Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Sep 9:8:e892.
doi: 10.7717/peerj-cs.892. eCollection 2022.

A strong construction of S-box using Mandelbrot set an image encryption scheme

Affiliations

A strong construction of S-box using Mandelbrot set an image encryption scheme

Mazzamal Aslam et al. PeerJ Comput Sci. .

Abstract

The substitution box (S-box) plays a vital role in creating confusion during the encryption process of digital data. The quality of encryption schemes depends upon the S-box. There have been several attempts to enhance the quality of the S-box by using fractal chaotic mechanisms. However, there is still weakness in the robustness against cryptanalysis of fractal-based S-boxes. Due to their chaotic behavior, fractals are frequently employed to achieve randomness by confusion and diffusion process. A complex number-based S-box and a chaotic map diffusion are proposed to achieve high nonlinearity and low correlation. This study proposed a Mandelbrot set S-box construction based on the complex number and Chen chaotic map for resisting cryptanalytic attacks by creating diffusion in our proposed algorithm. The cryptosystem was built on the idea of substitution permutation networks (SPN). The complex nature of the proposed S-box makes it more random than other chaotic maps. The robustness of the proposed system was analyzed by different analysis properties of the S-box, such as nonlinearity, strict avalanche criterion, Bit independent criterion, and differential and linear probability. Moreover, to check the strength of the proposed S-box against differential and brute force attacks, we performed image encryption with the proposed S-box. The security analysis was performed, including statistical attack analysis and NIST analysis. The analysis results show that the proposed system achieves high-security standards than existing schemes.

Keywords: Chen chaotic system; Cryptosystem; Image encryption; Mandelbrot set; Substitution-box.

PubMed Disclaimer

Conflict of interest statement

The authors declare there are no competing interests.

Figures

Figure 1
Figure 1. Proposed encryption model.
Figure 2
Figure 2. Proposed S-box construction model flowchart.
Figure 3
Figure 3. Formal modeling of Mandelbrot set.
Figure 4
Figure 4. (A–B) Chen’s chaotic system (Chen & Ueta, 1999).
Figure 5
Figure 5. Nonlinearity comparison chart.
Figure 6
Figure 6. Differential probability comparison with literature.
Figure 7
Figure 7. Original image (A, D, G), and histogram analysis of the original image (B, E, H), and cipher images histogram (C, F, I).
Figure 8
Figure 8. RGB channel separation. (B, F, J) red channel, (C, G, K) green channel, (D, H, L) blue channel of airplane, owl and fruits test images.
Figure 9
Figure 9. Histogram of RGB channel of owl (B, C, D); encrypted image channel histogram (F, G, H), histogram of RGB channel of fruits (J, K, L), encrypted image channel histogram (N, O, P).
Figure 10
Figure 10. (A–X) Correlation coefficient of original and cipher images airplane, owl and fruits.
Figure 11
Figure 11. Layer wise correlation of airplane original and cipher image.
(B, F, J, N, R, V) red, green and blue Horizontal plane correlation; (C, G, K, O, S, W) red, green and blue diagonal plane correlation; (D, H, L, P, T, X) shows red, green and blue vertical plane correlation.

References

    1. Abd EL-Latif AA, Abd-El-Atty B, Venegas-Andraca SE. A novel image steganography technique based on quantum substitution boxes. Optics & Laser Technology. 2019;116:92–102. doi: 10.1016/j.optlastec.2019.03.005. - DOI
    1. Aboytes-González J, Murguía J, Mejía-Carlos M, González-Aguilar H, Ramírez-Torres M. Design of a strong S-box based on a matrix approach. Nonlinear Dynamics. 2018;94(3):2003–2012. doi: 10.1007/s11071-018-4471-z. - DOI
    1. Agarwal S. A new composite fractal function and its application in image encryption. Journal of Imaging. 2020;6(7):70. doi: 10.3390/jimaging6070070. - DOI - PMC - PubMed
    1. Al Solami E, Ahmad M, Volos C, Doja MN, Beg MMS. A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy. 2018;20(7):525. doi: 10.3390/e20070525. - DOI - PMC - PubMed
    1. Azam NA, Ullah I, Hayat U. A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Optics and Lasers in Engineering. 2021;137:106371. doi: 10.1016/j.optlaseng.2020.106371. - DOI

LinkOut - more resources