Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
Abstract
:1. Introduction
2. CAST Block Cipher Encryption Algorithm
- Read Plain text;
- Divided Plain text into equal left and right blocks, thus providing 32-bits for each block;
- Embedded Right block into the F function to generate a new right block, six S-Boxes, and XOR operations are involved in this function;
- New left = old right;
- The final left (L) and right (R) blocks will be exchanged and concatenated into the cipher form. Despite the decryption procedure going through the same steps that were mentioned above in the encryption procedure, the rounds (pairs of the subkey) have been used in reverse order to compute (L0, R0) from (R16, L16).
3. Chaos Theory
4. The Proposed Methodology
4.1. Key Generation
Algorithm 1 Key generation algorithm |
|
4.2. S-Box Creation
Algorithm 2 S-Box generation algorithm |
|
4.3. Enhanced CAST Encryption Algorithm
Algorithm 3 Enhanced CAST encryption algorithm |
|
5. Experimental Results
5.1. Security Scheme Discussion
- Security Analysis: Strong evidence was found regarding how the proposed keys generation based on a 2D chaotic map is robust for encryption and decryption due to their being very difficult to guess. A further powerful point pertaining to the keys is that, if an adversary obtains part of them by using a brute force attack, then he or she does not have the ability to generate or obtain the other keys because the key generation algorithm is very sensitive to the values that have been entered as initial values and hence he or she cannot recognize the process involved and the initial values needed to be known, and, consequently, the proposed method is resistant to brute force attacks.
- Chosen cipher text attack: In addition to a block cipher method having been used in the proposed method, the stream cipher technique has been included by applying XOR operation. A cipher-text attack has difficulty succeeding as, in each round of the stream cipher, the keys are changing and there is a different key for each block. Furthermore, the attacker needs to have prior knowledge of the original and encrypted text, without which it is impossible to obtain the plaintext.
- Key space analysis: The key space is the set of all possible security keys that can be generated by using the proposed method (2D chaotic function). The proposed key generation method means that the number of keys is equal to the number of image pixels. The 2D chaotic function means that, if the height of the image = 255 and width = 255, then the proposed method creates 255 × 255 keys for x,y, respectively, thus providing very powerful protection against brute force attacks. Additionally, the proposed method is generating distinct keys without redundancy in the values of keys, which increases the security of the proposed method.
5.2. Statistical Tests
5.2.1. Information Entropy Analysis
5.2.2. Histogram Analysis
5.2.3. Encryption Quality
5.2.4. Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE)
5.2.5. Similarity Measurement (SIM)
5.2.6. Correlation Analysis
5.2.7. Number of Pixels Change Rate (NPCR)
5.3. Generated S-Box Performance Analysis
- Completeness: The S-Boxes are complete, if every output bit is dependent on all the input bits. The function Y is considered complete, if there is at least one pair of plain text vectors (z and ), such that: (z and ) are n bit vectors that are variant in just one bit i and and vary at least in bit h, for all i. For example, one S-Box is generated from parameters and another one is constructed using parameters . The results of these examples are shown in Figure 10 and Figure 11, respectively.
- Avalanche Criterion (AC): A block cipher is considered to detect the effect of an avalanche when a single bit of the input has been changed; then, a huge difference occurs in the output. The range of AC should be between 0 and 1, with the best value being 0.5, which results in an S-Box satisfying the avalanche criterion. The avalanche of the transformation function for the S-Box can be obtained using the following equation [44,45]:
- The study presented in [35]:ASCII (B) = 66 Hex (65) = 42 Binary (66) = 01000010 output of S-Box (42) = 83 binary (output) = 10000011 changing one bit of actual data= 01000011this string in hex = 43 output of S-Box (43) = 56 in binary= 01010110 = 5/8 = 0.625.ASCII(Z) = 90 Hex(90) = 5A Binary(90) = 01011010 output of S-Box (5A) = AC binary (output) = 10101100 changing one bit of actual data = 01011011 this string in hex = 5B output of S-Box(5B) = 64 in binary = 01100100 AC = 3/8 = 0.375.
- The study presented [36]:ASCII (B) = 66 Hex (66) = 42 Binary (66) = 01000010 output of S-Box (42) = BD binary (output) = 10111101 changing one bit of actual data = 01000011 this string in hex = 43 output of S-Box (43) = 8D in binary = 10001101 AC = 2/8 = 0.25.ASCII (Z) =90 Hex (90) = 5A Binary (90) = 01011010 output of S-Box (5A) = 97 binary (output) = 10010111 changing one bit of actual data= 01011011 this string in hex = 5B output of S-Box (5B) = 8c in binary= 10001100 AC=5/8=0.5.
- The proposed methodology:ASCII (B) = 66 Hex (66) = 42 Binary (66) = 01000010 output of S-Box (42) = 96 binary (output) = 10010110 changing one bit of actual data = 01000011 this string in hex = 43 output of S-Box (43) = 58 in binary = 01011000 AC = 5/8 = 0.625ASCII = 90 Hex(90) = 5A Binary (90) = 01011010 output of S-Box (5A) = A1 binary (output) = 10100001 changing one bit of actual data = 01011011 this string in hex = 5B output of S-Box(5B) = DF in binary = 11011111 AC = 6/8 = 0.75.
5.4. Randomness Test for NIST Statistical Test
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
References
- Meng, W.; Zhu, L.; Li, W.; Han, J.; Li, Y. Enhancing the security of FinTech applications with map-based graphical password authentication. Future Gener. Comput. Syst. 2019, 101, 1018–1027. [Google Scholar] [CrossRef]
- Akif, O.Z.; Rodgers, G.J.; Al-Raweshidy, H.S. Protecting a sensitive dataset using a time based password in big data. In Proceedings of the 2017 Computing Conference, London, UK, 18–20 July 2017; pp. 871–879. [Google Scholar] [CrossRef]
- Wang, X.S.; Herwono, I.; Cerbo, F.D.; Kearney, P.; Shackleton, M. Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services. In Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China, 30 May–1 June 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Matta, P.; Arora, M.; Sharma, D. A comparative survey on data encryption Techniques: Big data perspective. Mater. Today Proc. 2021, 46, 11035–11039. [Google Scholar] [CrossRef]
- Yassein, H.R.; Al-Saidi, N.M.G.; Farhan, A.K. A new NTRU cryptosystem outperforms three highly secured NTRU-analog systems through an innovational algebraic structure. J. Discret. Math. Sci. Cryptogr. 2022, 25, 523–542. [Google Scholar] [CrossRef]
- Abdelhamid, A.A.; El-Kenawy, E.S.M.; Alotaibi, B.; Amer, G.M.; Abdelkader, M.Y.; Ibrahim, A.; Eid, M.M. Robust Speech Emotion Recognition Using CNN+LSTM Based on Stochastic Fractal Search Optimization Algorithm. IEEE Access 2022, 10, 49265–49284. [Google Scholar] [CrossRef]
- Kadhim, A.; Salih, M. Proposal of New Keys Generator for DES Algorithms Depending on Multi Techniques. Eng. Technol. J. 2014, 32, 94–106. [Google Scholar]
- Kadhim, A.; Ali, R. Enhancement AES based on 3D Chaos Theory and DNA Operations Addition. Karbala Int. J. Mod. Sci. 2019, 5. [Google Scholar] [CrossRef] [Green Version]
- Anandkumar, R.; Kalpana, R. Designing a fast image encryption scheme using fractal function and 3D Henon Map. J. Inf. Secur. Appl. 2019, 49, 102390. [Google Scholar] [CrossRef]
- Han, C. An image encryption algorithm based on modified logistic chaotic map. Optik 2019, 181, 779–785. [Google Scholar] [CrossRef]
- Gan, Z.; Chai, X.; Yuan, K.; Lu, Y. A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed. Tools Appl. 2018, 77, 8759–8783. [Google Scholar] [CrossRef]
- Shibeeb, A.K.; Ahmed, M.H.; Mohammed, A.H. A new chaotic image cryptosystem based on plaintext-associated mechanism and integrated confusion-diffusion operation. Karbala Int. J. Mod. Sci. 2021, 7, 175–188. [Google Scholar] [CrossRef]
- Khafaga, D.S.; Alhussan, A.A.; El-Kenawy, E.S.M.; Ibrahim, A.; Eid, M.M.; Abdelhamid, A.A. Solving Optimization Problems of Metamaterial and Double T-Shape Antennas Using Advanced Meta-Heuristics Algorithms. IEEE Access 2022, 10, 74449–74471. [Google Scholar] [CrossRef]
- Narang, G.; Aggarwal, M.; Kaushal, H.; Ahuja, S. The probability of error in FSO communication system using Differential Chaos Shift Keying. Phys. Commun. 2019, 34, 220–226. [Google Scholar] [CrossRef]
- Nasry, H.; Abdallah, A.A.; Farhan, A.K.; Ahmed, H.E.; Sobky, W.I. Multi Chaotic System to Generate Novel S-Box for Image Encryption. J. Phys. Conf. Ser. 2022, 2304, 012007. [Google Scholar] [CrossRef]
- Ahmed, F.; Anees, A. Hash-Based Authentication of Digital Images in Noisy Channels. In Robust Image Authentication in the Presence of Noise; Živić, N., Ed.; Springer International Publishing: Cham, Switzerland, 2015; pp. 1–42. [Google Scholar] [CrossRef]
- Anees, A.; Hussain, I. A Novel Method to Identify Initial Values of Chaotic Maps in Cybersecurity. Symmetry 2019, 11, 140. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Han, F.; Niu, Y. Chaotic Image Encryption Algorithm Based on Bit Permutation and Dynamic DNA Encoding. Comput. Intell. Neurosci. 2017, 2017, 6919675. [Google Scholar] [CrossRef] [Green Version]
- Viktorin, A.; Pluhacek, M.; Senkerik, R. Success-history based adaptive differential evolution algorithm with multi-chaotic framework for parent selection performance on CEC2014 benchmark set. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 4797–4803. [Google Scholar] [CrossRef]
- Hu, G.; Kou, W.; Dong, J.; Peng, J. A Novel Image Encryption Algorithm Based on Cellular Neural Networks Hyper Chaotic System. In Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China, 7–10 December 2018; pp. 1878–1882. [Google Scholar] [CrossRef]
- Ismail, S.M.; Said, L.A.; Radwan, A.G.; Madian, A.H.; Abu-ElYazeed, M.F. A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Process. 2020, 167, 107280. [Google Scholar] [CrossRef]
- El-Kenawy, E.S.M.; Mirjalili, S.; Alassery, F.; Zhang, Y.D.; Eid, M.M.; El-Mashad, S.Y.; Aloyaydi, B.A.; Ibrahim, A.; Abdelhamid, A.A. Novel Meta-Heuristic Algorithm for Feature Selection, Unconstrained Functions and Engineering Problems. IEEE Access 2022, 10, 40536–40555. [Google Scholar] [CrossRef]
- Zhang, X.; Cao, Y. A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme. Sci. World J. 2014, 2014, 713541. [Google Scholar] [CrossRef]
- Alhussan, A.A.; Khafaga, D.S.; El-Kenawy, E.S.M.; Ibrahim, A.; Eid, M.M.; Abdelhamid, A.A. Pothole and Plain Road Classification Using Adaptive Mutation Dipper Throated Optimization and Transfer Learning for Self Driving Cars. IEEE Access 2022, 10, 84188–84211. [Google Scholar] [CrossRef]
- Liu, Y.; Jiang, Z.; Xu, X.; Zhang, F.; Xu, J. Optical image encryption algorithm based on hyper-chaos and public-key cryptography. Opt. Laser Technol. 2020, 127, 106171. [Google Scholar] [CrossRef]
- Myler, H.R.; Weeks, A.R. The Pocket Handbook of Image Processing Algorithms in C; Prentice Hall PTR: Englewood Cliffs, NJ, USA, 1993. [Google Scholar]
- Biagioli, M. From ciphers to confidentiality: Secrecy, openness and priority in science. Br. J. Hist. Sci. 2012, 45, 213–233. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Boey, K.; Lu, Y.; O’Neill, M.; Woods, R. Differential Power Analysis of CAST-128. In Proceedings of the 2010 IEEE Computer Society Annual Symposium on VLSI, Lixouri, Greece, 5–7 July 2010; pp. 143–148, ISSN 2159-3477. [Google Scholar] [CrossRef]
- Choi, M.; Lee, S.; Jo, M.; Shin, J.S. Keystroke dynamics-based authentication using unique keypad. Sensors 2021, 21, 2242. [Google Scholar] [CrossRef] [PubMed]
- Krishnamurthy, G.; Ramaswamy, V. Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images. arXiv 2010, arXiv:1004.0571. [Google Scholar]
- Alaa Kadhim, F.; Abdul-Majeed, G.H.; Ali, R.S. Enhancement CAST block algorithm to encrypt big data. In Proceedings of the 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Baghdad, Iraq, 7–9 March 2017; pp. 80–85. [Google Scholar] [CrossRef]
- Nie, T.; Li, Y.; Song, C. Performance Evaluation for CAST and RC5 Encryption Algorithms. In Proceedings of the 2010 International Conference on Computing, Control and Industrial Engineering, Wuhan, China, 5–6 June 2010; Volume 1, pp. 106–109. [Google Scholar] [CrossRef]
- Farhan, A.K.; Ali, R.S.; Natiq, H.; Al-Saidi, N.M.G. A New S-Box Generation Algorithm Based on Multistability Behavior of a Plasma Perturbation Model. IEEE Access 2019, 7, 124914–124924. [Google Scholar] [CrossRef]
- Asgari-Chenaghlu, M.; Balafar, M.A.; Feizi-Derakhshi, M.R. A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process. 2019, 157, 1–13. [Google Scholar] [CrossRef]
- Singh, J.P.; Roy, B.K.; Jafari, S. New family of 4-D hyperchaotic and chaotic systems with quadric surfaces of equilibria. Chaos Solitons Fractals 2018, 106, 243–257. [Google Scholar] [CrossRef]
- Joshi, M.; Ranjan, A. New simple chaotic and hyperchaotic system with an unstable node. AEU—Int. J. Electron. Commun. 2019, 108, 1–9. [Google Scholar] [CrossRef]
- Ghoneim, S.S.M.; Farrag, T.A.; Rashed, A.A.; El-Kenawy, E.S.M.; Ibrahim, A. Adaptive Dynamic Meta-Heuristics for Feature Selection and Classification in Diagnostic Accuracy of Transformer Faults. IEEE Access 2021, 9, 78324–78340. [Google Scholar] [CrossRef]
- Naif, J.R.; Abdul-Majeed, G.H.; Farhan, A.K. Secure IOT System Based on Chaos-Modified Lightweight AES. In Proceedings of the 2019 International Conference on Advanced Science and Engineering (ICOASE), Duhok, Iraq, 2–4 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Ibrahim, A.; Mirjalili, S.; El-Said, M.; Ghoneim, S.S.M.; Al-Harthi, M.M.; Ibrahim, T.F.; El-Kenawy, E.S.M. Wind Speed Ensemble Forecasting Based on Deep Learning Using Adaptive Dynamic Optimization Algorithm. IEEE Access 2021, 9, 125787–125804. [Google Scholar] [CrossRef]
- Nancharla, B.K.; Dua, M. An Image Encryption using Intertwining Logistic map and Enhanced Logistic Map. In Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020. [Google Scholar] [CrossRef]
- Azami, H.; da Silva, L.E.V.; Omoto, A.C.M.; Humeau-Heurtier, A. Two-dimensional dispersion entropy: An information-theoretic method for irregularity analysis of images. Signal Process. Image Commun. 2019, 75, 178–187. [Google Scholar] [CrossRef]
- Zhu, H.; Zhang, X.; Yu, H.; Zhao, C.; Zhu, Z. A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System. Entropy 2016, 18, 276. [Google Scholar] [CrossRef] [Green Version]
- K Pareek, N. Design and Analysis of a Novel Digital Image Encryption Scheme. Int. J. Netw. Secur. Its Appl. 2012, 4, 95–108. [Google Scholar] [CrossRef]
- Arandiyan, H.; Scott, J.; Wang, Y.; Dai, H.; Sun, H.; Amal, R. Meso-Molding Three-Dimensional Macroporous Perovskites: A New Approach to Generate High-Performance Nanohybrid Catalysts. ACS Appl. Mater. Interfaces 2016, 8, 2457–2463. [Google Scholar] [CrossRef] [PubMed]
- Al-Dweik, A.Y.; Hussain, I.; Saleh, M.S.; Mustafa, M.T. A Novel Method to Generate Key-Dependent S-Boxes with Identical Algebraic Properties. arXiv 2021, arXiv:1908.09168. [Google Scholar] [CrossRef]
- Khan, W.A.; Hussain, I.; Gondal, M. Construction of Cryptographically Strong 8x8 S-boxes. World Appl. Sci. J. 2011, 11, 2389–2395. [Google Scholar]
- Abd EL-Latif, A.A.; Abd-El-Atty, B.; Venegas-Andraca, S.E. A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 2019, 116, 92–102. [Google Scholar] [CrossRef]
- Rodinko, M.; Oliynykov, R.; Gorbenko, Y. Optimization of the High Nonlinear S-Boxes Generation Method. Tatra Mt. Math. Publ. 2017, 70, 93–105. [Google Scholar] [CrossRef] [Green Version]
- Guesmi, R.; Ben Farah, M.A.; Kachouri, A.; Samet, M. A novel design of Chaos based S-Boxes using genetic algorithm techniques. In Proceedings of the 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar, 10–13 November 2014; pp. 678–684. [Google Scholar] [CrossRef]
- Khudair, E.; Falih, E. Image Encryption and decryption using CAST-128 with proposed adaptive key. J. Coll. Educ. 2019, 2, 15–31. [Google Scholar]
- Zolfaghari, B.; Koshiba, T. Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap. Appl. Syst. Innov. 2022, 5, 57. [Google Scholar] [CrossRef]
- Jassim, S.A.; Farhan, A.K. Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things. Int. J. Electr. Comput. Eng. (IJECE) 2022, 12, 3287–3297. [Google Scholar] [CrossRef]
Image | Entropy |
---|---|
Peper1 | 7.998 |
Baboon | 7.998 |
Ba | 7.999 |
Tiger | 7.994 |
Imageswb | 7.990 |
Lena | 7.991 |
Street | 7.993 |
Imageswb-gif | 7.991 |
Imageswb-png | 7.996 |
1 | 7.999 |
2 | 7.997 |
3 | 7.993 |
4 | 7.998 |
5 | 7.999 |
6 | 7.994 |
7 | 7.996 |
8 | 7.998 |
Image Name | Plain Image | Encrypted Image | Result |
---|---|---|---|
Peper | 396,638.7 | 249.7 | Pass |
baboon | 342,421.2 | 230.8 | Pass |
Tiger | 1,923,225.8 | 210.1 | Pass |
Lena | 691,867.9 | 200.01 | Pass |
Imageswb-gif | 329,199.3 | 211.2 | Pass |
Street | 412,865.8 | 219.9 | Pass |
Image | Size | Encryption Time (s) | Correlation Coefficient | NCPR r | NCPR g | NCPR b |
---|---|---|---|---|---|---|
Peper1 | 225 × 225 | 9 | −0.0002 | 0.992 | 0.997 | 0.997 |
Baboon | 243 × 208 | 10 | −0.0002 | 0.991 | 0.991 | 0.995 |
Ba | 256 × 256 | 11 | −0.0002 | 0.993 | 0.994 | 0.996 |
Tiger | 225 × 225 | 9 | −0.0001 | 0.997 | 0.996 | 0.997 |
Imageswb | 225 × 225 | 6 | −0.0001 | 0.993 | 0.987 | 0.996 |
Lena | 144 × 115 | 1.3 | −0.0001 | 0.992 | 0.991 | 0.997 |
Street | 284 × 177 | 10.2 | −0.0002 | 0.997 | 0.994 | 0.996 |
Imageswbgif | 225 × 225 | 9 | −0.0004 | 0.997 | 1 | 0.996 |
Imageswbpng | 225 × 225 | 11 | −0.0002 | 0.993 | 0.998 | 0.996 |
1 | 156 × 144 | 1.4 | −0.0001 | 0.998 | 0.991 | 0.993 |
2 | 139 × 138 | 0.9 | −0.0003 | 0.995 | 0.997 | 0.998 |
3 | 139 × 145 | 0.9 | −0.0001 | 0.995 | 0.993 | 0.991 |
4 | 139 × 145 | 0.8 | −0.0001 | 0.993 | 0.998 | 0.995 |
5 | 142 × 142 | 0.9 | −0.0002 | 0.997 | 0.992 | 0.991 |
6 | 141 × 124 | 0.7 | −0.0001 | 0.994 | 0.991 | 0.998 |
7 | 136 × 135 | 0.5 | −0.0002 | 0.997 | 0.994 | 0.996 |
8 | 141 × 139 | 0.8 | −0.0001 | 0.992 | 0.992 | 0.996 |
S-Box1 | S-Box2 | S-Box3 | |
---|---|---|---|
S-Box1 | × | 100% | 99% |
S-Box2 | 100% | × | 99% |
S-Box3 | 99% | 99% | × |
Words | ABHKEF31 | ZXQRASPK | 01234567 |
---|---|---|---|
Research Paper | BINARRY | BINARRY | BINARRY |
[35] | 01110110101111010 00101111001011010 11111111111101110 1001010001000 | 10010111100000001 00000101100101101 11011011111010101 010001000110 | 00001000100010001 10010111101001011 01011111010100011 0100001011000 |
[36] | 01100101100000111 00101110100111000 10111000100100101 0110111011011 | 10101100001111110 00010111010111101 10010101110110111 1000001001110 | 11001011011100001 10100011010110110 11100100110011010 0011111110111 |
Proposed method | 01000011101011001 00010111011011110 11101101100000000 0011001101110 | 00011011011100000 01001111001010001 00001101111011011 1001010110111 | 10100111011011100 11010010000011000 11111101110101001 0111001111001 |
Words | ABHKEF31 | ZXQRASPK | 01234567 | Average | |||
---|---|---|---|---|---|---|---|
Research Paper | No. of 0s | No. of 1’s | No. of 0s | No. of 1’s | No. of 0s | No. of 1’s | |
[35] | 24 | 40 | 33 | 31 | 36 | 28 | 93.23% |
[36] | 31 | 33 | 28 | 36 | 27 | 37 | 94.79% |
Proposed method | 32 | 32 | 31 | 33 | 28 | 36 | 97.40% |
Actual Data | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | |
[35] | 0.5 | 0.25 | 0.25 | 0.5 | 0.5 | 0.625 | 0.625 | 0.75 | 0.75 | 0.5 | 0.5 | 0.625 | 0.625 |
0.375 | 0.375 | 0.375 | 0.375 | 0.375 | 0.375 | 0.25 | 0.25 | 0.625 | 0.625 | 0.375 | 0.375 | 0.625 | |
[36] | 0.25 | 0.625 | 0.625 | 0.625 | 0.625 | 0.5 | 0.5 | 0.375 | 0.375 | 0.375 | 0.375 | 0.5 | 0.5 |
0.5 | 0.5 | 0.875 | 0.875 | 0.625 | 0.625 | 0.125 | 0.125 | 0.625 | 0.625 | 0.875 | 0.875 | 0.375 | |
Proposed | 0.125 | 0.75 | 0.25 | 0.5 | 0.875 | 0.375 | 0.625 | 0.5 | 0.625 | 0.5 | 0.75 | 0.25 | 0.5 |
0.75 | 0.375 | 0.25 | 0.375 | 0.5 | 0.25 | 0.125 | 0.25 | 0.375 | 0.625 | 0.5 | 0.5 | 0.5 |
Research Paper | Min AC | Max AC | AVG AC |
---|---|---|---|
[35] | 0.25 | 0.75 | 0.562 |
[36] | 0.125 | 0.875 | 0.5 |
Proposed | 0.125 | 0.875 | 0.5 |
S-Box Method | Max | Min | Average |
---|---|---|---|
Proposed | 112 | 106 | 109 |
Ref. [46] | 110 | 96 | 104 |
Ref. [47] | 106 | 96 | 102.5 |
Ref. [48] | 110 | 106 | 108 |
Ref. [49] | 108 | 108 | 108 |
Test Name | Proposed Method | Ref. [52] | Status |
---|---|---|---|
Frequency | 0.75 | 0.81 | Succeed |
block-frequency | 1 | 0.65 | Succeed |
cumulative-sums | 0.86 | 0.87 | Succeed |
Runs | 0.94 | 0.73 | Succeed |
longest-run | 1 | 0.27 | Succeed |
Rank | 0.74 | 0.72 | Succeed |
Fft | 1 | 0.66 | Succeed |
nonperiodic-templates | 0.99 | 0.99 | Succeed |
overlapping-templates | 1 | 0.60 | Succeed |
Universal | 1 | 0.55 | Succeed |
Apen | 1 | 0.37 | Succeed |
Serial | 0.98 | 1 | Succeed |
lempel-ziv | 0.97 | 0.06 | Succeed |
linear-complexity | 1 | 0.79 | Succeed |
Random-excursions variant | 0.96 | 0.97 | Succeed |
Random-excursions | 0.81 | 0.77 | Succeed |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ali, R.S.; Akif, O.Z.; Jassim, S.A.; Farhan, A.K.; El-Kenawy, E.-S.M.; Ibrahim, A.; Ghoneim, M.E.; Abdelhamid, A.A. Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption. Sensors 2022, 22, 8527. https://doi.org/10.3390/s22218527
Ali RS, Akif OZ, Jassim SA, Farhan AK, El-Kenawy E-SM, Ibrahim A, Ghoneim ME, Abdelhamid AA. Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption. Sensors. 2022; 22(21):8527. https://doi.org/10.3390/s22218527
Chicago/Turabian StyleAli, Rasha S., Omar Z. Akif, Sameeh A. Jassim, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy, Abdelhameed Ibrahim, Mohamed E. Ghoneim, and Abdelaziz A. Abdelhamid. 2022. "Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption" Sensors 22, no. 21: 8527. https://doi.org/10.3390/s22218527
APA StyleAli, R. S., Akif, O. Z., Jassim, S. A., Farhan, A. K., El-Kenawy, E.-S. M., Ibrahim, A., Ghoneim, M. E., & Abdelhamid, A. A. (2022). Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption. Sensors, 22(21), 8527. https://doi.org/10.3390/s22218527