Skip to main content
Log in

A novel image encryption scheme based on multiple chaotic S-boxes

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In many encryption systems, the original data are transformed into encrypted version by applying nonlinear substitutions and inducing diffusion. The objective of the nonlinear transformation is to attain high levels of randomness in the cipher text. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic systems show random behavior that is suitable for encryption applications where nonlinear transformations are required between plaintext and the encrypted data. The application of nonlinear functional chaos-based system with embedded chaotic system and multi-parameters can instigate randomness and diffusion in the data. In addition to high level of randomness, the need for multiple round keys is required in a typical substitution–permutation process. The proposed method eliminates the need for multiple round keys, which is suitable for high-speed communication systems. The statistical experiments performed on the proposed nonlinear transformation algorithms show improvement in encryption strength and resistance against many brute force and statistical attacks. In addition, the proposed system shows high resistance against differential and linear cryptanalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Baptista, M.S.: Cryptography with chaos. Phys. Lett. A. 240, 50 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  2. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic secure communication system. Phys. Lett. A. 306, 200 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  3. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic cryptosystem using external key. Phys. Lett. A. 276, 191 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  4. Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A. 326, 211 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  5. Adams, C., Tavares, S.: Good S-boxes are easy to find. In: Advances in Cryptology: Proceedings of CRYPTO\_89. Lecture Notes in Computer Science, pp. 612–615 (1989)

  6. Webster, A.F., Tavares, S.: On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO\_85. Lecture Notes in Computer Science, pp. 523–534 (1986)

  7. Detombe, J., Tavares, S.: On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO\_92. Lecture Notes in Computer Science (1992)

  8. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  9. Dawson, M., Tavares, S.: An expanded set of S-box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology: Proceedings of EURO-CRYPT\_91. Lecture Notes in Computer Science, pp. 352–367 (1991)

  10. Matsui, M.: Linear cryptanalysis method of DES cipher: advances in cryptology. In: Proceeding of the Eurocrypt’93, Lecture Notes in Computer Science, vol. 765, pp. 386–397 (1994)

  11. Shannon, C.E.: Communication theory of secrecy systems. Bell. Syst. Tech. J. 28, 656–715 (1949)

    Article  MATH  MathSciNet  Google Scholar 

  12. Shannon, C.E.: A mathematical theory of communication. Bell. Syst. Tech. J. 27, 379–423 (1948)

    Article  MATH  MathSciNet  Google Scholar 

  13. Fatih, Ö., Sırma, Y.: Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. (2013). doi:10.1007/s11071-013-0987-4

    Google Scholar 

  14. Jakimoski, G., Kocarev, L.: Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans. Circuits Syst. 48, 163–169 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  15. Zhang, X., Zhao, Z.: Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn. 75, 319–330 (2014)

    Article  Google Scholar 

  16. Wang, X., Guo, K.: A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 76, 1943–1950 (2014)

    Article  Google Scholar 

  17. Zhang, X., Mao, Y., Zhao, Z.: An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn. 78, 359–369 (2014)

    Article  Google Scholar 

  18. Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn. 75, 567–576 (2014)

    Article  Google Scholar 

  19. Fatih, Ö., Sirma, Y.: Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Nonlinear Dyn. 78, 1311–1320 (2014)

  20. Zhao, J., Wang, S., Chang, Y., Li, X.: A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn. 80, 1721–1729 (2015)

    Article  MathSciNet  Google Scholar 

  21. Cheng, P., Yang, H., Wei, P., Zhang, W.: A fast image encryption algorithm based on chaotic map and lookup table. 79, 2121–2131 (2015)

    Google Scholar 

  22. Yap, W.S., Phan, R.C.W., Yau, W.C., Heng, S.H.: Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 80, 1483–1491 (2015)

    Article  MathSciNet  Google Scholar 

  23. Wang, X., Xu, D.: A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dyn. 79, 2449–2456 (2015)

    Article  Google Scholar 

  24. Sahar, M., Amir, M.E.: Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3), 1745–1754 (2009)

    Article  MATH  Google Scholar 

  25. Liu, H.J., Wang, X.Y.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  26. Qais H.A., Aouda A.A.: Image encryption based on the general approach for multiple chaotic systems. J. Signal Inf. Proc. 2:238–244 (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M. A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dyn 82, 527–533 (2015). https://doi.org/10.1007/s11071-015-2173-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-2173-3

Keywords

Navigation