Reference Hub11
Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption

Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption

Musheer Ahmad, Zishan Ahmad
Copyright: © 2018 |Volume: 5 |Issue: 2 |Pages: 17
ISSN: 2334-4598|EISSN: 2334-4601|EISBN13: 9781522547020|DOI: 10.4018/IJRSDA.2018040107
Cite Article Cite Article

MLA

Ahmad, Musheer, and Zishan Ahmad. "Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption." IJRSDA vol.5, no.2 2018: pp.131-147. http://doi.org/10.4018/IJRSDA.2018040107

APA

Ahmad, M. & Ahmad, Z. (2018). Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption. International Journal of Rough Sets and Data Analysis (IJRSDA), 5(2), 131-147. http://doi.org/10.4018/IJRSDA.2018040107

Chicago

Ahmad, Musheer, and Zishan Ahmad. "Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption," International Journal of Rough Sets and Data Analysis (IJRSDA) 5, no.2: 131-147. http://doi.org/10.4018/IJRSDA.2018040107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cryptographic Substitution-boxes are source of nonlinearity in modern block encryption systems. The robustness and confusion imparted through these systems heavily rely on the strength of their S-boxes. This brings new challenges to design cryptographically potent S-boxes to develop strong encryption systems. In this paper, an effective method to design efficient 8×8 S-box is proposed. The design methodology incorporates piece-wise linear chaotic map based random search. The S-box obtained by the proposed methodology is tested against standard statistical tests like bijective property, strict avalanche criteria, nonlinearity, differential uniformity, bits independent criteria, and linear approximation probability, revealing its outstanding performance. The proposed S-box is compared with some recent chaos-based 8×8 S-boxes. Moreover, the proposed S-box is applied to encrypt plain-image with proposed S-box transformation to unveil and highlight its inherent great encryption strength. The results confirm that the design is consistent and suitable for building strong encryption systems for secure communication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.