4.6 Article

JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos

Journal

ELECTRONICS
Volume 10, Issue 4, Pages -

Publisher

MDPI
DOI: 10.3390/electronics10040413

Keywords

applied cryptography; images encryption; jpeg encryption; elliptic-curve cryptography; chaos; logistic map; cryptanalysis; randomness; symmetric cryptosystem; substitution box

Funding

  1. Instituto Politecnico Nacional (National Polytechnic Institute)
  2. ESIME Culhuacan
  3. CIDETEC
  4. CONACyT

Ask authors/readers for more resources

This research introduces a new symmetric encryption system based on elliptical curve and chaos, which enhances security through improved encryption levels and increased diffusion with the use of strong curve solution points and random number strings. The system also includes a substitution box with a non-linearity of 100 to strengthen the cryptosystem against various attacks. The proposed cryptosystem is tested against different analyses to verify its robustness and the quality of the obtained cipher text.
This paper proposes a new symmetric encryption system based on an elliptical curve and chaos, where the encryption is done in a single block and runs for 14 rounds. Here, the 15 encryption keys have the same size as the image and are generated using a solution point of a strong elliptic curve. Using a string of random numbers obtained with a logistic map, a permutation and its inverse are generated, which improve the encryption level and add diffusion to the cryptosystem. Another important contribution to this research is the generation of a substitution box with a non-linearity of 100, which strengthens the cryptosystem against differential and linear attacks that add confusion to the scheme. Moreover, the cryptographic properties of the proposed S-Box are compared with those of the S-Box of the Advanced Encryption Standard (AES) to ascertain that it is a suitable alternative that it is resistant to differential power analysis (DPA) attacks. To verify the robustness of proposed cryptosystem against cryptanalysis and the quality of the cipher text obtained, this system is subjected to different tests, such as entropy, correlation coefficient, chi(2), Changing Pixel Rate (NPCR), and Unified Averaged Changing Intensity (UACI). The results are shown and compared with recently proposed systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available