Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption
Open Access
- 9 June 2021
- journal article
- research article
- Published by MDPI AG in Electronics
- Vol. 10 (12), 1392
- https://doi.org/10.3390/electronics10121392
Abstract
Chaotic systems are vital in designing contemporary cryptographic systems. This study proposes an innovative method for constructing an effective substitution box using a 3-dimensional chaotic map. Moreover, bouyed by the efficiency of the proposed chaos-based substitution boxes’ effectiveness, we introduce a new chaos-based image cryptosystem that combines the adeptness of Gray codes, a non-linear and sensitive hyper-chaotic system, and the proposed S-box. The generated secret key emanating from the cryptosystem is correlated to the input image to produce a unique key for each image. Extensive experimental outcomes demonstrate the utility, effectiveness, and high performance of the resulting cryptosystem.This publication has 34 references indexed in Scilit:
- Color image encryption using Choquet fuzzy integral and hyper chaotic systemOptik, 2013
- An efficient method for the construction of block cipher with multi-chaotic systemsNonlinear Dynamics, 2012
- Local Shannon entropy measure with statistical tests for image randomnessInformation Sciences, 2012
- A novel method to design S-box based on chaotic map and genetic algorithmPhysics Letters A, 2012
- Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacksSignal Processing, 2011
- A method for designing strong S-Boxes based on chaotic Lorenz systemPhysics Letters A, 2010
- An extended method for obtaining S-boxes based on three-dimensional chaotic Baker mapsChaos, Solitons, and Fractals, 2007
- A novel method for designing S-boxes based on chaotic mapsChaos, Solitons, and Fractals, 2005
- Chaos and cryptography: block encryption ciphers based on chaotic mapsIEEE Transactions on Circuits and Systems I: Regular Papers, 2001
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991