Abstract
Researchers over the past few decades have proposed specialized algorithms for image encryption, in order to solve the slow encryption speed and high computational requirements of traditional encryption algorithms. The National Institute of Standards and Technology (NIST) selected the Ascon algorithm as the new standard for lightweight cryptography applications. In this paper, the Ascon algorithm is tested and evaluated for image encryption. Experimental results show that the Ascon is fast, reliable, and secure. Experimental results further reveal that the Ascon either outperforms most of the contemporary image encryption algorithms in terms of image encryption metrics for quality, efficiency, and security or performs similar to other algorithms.







Similar content being viewed by others
Research Data Policy and Data Availability Statements
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
References
Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J. Advanced Encryption Standard (AES). Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD 2001. https://doi.org/10.6028/NIST.FIPS.197
Dobraunig C, Eichlseder M, Mendel F, Schläffer M. Ascon v1. 2: lightweight authenticated encryption and hashing. J Cryptol. 2021;34:1–42.
Alghamdi Y, Munir A. An image encryption algorithm based on trivium cipher and random substitution. SN Comput Sci. 2023;4(6):713.
Alghamdi Y, Munir A, Ahmad J. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy. 2022;24(10):1344. https://doi.org/10.3390/e24101344.
Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ. A lightweight chaos-based medical image encryption scheme using random shuffling and xor operations. Wirel Pers Commun. 2021;127:1–28.
Kaur M, Alzubi AA, Singh D, Kumar V, Lee H-N. Lightweight biomedical image encryption approach. IEEE Access. 2023;11:74048–57.
Gao X. Image encryption algorithm based on 2d hyperchaotic map. Opt Laser Technol. 2021;142: 107252.
Alexan W, El-Damak D, Gabr M. Image encryption based on fourier-dna coding for hyperchaotic chen system, chen-based binary quantization s-box, and variable-base modulo operation. IEEE Access. 2024;12:21092–113.
Jiang D, Liu L, Zhu L, Wang X, Rong X, Chai H. Adaptive embedding: a novel meaningful image encryption scheme based on parallel compressive sensing and slant transform. Signal Process. 2021;188: 108220.
USC-SIPI Image Database. Volume 3: Miscellaneous. https://sipi.usc.edu/database/database.php?volume=misc Accessed 18 June 2023.
Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai A. A novel chaotic permutation–substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022.
Ahmad J, Ahmed F. Efficiency analysis and security evaluation of image encryption schemes. Computing. 2010;23:25.
Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H. An image encryption scheme based on dna computing and multiple chaotic systems. IEEE Access. 2020;8:25650–63.
Alexan W, ElBeltagy M, Aboshousha A. Rgb image encryption through cellular automata, s-box and the Lorenz system. Symmetry. 2022;14(3):443.
Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I. Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl. 2022;81(12):16353–70.
Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access. 2020;8:140876–95.
Hua Z, Zhou Y, Pun C-M, Chen CP. 2d sine logistic modulation map for image encryption. Inf Sci. 2015;297:80–94.
Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access. 2020;8:25664–78.
Ma S, Zhang Y, Yang Z, Hu J, Lei X. A new plaintext-related image encryption scheme based on chaotic sequence. IEEE Access. 2019;7:30344–60.
Xiao D, Kulsoom A, Hashmi MA, Abbas SA. Block mode image encryption technique using two-fold operations based on chaos, md5 and dna rules. Multimed Tools Appl. 2019;78(7):9355–82.
Etemadi Borujeni S, Eshghi M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst. 2013;52(2):525–37.
Belazi A, Abd El-Latif AA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016;128:155–70.
Alghamdi Y, Munir A. Image encryption algorithms: a survey of design and evaluation metrics. J Cybersecur Privacy. 2024;4(1):126–52.
Assafli HT, Hashim IA. Security enhancement of aes-cbc and its performance evaluation using the avalanche effect. In: 2020 3rd International Conference on Engineering Technology and Its Applications (IICETA), 2020;7–11. IEEE
Budiman F, Andono PN, Setiadi M, et al. Image encryption using double layer chaos with dynamic iteration and rotation pattern. Int J Intell Eng Syst. 2022;15(2):57. https://doi.org/10.22266/ijies2022.0430.06
Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA. A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and s 8 permutation. J Intell Fuzzy Syst. 2017;33(6):3753–65.
Anees A, Siddiqui AM, Ahmed F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul. 2014;19(9):3106–18.
Bassham L, Rukhin A, Soto J, Nechvatal J, Smid M, Leigh S, Levenson M, Vangel M, Heckert N, Banks D. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD 2010. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762. Accessed 18 Jun 2023
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no Conflict of interest as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.
Ethical Approval
This article does not contain any studies involving human participants and/or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alghamdi, Y., Munir, A. Evaluating ASCON Lightweight Encryption Algorithm for Image Encryption. SN COMPUT. SCI. 5, 1043 (2024). https://doi.org/10.1007/s42979-024-03382-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-03382-3