Skip to main content
Log in

Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block ciphers rely totally on S-boxes with excellent nonlinearity and upright cryptographic structures. In AES, an 8 × 8 S-box is a 16 × 16 lookup table over the Galois field \(\mathrm{GF}\left({2}^{8}\right),\) that occupies 8 × 28 bytes storage of computer memory. By using traditional method to construct a 24 × 24 S-box over Galois field \(\mathrm{GF}\left({2}^{24}\right),\) which lodges a storage memory of 24 × 224 bytes in traditional sense. Thus, the memory storage does not support a 24 × 24 S-box over a very larger order Galois field like \(\mathrm{GF}\left({2}^{24}\right)\). A resolute of this difficulty is possibly coming out from the algebraic structure of the commutative finite chain ring \(\frac{{F}_{q}[{\varvec{x}}]}{<{{\varvec{x}}}^{{\varvec{k}}}>}={\sum }_{i=0}^{k-1}{x}^{i}{F}_{q}.\) In this study, a subgroup of the multiplicative group of units of the chain ring \(\frac{{F}_{2}[x]}{<{x}^{24}>}={\sum }_{i=0}^{23}{x}^{i}{F}_{2}\) is considered to construct a 24 × 24 S-box that occupy just 24 × 28 bits storage memory of computer. The proposed S-box has a substantial potential to create confusion during substitution phase of the color image enciphering algorithm. While for the permutation component of the algorithm, DNA transform is applied for creating diffusion in the pixels of the color image. The proposed RGB image encryption attains the standard optimum level when compared it to the DNA and chaos-based image encryption techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of data and materials

All the data and materials are available in the draft.

References

  1. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

    Article  MathSciNet  Google Scholar 

  2. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  Google Scholar 

  3. Shah D, Shah T, Jamal SS (2019) A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation. Multidimens Syst Signal Process 31(3):885–905. https://doi.org/10.1007/s11045-019-00689-w

    Article  Google Scholar 

  4. Javeed A, Shah T, and Attaullah (2019) Design of an S-box using Rabinovich-Fabrikant system of differential equations perceiving third order nonlinearity. Multimed Tools Appl 79(9–10): 6649–6660, doi: https://doi.org/10.1007/s11042-019-08393-4

  5. Su Y, Tong X, Zhang M, Wang Z (2023) A new S-box three-layer optimization method and its application. Nonlinear Dyn 111(3):2841–2867. https://doi.org/10.1007/s11071-022-07956-9

    Article  Google Scholar 

  6. Khan M, Shah T, Batool SI (2016) A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed Tools Appl 76(22):24027–24062. https://doi.org/10.1007/s11042-016-4090-y

    Article  Google Scholar 

  7. Shankar P (1979) On BCH codes over arbitrary integer tings (Corresp.). IEEE Trans Inf Theory 25(4):480–483. https://doi.org/10.1109/tit.1979.1056063

    Article  Google Scholar 

  8. de Andrade AA, Palazzo R (1999) Construction and decoding of BCH codes over finite commutative rings. Linear Algebra Appl 286(1–3):69–85. https://doi.org/10.1016/s0024-3795(98)10163-5

    Article  MathSciNet  Google Scholar 

  9. Shah T, Qamar A, de Andrade AA (2012) Construction and decoding of BCH codes over chain of commutative rings. Math Sci. https://doi.org/10.1186/2251-7456-6-51

    Article  MathSciNet  Google Scholar 

  10. Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a Galois Ring. Zeitschrift für Naturforschung A 68(8–9):567–572. https://doi.org/10.5560/zna.2013-0021

    Article  Google Scholar 

  11. Watson JD, Crick FHC (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171(4356):737–738. https://doi.org/10.1038/171737a0

    Article  Google Scholar 

  12. Mondal B (2020) A secure steganographic scheme based on chaotic map and DNA computing. In: Micro-electronics and telecommunication engineering: proceedings of 3rd ICMETE 2019, pp. 545–554, Springer: Singapore, doi: https://doi.org/10.1007/978-981-15-2329-8_55

  13. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39. https://doi.org/10.1016/j.asoc.2015.08.008

    Article  Google Scholar 

  14. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and Chaos. Signal Process 155:44–62. https://doi.org/10.1016/j.sigpro.2018.09.029

    Article  Google Scholar 

  15. Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve elgamal scheme. Signal Process 141:109–124. https://doi.org/10.5555/3138886.3139067

    Article  Google Scholar 

  16. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466. https://doi.org/10.1016/j.asoc.2012.01.016

    Article  Google Scholar 

  17. Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965. https://doi.org/10.1109/26.477498

    Article  Google Scholar 

  18. Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image/video quality assessment. Electron Lett 44(13):800. https://doi.org/10.1049/el:20080522

    Article  Google Scholar 

  19. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81–84. https://doi.org/10.1109/97.995823

    Article  Google Scholar 

  20. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612. https://doi.org/10.1109/tip.2003.819861

    Article  Google Scholar 

  21. Haq T ul, Shah T (2020) 12×12 S-box design and its application to RGB image encryption. Optik 217:164922. https://doi.org/10.1016/j.ijleo.2020.164922

    Article  Google Scholar 

  22. Mondal B, Singh JP (2020) A lightweight image encryption scheme based on chaos and diffusion circuit. Multimed Tools Appl 81(24):34547–34571. https://doi.org/10.1007/s11042-021-11657-7

    Article  Google Scholar 

  23. Mondal B, Mandal T, Choudhury T, Khan DA (2019) Use of’A light weight secure image encryption scheme based on chaos and DNA computing’for encrypted audio watermarking. Int J Adv Intell Paradig 13(1–2):67–79. https://doi.org/10.1504/IJAIP.2019.099944

    Article  Google Scholar 

  24. Kumari P, Mondal B (2023) Lightweight image encryption algorithm using NLFSR and CBC mode. J Supercomput. https://doi.org/10.1007/s11227-023-05415-9

    Article  Google Scholar 

  25. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419. https://doi.org/10.1016/j.ins.2018.12.048

    Article  Google Scholar 

  26. Diaconu AV (2016) Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327. https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  27. Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation–substitution image encryption networks with Henon map. Neurocomputing 283:53–63. https://doi.org/10.1016/j.neucom.2017.12.048

    Article  Google Scholar 

  28. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009

    Article  Google Scholar 

  29. Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering. Inf Sci 396:97–113. https://doi.org/10.1016/j.ins.2017.02.036

    Article  Google Scholar 

  30. Pareschi F, Rovatti R, Setti G (2012) On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution. IEEE Trans Inf Forensics Secur 7(2):491–505. https://doi.org/10.1109/TIFS.2012.2185227

    Article  Google Scholar 

Download references

Funding

No funding received.

Author information

Authors and Affiliations

Authors

Contributions

Idea of this work is given by the 1st author and rest of the work is done by the 2nd author. Thus, the article is Applicable for submissions with multiple authors.

Corresponding author

Correspondence to Tanveer ul Haq.

Ethics declarations

Competing interests

There is no competing interests.

Ethical approval

The authors declare that the proposed work is original. It is neither published nor submitted elsewhere for publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shah, T., ul Haq, T. Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform. J Supercomput 80, 1037–1058 (2024). https://doi.org/10.1007/s11227-023-05512-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05512-9

Keywords

Navigation