Abstract
The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block ciphers rely totally on S-boxes with excellent nonlinearity and upright cryptographic structures. In AES, an 8 × 8 S-box is a 16 × 16 lookup table over the Galois field \(\mathrm{GF}\left({2}^{8}\right),\) that occupies 8 × 28 bytes storage of computer memory. By using traditional method to construct a 24 × 24 S-box over Galois field \(\mathrm{GF}\left({2}^{24}\right),\) which lodges a storage memory of 24 × 224 bytes in traditional sense. Thus, the memory storage does not support a 24 × 24 S-box over a very larger order Galois field like \(\mathrm{GF}\left({2}^{24}\right)\). A resolute of this difficulty is possibly coming out from the algebraic structure of the commutative finite chain ring \(\frac{{F}_{q}[{\varvec{x}}]}{<{{\varvec{x}}}^{{\varvec{k}}}>}={\sum }_{i=0}^{k-1}{x}^{i}{F}_{q}.\) In this study, a subgroup of the multiplicative group of units of the chain ring \(\frac{{F}_{2}[x]}{<{x}^{24}>}={\sum }_{i=0}^{23}{x}^{i}{F}_{2}\) is considered to construct a 24 × 24 S-box that occupy just 24 × 28 bits storage memory of computer. The proposed S-box has a substantial potential to create confusion during substitution phase of the color image enciphering algorithm. While for the permutation component of the algorithm, DNA transform is applied for creating diffusion in the pixels of the color image. The proposed RGB image encryption attains the standard optimum level when compared it to the DNA and chaos-based image encryption techniques.
Similar content being viewed by others
Availability of data and materials
All the data and materials are available in the draft.
References
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Shah D, Shah T, Jamal SS (2019) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimens Syst Signal Process 31(3):885–905. https://doi.org/10.1007/s11045-019-00689-w
Javeed A, Shah T, and Attaullah (2019) Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multimed Tools Appl 79(9–10): 6649–6660, doi: https://doi.org/10.1007/s11042-019-08393-4
Su Y, Tong X, Zhang M, Wang Z (2023) A new S-box three-layer optimization method and its application. Nonlinear Dyn 111(3):2841–2867. https://doi.org/10.1007/s11071-022-07956-9
Khan M, Shah T, Batool SI (2016) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 76(22):24027–24062. https://doi.org/10.1007/s11042-016-4090-y
Shankar P (1979) On BCH codes over arbitrary integer tings (Corresp.). IEEE Trans Inf Theory 25(4):480–483. https://doi.org/10.1109/tit.1979.1056063
de Andrade AA, Palazzo R (1999) Construction and decoding of BCH codes over finite commutative rings. Linear Algebra Appl 286(1–3):69–85. https://doi.org/10.1016/s0024-3795(98)10163-5
Shah T, Qamar A, de Andrade AA (2012) Construction and decoding of BCH codes over chain of commutative rings. Math Sci. https://doi.org/10.1186/2251-7456-6-51
Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a Galois Ring. Zeitschrift für Naturforschung A 68(8–9):567–572. https://doi.org/10.5560/zna.2013-0021
Watson JD, Crick FHC (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356):737–738. https://doi.org/10.1038/171737a0
Mondal B (2020) A secure steganographic scheme based on chaotic map and DNA computing. In: Micro-electronics and telecommunication engineering: proceedings of 3rd ICMETE 2019, pp. 545–554, Springer: Singapore, doi: https://doi.org/10.1007/978-981-15-2329-8_55
Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39. https://doi.org/10.1016/j.asoc.2015.08.008
Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and Chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029
Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve elgamal scheme. Signal Process 141:109–124. https://doi.org/10.5555/3138886.3139067
Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466. https://doi.org/10.1016/j.asoc.2012.01.016
Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965. https://doi.org/10.1109/26.477498
Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800. https://doi.org/10.1049/el:20080522
Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84. https://doi.org/10.1109/97.995823
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/tip.2003.819861
Haq T ul, Shah T (2020) 12×12 S-box design and its application to RGB image encryption. Optik 217:164922. https://doi.org/10.1016/j.ijleo.2020.164922
Mondal B, Singh JP (2020) A lightweight image encryption scheme based on chaos and diffusion circuit. Multimed Tools Appl 81(24):34547–34571. https://doi.org/10.1007/s11042-021-11657-7
Mondal B, Mandal T, Choudhury T, Khan DA (2019) Use of’A light weight secure image encryption scheme based on chaos and DNA computing’for encrypted audio watermarking. Int J Adv Intell Paradig 13(1–2):67–79. https://doi.org/10.1504/IJAIP.2019.099944
Kumari P, Mondal B (2023) Lightweight image encryption algorithm using NLFSR and CBC mode. J Supercomput. https://doi.org/10.1007/s11227-023-05415-9
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419. https://doi.org/10.1016/j.ins.2018.12.048
Diaconu AV (2016) Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327. https://doi.org/10.1016/j.ins.2015.10.027
Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation–substitution image encryption networks with Henon map. Neurocomputing 283:53–63. https://doi.org/10.1016/j.neucom.2017.12.048
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009
Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97–113. https://doi.org/10.1016/j.ins.2017.02.036
Pareschi F, Rovatti R, Setti G (2012) On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans Inf Forensics Secur 7(2):491–505. https://doi.org/10.1109/TIFS.2012.2185227
Funding
No funding received.
Author information
Authors and Affiliations
Contributions
Idea of this work is given by the 1st author and rest of the work is done by the 2nd author. Thus, the article is Applicable for submissions with multiple authors.
Corresponding author
Ethics declarations
Competing interests
There is no competing interests.
Ethical approval
The authors declare that the proposed work is original. It is neither published nor submitted elsewhere for publication.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Shah, T., ul Haq, T. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. J Supercomput 80, 1037–1058 (2024). https://doi.org/10.1007/s11227-023-05512-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05512-9