Cryptanalysis of nonlinear confusion component based encryption algorithm

Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily brea...

Full description

Saved in:
Bibliographic Details
Published in:Integration (Amsterdam) Vol. 79; pp. 41 - 47
Main Authors: Munir, Noor, Khan, Majid, Shah, Tariq, Alanazi, Ammar S., Hussain, Iqtadar
Format: Journal Article
Language:English
Published: Amsterdam Elsevier B.V 01.07.2021
Elsevier BV
Subjects:
ISSN:0167-9260, 1872-7522
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks. •Recently many substitution box-based encryption algorithms ensuring privacy have been proposed.•Many, chaotic map-based substitution boxes (S-boxes) have been generated posing high nonlinearity and strong cryptographic properties.•Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks.•In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks.•Cryptanalysis in both types of attacks is performed by only one selected image.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0167-9260
1872-7522
DOI:10.1016/j.vlsi.2021.03.004