J. Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD 2001. https://doi.org/10.6028/NIST.FIPS.197

  2. Dobraunig C, Eichlseder M, Mendel F, Schläffer M. Ascon v1. 2: lightweight authenticated encryption and hashing. J Cryptol. 2021;34:1–42.

    Article  MathSciNet  Google Scholar 

  3. Alghamdi Y, Munir A. An image encryption algorithm based on trivium cipher and random substitution. SN Comput Sci. 2023;4(6):713.

    Article  Google Scholar 

  4. Alghamdi Y, Munir A, Ahmad J. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy. 2022;24(10):1344. https://doi.org/10.3390/e24101344.

    Article  MathSciNet  Google Scholar 

  5. Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ. A lightweight chaos-based medical image encryption scheme using random shuffling and xor operations. Wirel Pers Commun. 2021;127:1–28.

    Google Scholar 

  6. Kaur M, Alzubi AA, Singh D, Kumar V, Lee H-N. Lightweight biomedical image encryption approach. IEEE Access. 2023;11:74048–57.

    Article  Google Scholar 

  7. Gao X. Image encryption algorithm based on 2d hyperchaotic map. Opt Laser Technol. 2021;142: 107252.

    Article  Google Scholar 

  8. Alexan W, El-Damak D, Gabr M. Image encryption based on fourier-dna coding for hyperchaotic chen system, chen-based binary quantization s-box, and variable-base modulo operation. IEEE Access. 2024;12:21092–113.

    Article  Google Scholar 

  9. Jiang D, Liu L, Zhu L, Wang X, Rong X, Chai H. Adaptive embedding: a novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Process. 2021;188: 108220.

    Article  Google Scholar 

  10. USC-SIPI Image Database. Volume 3: Miscellaneous. https://sipi.usc.edu/database/database.php?volume=misc Accessed 18 June 2023.

  11. Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai A. A novel chaotic permutation–substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022.

  12. Ahmad J, Ahmed F. Efficiency analysis and security evaluation of image encryption schemes. Computing. 2010;23:25.

    Google Scholar 

  13. Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H. An image encryption scheme based on dna computing and multiple chaotic systems. IEEE Access. 2020;8:25650–63.

    Article  Google Scholar 

  14. Alexan W, ElBeltagy M, Aboshousha A. Rgb image encryption through cellular automata, s-box and the Lorenz system. Symmetry. 2022;14(3):443.

    Article  Google Scholar 

  15. Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I. Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl. 2022;81(12):16353–70.

    Article  Google Scholar 

  16. Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access. 2020;8:140876–95.

    Article  Google Scholar 

  17. Hua Z, Zhou Y, Pun C-M, Chen CP. 2d sine logistic modulation map for image encryption. Inf Sci. 2015;297:80–94.

    Article  Google Scholar 

  18. Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access. 2020;8:25664–78.

    Article  Google Scholar 

  19. Ma S, Zhang Y, Yang Z, Hu J, Lei X. A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access. 2019;7:30344–60.

    Article  Google Scholar 

  20. Xiao D, Kulsoom A, Hashmi MA, Abbas SA. Block mode image encryption technique using two-fold operations based on chaos, md5 and dna rules. Multimed Tools Appl. 2019;78(7):9355–82.

    Article  Google Scholar 

  21. Etemadi Borujeni S, Eshghi M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst. 2013;52(2):525–37.

    Google Scholar 

  22. Belazi A, Abd El-Latif AA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016;128:155–70.

    Article  Google Scholar 

  23. Alghamdi Y, Munir A. Image encryption algorithms: a survey of design and evaluation metrics. J Cybersecur Privacy. 2024;4(1):126–52.

    Article  Google Scholar 

  24. Assafli HT, Hashim IA. Security enhancement of aes-cbc and its performance evaluation using the avalanche effect. In: 2020 3rd International Conference on Engineering Technology and Its Applications (IICETA), 2020;7–11. IEEE

  25. Budiman F, Andono PN, Setiadi M, et al. Image encryption using double layer chaos with dynamic iteration and rotation pattern. Int J Intell Eng Syst. 2022;15(2):57. https://doi.org/10.22266/ijies2022.0430.06

    Google Scholar 

  26. Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA. A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and s 8 permutation. J Intell Fuzzy Syst. 2017;33(6):3753–65.

    Article  Google Scholar 

  27. Anees A, Siddiqui AM, Ahmed F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul. 2014;19(9):3106–18.

    Article  MathSciNet  Google Scholar 

  28. Bassham L, Rukhin A, Soto J, Nechvatal J, Smid M, Leigh S, Levenson M, Vangel M, Heckert N, Banks D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD 2010. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762. Accessed 18 Jun 2023

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arslan Munir.

Ethics declarations

Conflict of interest

The authors have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

Ethical Approval

This article does not contain any studies involving human participants and/or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alghamdi, Y., Munir, A. Evaluating ASCON Lightweight Encryption Algorithm for Image Encryption. SN COMPUT. SCI. 5, 1043 (2024). https://doi.org/10.1007/s42979-024-03382-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-03382-3

Keywords