当前位置: X-MOL 学术Multimed. Tools Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box
Multimedia Tools and Applications ( IF 3.6 ) Pub Date : 2021-01-13 , DOI: 10.1007/s11042-020-10440-4
Maryam Mousavi , Babak Sadeghiyan

In this paper, a novel chaos-based dynamic encryption scheme with a permutation-substitution structure is presented. The S-boxes and P-boxes of the scheme are constructed with chaotic transformation and Rubik cube-based permutation to enrich the security, sensitivity, and robustness of the scheme. We use chaotic map and Feistel network to generate our block cipher. The purpose of using a Feistel network is to do encryption and decryption with the same structure. Due to using chaotic systems in our design, the required rounds of Feistel structure are only seven rounds which are less than the number of rounds for encryption algorithms, and, it would be helpful to improve the efficiency of our design. We made this block cipher fully dynamic, to achieve enhanced security and efficiency. Our design consists of a 192-bit block cipher and 8 × 8-bit S-box which due to chaotic systems is created simple and secure. We studied and tested our scheme with security analyses such as algorithm evalustion, correlation coefficients, histogram, plain text analysis, NPCR, key sensitivity, UACI, and key space analysis and corresponding results are given in detail. The results of simulation and analysis show that the proposed block-cipher encryption scheme provides a secure and efficient encryption.



中文翻译:

一种新的具有Feistel式结构的图像加密方案,使用混沌S-box和基于Rubik cube的P-box

本文提出了一种具有置换替代结构的基于混沌的动态加密方案。该方案的S盒和P盒采用混沌变换和基于Rubik多维数据集的置换构造,以丰富该方案的安全性,敏感性和鲁棒性。我们使用混沌映射和Feistel网络来生成我们的分组密码。使用Feistel网络的目的是使用相同的结构进行加密和解密。由于在我们的设计中使用了混沌系统,因此Feistel结构所需的轮次仅为7轮,少于加密算法的轮数,这将有助于提高我们的设计效率。我们使该分组密码完全动态,以实现增强的安全性和效率。我们的设计包括一个192位的分组密码和8个8位的S-box,由于混乱的系统,它们被简单安全地创建了。我们使用安全性分析(例如算法评估,相关系数,直方图,纯文本分析,NPCR,密钥敏感性,UACI和密钥空间分析)研究和测试了我们的方案,并详细给出了相应的结果。仿真和分析结果表明,所提出的分组密码加密方案提供了一种安全有效的加密方法。

更新日期:2021-01-14
down
wechat
bug