Cryptanalysis of nonlinear confusion component based encryption algorithm

Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily brea...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Integration (Amsterdam) Ročník 79; s. 41 - 47
Hlavní autori: Munir, Noor, Khan, Majid, Shah, Tariq, Alanazi, Ammar S., Hussain, Iqtadar
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Amsterdam Elsevier B.V 01.07.2021
Elsevier BV
Predmet:
ISSN:0167-9260, 1872-7522
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks. •Recently many substitution box-based encryption algorithms ensuring privacy have been proposed.•Many, chaotic map-based substitution boxes (S-boxes) have been generated posing high nonlinearity and strong cryptographic properties.•Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks.•In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks.•Cryptanalysis in both types of attacks is performed by only one selected image.
Bibliografia:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0167-9260
1872-7522
DOI:10.1016/j.vlsi.2021.03.004