Affiliation:
1. Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
2. Department of Mathematics, Riphah International University, Lahore 54000, Pakistan
Abstract
Elliptic curve cryptography has gained attention due to its strong resilience against current cryptanalysis methods. Inspired by the increasing demand for reliable and secure cryptographic methods, our research investigates the relationship between complex mathematical structures and image encryption. A substitution box (S-box) is the single non-linear component of several well-known security systems. Mordell elliptic curves are used because of their special characteristics and the immense computational capacity of Galois fields. These S-boxes are dynamic, which adds a layer of complexity that raises the encryption process’s security considerably. We suggest an effective technique for creating S-boxes based on a class of elliptic curves over GF(2n),n≥8. We demonstrate our approach’s robustness against a range of cryptographic threats through thorough examination, highlighting its practical applicability. The assessment of resistance of the newly generated S-box to common attack methods including linear, differential, and algebraic attacks involves a thorough analysis. This analysis is conducted by quantifying various metrics such as non-linearity, linear approximation, strict avalanche, bit independence, and differential approximation to gauge the S-box’s robustness against these attacks. A recommended method for image encryption involves the use of built-in S-boxes to quickly perform pixel replacement and shuffling. To evaluate the efficiency of the proposed strategy, we employed various tests. The research holds relevance as it can provide alternative guidelines for image encryption, which could have wider consequences for the area of cryptography as a whole. We believe that our findings will contribute to the development of secure communication and data protection, as digital security is becoming increasingly important.
Reference55 articles.
1. Miller, V.S. (1985, January 18–22). Use of elliptic curves in cryptography. Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA.
2. The state of elliptic curve cryptography;Koblitz;Des. Codes Cryptogr.,2000
3. Kodali, R.K., Patel, K.H., and Sarma, N. (2013, January 15–17). Energy efficient elliptic curve point multiplication for WSN applications. Proceedings of the 2013 National Conference on Communications (NCC), New Delhi, India.
4. A novel scheme of image encryption based on elliptic curves isomorphism and substitution boxes;Khalid;IEEE Access,2021
5. A method of generating 8 × 8 substitution boxes based on elliptic curves;Hayat;Wirel. Pers. Commun.,2018
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献