Cryptanalysis of nonlinear confusion component based encryption algorithm

Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily brea...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Integration (Amsterdam) Ročník 79; s. 41 - 47
Hlavní autoři: Munir, Noor, Khan, Majid, Shah, Tariq, Alanazi, Ammar S., Hussain, Iqtadar
Médium: Journal Article
Jazyk:angličtina
Vydáno: Amsterdam Elsevier B.V 01.07.2021
Elsevier BV
Témata:
ISSN:0167-9260, 1872-7522
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks. In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks. Cryptanalysis in both types of attacks is performed by only one selected image. Moreover, we have suggested some improvements in the algorithm to defeat attacks. •Recently many substitution box-based encryption algorithms ensuring privacy have been proposed.•Many, chaotic map-based substitution boxes (S-boxes) have been generated posing high nonlinearity and strong cryptographic properties.•Encryption schemes depending on the substitution box (S-box) only are weak and easily breakable with the help of chosen plaintext and ciphertext attacks.•In this work, we have completely cryptanalyzed S-box based encryption scheme successfully by two types of attacks.•Cryptanalysis in both types of attacks is performed by only one selected image.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0167-9260
1872-7522
DOI:10.1016/j.vlsi.2021.03.004