An efficient algorithm to generate dynamic substitution-boxes and its applications in image encryption
| dc.authorid | Bustamante, Miguel/0000-0003-3360-0304 | |
| dc.authorid | DEMIR, Bilal/0000-0002-6638-6909 | |
| dc.contributor.author | Bilal, Muhammad | |
| dc.contributor.author | Murtaza, Ghulam | |
| dc.contributor.author | Demir, Bilal | |
| dc.contributor.author | Bustamante, Miguel D. | |
| dc.contributor.author | Hayat, Umar | |
| dc.date.accessioned | 2025-07-03T21:26:43Z | |
| dc.date.issued | 2025 | |
| dc.department | Balıkesir Üniversitesi | |
| dc.description.abstract | Nowadays, securing private information against modern attacks is a challenging task. The construction of substitution-box (S-box) generators and encryption schemes, which meet security requirements against all kinds of attacks, has become a hot research topic in recent decades. Various algorithms are designed to generate S-boxes to increase the security of block ciphers. However, many of the existing S-box generators have shortcomings such as low nonlinearity values and high computation time. This research proposes anew elliptic curve (EC) and M & ouml;bius transformation based S-box generator and encryption scheme. Our method generates computationally efficient and highly dynamic S-boxes with good cryptographic properties, and the encryption scheme is robust against modern cryptographic attacks. Our method generates S-boxes with a nonlinearity value of 112 and takes only 0.367996 s to generate an S-box. Further, the average nonlinearity of a set of randomly-generated 10,000 of our S-boxes is 103.53, much better than state-of-the-art generators. The proposed encryption scheme is rigorously validated through comprehensive testing: NIST suite evaluations, key sensitivity, correlation analysis, and vulnerability to various attacks, yielding notable results: entropy value of 7.9977, NPCR of 99.54, and UACI of 33.69 for the encrypted Lena image. Thus, our proposed method exhibits high security against cryptographic attacks. | |
| dc.identifier.doi | 10.1016/j.aej.2024.11.014 | |
| dc.identifier.endpage | 231 | |
| dc.identifier.issn | 1110-0168 | |
| dc.identifier.issn | 2090-2670 | |
| dc.identifier.scopus | 2-s2.0-85213570500 | |
| dc.identifier.scopusquality | Q1 | |
| dc.identifier.startpage | 214 | |
| dc.identifier.uri | https://doi.org/10.1016/j.aej.2024.11.014 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12462/21870 | |
| dc.identifier.volume | 116 | |
| dc.identifier.wos | WOS:001412469600001 | |
| dc.identifier.wosquality | Q1 | |
| dc.indekslendigikaynak | Web of Science | |
| dc.indekslendigikaynak | Scopus | |
| dc.language.iso | en | |
| dc.publisher | Elsevier | |
| dc.relation.ispartof | Alexandria Engineering Journal | |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | |
| dc.rights | info:eu-repo/semantics/openAccess | |
| dc.snmz | KA_WOS_20250703 | |
| dc.subject | Elliptic curve | |
| dc.subject | Substitution-box | |
| dc.subject | M & ouml;bius transformation | |
| dc.subject | Image encryption | |
| dc.subject | Security analysis | |
| dc.title | An efficient algorithm to generate dynamic substitution-boxes and its applications in image encryption | |
| dc.type | Article |












